Return to the Appliances Forum | Post a Follow-Up

Cyberattack traced to hacked refrigerator

Posted by chac_mool (My Page) on
Sat, Jan 18, 14 at 5:06

Saw this article online, at the website:

To summarize, "Computer security researchers said this week they discovered a large "botnet" which infected Internet-connected home appliances and then delivered more than 750,000 malicious emails."

"The California security firm Proofpoint, Inc. [...] said hackers managed to penetrate home-networking routers, connected multi-media centers, televisions and at least one refrigerator to create a botnet or platform to deliver malicious spam or phishing emails from a device, usually without the owner's knowledge." [....]

"Many [appliances] are poorly protected at best and consumers have virtually no way to detect or fix infections when they do occur. Enterprises may find distributed attacks increasing as more and more of these devices come online and attackers find additional ways to exploit them."

The full article is available at:

Follow-Up Postings:

RE: Cyberattack traced to hacked refrigerator

It was pretty inevitable that as companies deployed smart appliances and TVs based on standard Linux/Android hw/sw platforms, that this was going to happen. I am guessing that in these cases of infection, there was little in the way of security on the home network.

RE: Cyberattack traced to hacked refrigerator

I don't think I'd blame home level network security because:
  • Most people use what their provider gives them
  • Most home level modem/firewall devices provided are not very good
  • Generally, anything allowed outward can let anything in
  • If a device allows an app to control it, it can be hacked from outside of the home

I'd add that 95% of home device makers KNEW this not only could happen but was likely, could have written their device interfaces well enough to make it very difficult, but didn't because the device wouldn't have been as profitable for them.

RE: Cyberattack traced to hacked refrigerator

I was making reference to the fact that most attacks start with probes, looking for open ports or evidence of lack security. The easiest targets get hit first. The solution space goes well beyond the device interfaces. The reports indicate the hacks targeted known exploits.

Anyway, back to talking about appliances!

 o Post a Follow-Up

Please Note: Only registered members are able to post messages to this forum.

    If you are a member, please log in.

    If you aren't yet a member, join now!

Return to the Appliances Forum

Information about Posting

  • You must be logged in to post a message. Once you are logged in, a posting window will appear at the bottom of the messages. If you are not a member, please register for an account.
  • Please review our Rules of Play before posting.
  • Posting is a two-step process. Once you have composed your message, you will be taken to the preview page. You will then have a chance to review your post, make changes and upload photos.
  • After posting your message, you may need to refresh the forum page in order to see it.
  • Before posting copyrighted material, please read about Copyright and Fair Use.
  • We have a strict no-advertising policy!
  • If you would like to practice posting or uploading photos, please visit our Test forum.
  • If you need assistance, please Contact Us and we will be happy to help.

Learn more about in-text links on this page here