From the editor’s desk: Presenting … how you were hacked

May 2019 News & Events

“It’s all fun and games until you hit the wall.” Someone said that to me once (an American, so I don’t know if that’s a common saying in the US). At the time I thought he watched too much reality TV.

These days, however, I think I have a better understanding of what the phrase means. At the time he was working for SCO, a company that made an awesome version of Unix back in the day. After some business dealings, the company decided its business model wouldn’t be based on software that was popular in many small- to medium-sized businesses, and that was loved by almost everyone who came into contact with it (I may be a little biased here, but meeting the CEO and other execs in Santa Cruz was an experience; I have never seen people so passionate about what they did, not even professional marketers who are paid to be excited). But the new bosses decided they would make a fortune by suing people using open source software.

Needless to say the company was under the influence of another company with good reason to badmouth Linux, but that’s another story. Needless to say, their route down was fairly straight with no time for somersaults or any taking in of the scenery.

Not that SCO has anything to do with this editorial. However, I think it may be time to accept that the wall has been hit and to take a step back and re-evaluate. Remember back in 2016 when Mirai became famous? In case not, “In 2016, Mirai showed the massive destructive potential of DDoS attacks as a result of insecure consumer IoT (Internet of Things) devices. Mirai’s attacks exploited only a small number of devices and vulnerabilities and used basic password guessing techniques” (www.securitysa.com/56500n). It’s back and more advanced than ever, see www.securitysa.com/*mirai1 (redirects to https://arstechnica.com/information-technology/2019/03/mirai-botnet-aims-to-wrap-its-tentacles-around-a-new-crop-of-iot-devices/).

While the old version was known for targeting “routers, network storage devices, NVRs, and IP cameras”, the new variant of Mirai adds 11 new exploits, including “WePresent WiPG-1000 Wireless Presentation systems, and in LG Supersign TVs … as well as new credentials to use in brute force against devices.” You can read more at www.securitysa.com/*mirai2 (redirects to https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/).

So now your projector and your TV can be weaponised against you. It really is time we forget about physical and logical security, IoT security and anything else security and focus on security. If it’s electronic, it’s a risk. That should be simple enough.

Remember Stuxnet (https://en.wikipedia.org/wiki/Stuxnet) malware was installed in a highly secure environment that was ‘air-gapped’ – another stupid word that means it had no electronic connection to the outside world. How hard could it be to get into your network, home Wi-Fi or campus?

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From the editor's desk: Interesting times
Technews Publishing News & Events
We certainly live in interesting times. From delaying the budget speech because the ANC doesn’t see any reason why VAT shouldn’t be increased by 2%, to crime fighters being set up and prosecuted in ...

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Bosch sells product business to Triton
Bosch Building Technologies News & Events Products & Solutions Facilities & Building Management
Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The division is set to focus on systems integration business in the future.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
The human element remains the cornerstone of success
News & Events
Gallagher Security, has unveiled its Security Industry Trends Report 2025, offering insights into the rapid evolution of security systems and the broader role they play in business operations worldwide.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
The IoT trends shaping a smarter, more connected future
IoT & Automation News & Events
The Internet of Things (IoT) is revolutionising sectors across Africa. In 2025, IoT is expected to continue driving digital innovation, enhancing operational efficiencies, and enabling the creation of smarter, more sustainable ecosystems.

Read more...
New AI advisor for robot selection
News & Events Industrial (Industry) AI & Data Analytics
Igus’ new AI chatbot has been added to its online platform to enable companies with little previous experience and technological expertise to quickly and reliably put together Low-Cost Automation (LCA) solutions to become more competitive.

Read more...
On the ball or unaware
Technews Publishing Information Security Security Services & Risk Management
Whether an organisation is operating at a high level of information security maturity or has dangerous vulnerabilities that could put an entire business at risk, advanced, strategic penetration testing can uncover its true state of IT security.

Read more...