Bitcoin virus is ravaging the world: smart homes become "high-risk" objects

The weekly effect of the Bitcoin virus incident that broke out on May 12th in OFweek smart home network still raged on the Internet. The outbreak of the ransomware attack in countries including the United Kingdom, Italy, Russia and other countries is only paid high. The amount of ransom can be recovered. Once the overdue payment is not paid, the information will be permanently destroyed.

According to the “Daily Mail”, at least 19 NHS medical institutions in England and Scotland were under cyber attacks, including hospitals and GP clinics.

Some experts said that with the arrival of workdays on Monday, more computers will be turned on, and the extortion virus will come back.

However, in fact, in the network world in which the hacker stalks, as long as the networked devices can basically be determined to be insecure. However, while the bitcoin virus raged, a group of white-hat hackers from around the world gathered in the 2017 international security geek contest in the great mid-game, in a thrilling crack contest is ongoing.

As the world’s first maritime security geek contest, GeekPwn challenges all the loopholes in the smart sector, covering all areas of smart life such as smart travel, smart homes, smart phones, and smart watches.

Shared bikes are hot? Hackers come to give you a warm

The colorful shared bicycles gather in the streets of major cities in China. This kind of hot weather has been going on since 2016, and the heat has not diminished but has continued to heat up. But nowadays, shared bike companies have to pay attention, because every car riding on the street may have become the target of hackers.

As the only woman hacker "tyy" in this contestant, the attack target was locked in the shared bicycle. At the competition site, the “tyy” exploit vulnerabilities successfully obtained private information such as the shared bicycle account number, balance, and ride record of the judges’ teachers. They were unlocked by the judge’s shared bicycle account through the off-site connection and used for riding.

In this way, the judges who were present were physically still, but it was so inexplicable that they crossed to Shanghai to ride.

Female hacker "tyy" cracked shared bike.

As a non-college-trained player, “tyy” loves to delve into security technology in his spare time, and finds 4 loopholes in shared bicycles in just one month, and has reached the stage of GeekPwn.

Of course, in addition to sharing bicycles, the millet balance car related to the "car" was shot. Rainman from Anheng Haite Lab has locked its target on another smart travel device: the Xiaomi 9 balance car. The hacker used a combination of vulnerabilities to connect the balance car via computer's bluetooth. By running the script on the computer, the password could be bypassed, and the balance car could be fully controlled by the program script so that it could not be moved and shut down.

However, the players also stated that the loopholes discovered this time apply to the unmanned state and cannot be remotely controlled when someone is on the balance car.

The watch you are wearing is most likely an eavesdropper.

In fact, the smart watch has been born for many years, it was once retreated to the cusp of capital, but if you are wearing a smart watch, then it is very likely that someone is eavesdropping on your whereabouts.

The senior security engineer "Little Grey" from Baidu revealed the flaws in the current mainstream children's smart watches, such as Xiaogeng and Mi Jiaxiao, in the 2017 International Security Geek Competition. These high-risk vulnerabilities not only result in the leakage of sensitive information from children and parents, but can also be used to make configuration changes, signal hijackings, or even full control.

The smart watch was cracked at the scene and became a bug.

The small gray live demonstration of the security risks of children's smart watches:

The first type of attacker used various vulnerabilities in the communication protocol of the children's watch to successfully control the watch on the computer side: for example, to modify the existing contact number in the watch, replace the mobile phone number under the father's name with its own mobile phone number, and completely disable the watch. Causes the child's watch to interact with the parent's APP and change any APP that is bound to the watch;

The second type of attack is the signal hijacking initiated by the defect of the one-way authentication mechanism of the mobile communication GSM system: the child dials the father's number on the watch, and the person who received the call is the little gray person himself.

Little Gray introduced that currently children's smart watches on the market still only support 2G networks, and the GSM system for mobile communications has the drawback of a one-way authentication mechanism. It was precisely through the modification of the relevant parameters of the GSM broadcast channel that the small grey grays achieved automatic attachment, enabling the hijacking and analysis of voice and data signals.

In the future, the middleman method of GSM, especially GPRS, will greatly expand the attack surface of a large number of smart devices, including vending machines, shared bicycle locks, and industrial acquisition equipment.

In addition, smart homes with smart properties and smart watches have also been "hacked" by hackers. Xie Haikuo and Huang Zheng from Baidu Security Lab used the door lock communication protocol to successfully obtain the unlock password without physical contact and without remote unlocking the door lock.

It is worth mentioning that Guojia Smart Door Lock is the smart lock brand that is currently used in China and is used by a number of apartment brands. It has announced that its number of users has exceeded 1 million at Jingdong Self-operated Stores.

What makes your smart home completely out of control? The players from the SeeSnow hardware team used the vulnerability of the intelligent doorbell and cloud communication protocols to not only make the smart doorbell ring a “strange noise” but also took over a series of smart home devices across the public network.

For hackers, no matter where in the world, a network cable can control all the smart devices connected to his cloud platform.

"Mobile zombies" from the "biochemical crisis" in the online world

If the above hacked products are not enough to make you speechless, then the Wombie Attack, a new mobile security threat model from Tencent Xuanwu Lab X Interest Group, is enough to make you stand out.

Wombie Attack technology spreads through the geographical location of infected people. It is similar to the plot of zombie-themed movies. People who are bitten by zombies turn into zombies and will go to bite other people.

Tencent Xuanwu Laboratory "X Interest Group".

Wombie Attack can not only achieve infectious attacks, and the attack process does not rely on the Internet, so it can not even detect attacks from the network level. The player demonstrated in the field a mobile phone A to invade a nearby mobile phone B and transform the mobile phone B into a new attacker. Then mobile phone B will automatically intrude phone C when it is close to mobile phone C and steal the data in C. When B returns to A again, A gets the data stolen from C again from B.

how about it? From the Internet, the attack is not dependent on the Internet, but it can be attacked at any time to obtain your data and information. Is it scary?

The popularization of smart life has indeed brought convenience to users, but at the same time, it has also given attackers a door to control you. This is how painful each netizen comprehends.

ZGAR Vape Device 1.0

ZGARVAPE

Zgar 2021's latest electronic cigarette Aurora series uses high-tech temperature control, food grade disposable pod device and high-quality material.Compared with the old model, The smoke of the Aurora series is more delicate and the taste is more realistic ,bigger battery capacity and longer battery life. And it's smaller and more exquisite. A new design of gradient our disposable vape is impressive. We equipped with breathing lights in the vape pen and pod, you will become the most eye-catching person in the party with our atomizer device vape.

The 2021 Aurora series has upgraded the magnetic suction connection, plug and use. We also upgrade to type-C interface for charging faster. We have developed various flavors for Aurora series, Aurora E-cigarette Cartridge is loved by the majority of consumers for its gorgeous and changeable color changes, especially at night or in the dark. Up to 10 flavors provide consumers with more choices. What's more, a set of talking packaging is specially designed for it, which makes it more interesting in all kinds of scenes. Our vape pen and pod are matched with all the brands on the market. You can use other brand's vape pen with our vape pod. Aurora series, the first choice for professional users!

We offer low price, high quality Disposable E-Cigarette Vape Pen,Electronic Cigarettes Empty Vape Pen, E-cigarette Cartridge,Disposable Vape,E-cigarette Accessories,Disposable Vape Pen,Disposable Pod device,Vape Pods OEM vape pen,OEM electronic cigarette OEM e-cigarette OEM e-cig to all over the world.


E99851b2412a4680Fd007a700833698aA6464f91068167c4

E-Cigarette Vape Pen,Disposable Device Vape,Vape Pen Atomizer,Latest Disposable E-Cigarette OEM vape pen,OEM electronic cigarette

Shenzhen WeiKa Technology Co.,Ltd. , https://www.zgarvapor.com

This entry was posted in on