Hackers can use Ransomware to attack and control robots
IOActive, an American security consulting firm, recently launched an attack to prove that hackers can not only use ransomware to attack computers to make ransom, but also attack complex robot systems. are being used in many areas. This causes disruption of robot-based operating environments that severely damage businesses.
The data processed by the robot is in a "moving" state, ie the robot receives information, processes information and sends information back to the source. This data can be a guide to the implementation of tasks and payments customers receive .
According to IOActive experts, the attack is based on how the robot processes data and can target critical robot software elements that make them inoperable and ransom. To demonstrate this hypothesis, experts have tried to attack NAO, a robot widely used in research and education with over 1,000 devices operating globally. It has the same operating system and vulnerabilities as Pepper's SoftBank, the business-oriented robot with more than 20,000 components in more than 2,000 businesses.
Experts have used an unrecorded function that allows anyone to execute remote commands to disable administrative features, change the default functionality of the robot, route all Video and audio streams to a remote server. Next, they proceed to enhance user preferences, disrupt the entire reset mechanism, and poison all behavioral files.
The attack can possess robots and make them extremely dangerous. Not only did the disrupted services cause financial damage, but it even made robots send objectionable content to customers, even enforcing violent acts.
If attacked, the only solution is to surrender by resetting the entire robot system or adjusting hardware and software that are not cheap but also take a long time, up to several weeks. Compared to the cost of repair, the ransom payment is still cheaper.
See more:
- Warning: A new code of virtual money training is spreading strongly in Vietnam
- Hackers are using new Microsoft Office vulnerabilities to distribute malware
- Discovered a group of hackers who use secret code to spy on 21 countries
You should read it
- 10 robots have succeeded in proving they are new generation animals
- Top 5 biggest ransomware attacks in 2021
- Ransomware can encrypt cloud data
- Kaseya suffered a ransomware attack, affecting a series of other technology companies
- Learn about Ransomware: 6 ransomware on computers
- Detecting two unusual versions of ransomware, shows that the world of ransomware has become diversified
- New firefighting robots are put into testing
- How Can Zero-Trust Security Prevent Ransomware Attacks?
May be interested
- What is Smurf Attack? How to prevent Smurf Attack?smurf attack is a type of ddos attack, hackers will attack the victim's server by sending fake ip requests using internet control message protocol to create fake accesses that overload the target device or network.
- Ransomware turns 35, how terrible was the world's first attack?the 'aids' floppy disk is credited as the world's first ransomware attack.
- How Can Zero-Trust Security Prevent Ransomware Attacks?the zero-trust model requires strict identity verification with all users and devices before granting them access to resources, regardless of whether they are in or out of the network.
- 7 kinds of ransomware you didn't expectmost people know the process of making a ransomware, which is why ransomware creators are always looking to find and create new ransomware to make you pay. here are some new ransomware you should know.
- Ransomware can attack the CPU, not just the operating system: How to prevent it?ransomware is a serious problem in its current state and is only going to get worse. any security programs and measures will be rendered useless when ransomware attacks the cpu.
- Learn about Ransomware: 6 ransomware on computerswhat is ransomware? are there any other ransomware? how does ransomware attack computers and demand ransom from users?
- Detecting two unusual versions of ransomware, shows that the world of ransomware has become diversifiedinternational cybersecurity researchers recently found two completely new types of ransomware that are quite strange. they carry very different and rarely recorded features, which are the alarm bells, showing that the world of ransomware has become diverse.
- Chinese hackers use ransomware as bait to hide cyber espionagetwo chinese hacker groups are carrying out cyber espionage campaigns and stealing intellectual property from japanese and western companies. to cover up their espionage, these groups of hackers pretend they're spreading ransomware.
- Shade ransomware, the nightmare of 5 years ago is showing signs of returningshade ransomware - extortion code recorded by kaspersky labs disappeared from the internet five years ago, 2014, showing signs of returning again.
- What is 51% attack? How does 51% attack work?the 51% attack refers to a potential attack on the integrity of the blockchain system, in which a single malicious actor or organization tries to control more than half of the network's total hash power, .