Hackers can use Ransomware to attack and control robots
IOActive, an American security consulting firm, recently launched an attack to prove that hackers can not only use ransomware to attack computers to make ransom, but also attack complex robot systems. are being used in many areas. This causes disruption of robot-based operating environments that severely damage businesses.
The data processed by the robot is in a "moving" state, ie the robot receives information, processes information and sends information back to the source. This data can be a guide to the implementation of tasks and payments customers receive .
According to IOActive experts, the attack is based on how the robot processes data and can target critical robot software elements that make them inoperable and ransom. To demonstrate this hypothesis, experts have tried to attack NAO, a robot widely used in research and education with over 1,000 devices operating globally. It has the same operating system and vulnerabilities as Pepper's SoftBank, the business-oriented robot with more than 20,000 components in more than 2,000 businesses.
Experts have used an unrecorded function that allows anyone to execute remote commands to disable administrative features, change the default functionality of the robot, route all Video and audio streams to a remote server. Next, they proceed to enhance user preferences, disrupt the entire reset mechanism, and poison all behavioral files.
The attack can possess robots and make them extremely dangerous. Not only did the disrupted services cause financial damage, but it even made robots send objectionable content to customers, even enforcing violent acts.
If attacked, the only solution is to surrender by resetting the entire robot system or adjusting hardware and software that are not cheap but also take a long time, up to several weeks. Compared to the cost of repair, the ransom payment is still cheaper.
See more:
- Warning: A new code of virtual money training is spreading strongly in Vietnam
- Hackers are using new Microsoft Office vulnerabilities to distribute malware
- Discovered a group of hackers who use secret code to spy on 21 countries
You should read it
- 10 robots have succeeded in proving they are new generation animals
- Top 5 biggest ransomware attacks in 2021
- Ransomware can encrypt cloud data
- Kaseya suffered a ransomware attack, affecting a series of other technology companies
- Learn about Ransomware: 6 ransomware on computers
- Detecting two unusual versions of ransomware, shows that the world of ransomware has become diversified
- New firefighting robots are put into testing
- How Can Zero-Trust Security Prevent Ransomware Attacks?
May be interested
- Warning: 5 million Samsung, OPPO, Vivo smartphones ... are infected with malware and this is how to check and removea large-scale malware distribution campaign has just been discovered and it is affecting nearly 5 million smartphones of major brands worldwide including honor, huawei, xiaomi, oppo, vivo, samsung and gionee.
- Plugins on well-known editing tools can give hackers prioritythese tools are often extended with third-party plugins, but they often bring unpredictable dangers.
- Using HotSpot Shield for security or Facebook access? Your IP is at risk of being exposedand not only the hotspot shield alone, but also the purevpn and zenmate.
- The CredSSP vulnerability in the RDP protocol affects all versions of Windowsa serious vulnerability just found on the credssp protocol affects all versions of windows, allowing attackers to exploit rdp and winrm to steal data or run malicious code.
- New dangerous security vulnerabilities appear on iOS 11.2.6, can read messages without unlockingthe macmagazine page found a vulnerability in ios that makes siri easily read the message content without unlocking it.
- The last 9 years Firefox has not protected user passwords carefullya network security researcher recently discovered that during the past 9 years, firefox has stored user passwords with an outdated process.