Check Point Research recently discovered severe vulnerabilities in Smart Light Bulbs operated over the Zigbee IoT radio protocol. For more information visit, …
source
All About Home Tech
Check Point Research recently discovered severe vulnerabilities in Smart Light Bulbs operated over the Zigbee IoT radio protocol. For more information visit, …
source
http://keinsteinservices.com/kingshackers/
the much more exciting question is how the hackers could gain access to the light bulb before the firmware update
Follow the lates tweets on Internet of Things Security on Twitter: @IoTSecurity
What if you use a completely isolated router and phone? In other words, a router that is isolated and not connected to the network; only powered on and secured in conjunction with a spare phone that isn't connected to your real Gmail account.
This is why I have IoT devices on their own VLAN at the switch
đź‘‘
I’m assuming this is some sort of Windows 7 SP1 Eternal Blue exploit, built into a python script mimicking a “available” lightbulb. Also, I believe it requires you to send a deauth packet to a bulbs specific MAC address. Pretty cool concept, but not as effective, if the hub doesn’t maintain exploited firmware.
Where is the How to of Exploitation
What’s the “nano agent for IoT” at the end?
This attack could only be used on old ass computers.. As demonstrated Windows 7 if I'm not mistaken. EternalBlue is obsolite.
Huge benefit can get hacker form IoT things.
How attacker got control over the bulb?