In recent times, much has been made of the importance of security when it comes to Internet of Things (IoT) devices, with efforts being made to improve protections in place on this equipment.
Indeed, the UK government recently pledged £70 million in additional funding to ensure future IoT hardware is secure by design. However, new research suggests it is not only the devices themselves users have to worry about.
A study by researchers at Brazil’s Federal University of Pernambuco and the University of Michigan has found that the apps used to control IoT gadgets may often be the weak point.
It looked at 32 popular smartphone apps used to configure and control the 96 top-selling Wi-Fi and Bluetooth-enabled devices sold on Amazon, and found half of them had some form of security weakness that could allow hackers to access data or take control of devices.
For instance, almost a third of apps (31 per cent) had no encryption protection at all, while a further 19 per cent had hard-coded encryption keys an attacker might be able to reverse engineer even if they’d been obfuscated.
To test the security of the IoT apps, the researchers developed proof of concept attacks to be used against five devices that were controlled by four apps – TP-Link’s Kasa app used with multiple devices; LIFX app used with that company’s Wi-Fi-enabled light bulbs; Belkin’s WeMo for IoT; and Broadlink’s e-Control app.
Three of these apps had no encryption, while three communicated riskily via messages that would allow an attacker to monitor the nature of app-device communication.
“Based on our in-depth analysis of four of the apps, we found that leveraging these weaknesses to create actual exploits is not challenging,” the team wrote. “A remote attacker simply has to find a way of getting the exploit either on the user’s smartphone in the form of an unprivileged app or a script on the local network.”