Hackers’ Next Target: Smart Toys

Smart toys were a popular gift item this holiday season, but they present serious cyber security vulnerabilities.

Cyber criminals don’t care who they hurt. This was made obvious during the rash of ransomware attacks on healthcare facilities this year, where hackers locked down electronic health records systems, putting patients at grave risk. There is great concern that the proliferation of Internet of Things (IoT) medical devices, such as smart insulin pumps, will enable hackers to go after patients directly, demanding that they pay a ransom to keep their lifesaving devices working. Now, a new threat is emerging: The opportunity for hackers to target children for identity theft by exploiting vulnerabilities in internet-connected smart toys, which were all the rage this holiday season.

Smart Toys and Child Identity Theft

When most people think of identity theft, they imagine hackers stealing adults’ personal data. However, child identity theft is a serious and growing problem that existed even before the introduction of smart toys. A study commissioned by the Identity Theft Assistance Center in 2012 found that 1 in 40 U.S. households with minor children (under age 18) have at least one child whose personal data has been compromised.

Child identity theft is particularly insidious. Child identities can be worth more than adult identities on the black market because thieves can operate under them for years before being detected. An adult may discover that their information has been compromised fairly quickly; say, after their credit card company flags suspicious activity on their card. Child victims, on the other hand, may have no idea their identities have been stolen until they apply for their first job, try to obtain a college scholarship, or attempt to rent their first apartment, only to find that their credit has been ruined before they can even begin building it.

The attraction of smart toys is that they offer a personalized interactive experience, such as dolls that can talk to children by name and remember their birthdays. However, this interaction is made possible by the toy connecting to the internet, just like all other IoT devices, so any information the child or parent gives to the toy – the child’s name, address, and birth date, or the parents’ credit card information – is transmitted over the internet. And, just like all other IoT devices, there are serious questions as to the security of the information smart toys collect and store.

These concerns are not hypothetical. In 2015, hackers breached servers owned by VTech, a manufacturer of smart toys and baby monitors, compromising the personal data of over 5 million parents and about 200,000 children. Senator Bill Nelson (D-FL) cited the VTech breach, as well as security vulnerabilities in other children’s IoT devices, when he called on the Federal Trade Commission to “carefully monitor” smart toys and demanded that manufacturers of these devices properly secure them.

Securing Smart Toys

Some consumer groups are advising that parents steer clear of smart toys until manufacturers can ensure they are secure. In the meantime, if you have purchased a smart toy for your child, you should take the following precautions:

  • Immediately change the toy’s default login credentials.
  • Limit the amount of information the toy can collect on your child – and on you, as parents’ data is also at risk. Do not give the toy any sensitive personal data, such as addresses or birth dates, and turn off geo-tracking features.
  • Do an internet search on the toy’s manufacturer. If they have already experienced a data breach, consider returning the toy to the store.

Smart toy manufacturers have a responsibility to their customers and the public at large to prevent their products from becoming vehicles for child identity theft. Lazarus Alliance agrees with Senator Nelson’s suggestions for smart toy manufacturers, which include the following proactive measures:

  • Build strong cyber security into smart toys from the start. Cyber security should be an integral part of a smart toy’s software development lifecycle, not an afterthought.
  • Limit the amount of data smart toys collect to only that which is necessary for the toy to operate.
  • Retain customers’ personal data only for as long as absolutely necessary.
  • Continually reassess the threat landscape and reevaluate the cyber security of individual toys, as cyber threats morph and change over time.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help your organization secure your systems.

The 6 Data Breaches that Defined 2016

As the year comes to a close, we take a look back at six data breaches that dominated the headlines and defined the state of cyber security in 2016.

It could be said that 2016 was the “Year of the Hacker.” From healthcare to politics to adult entertainment, no industry was spared the wrath of cyber criminals. Here, we reflect on six of this year’s most infamous data breaches.

As the year comes to a close, we take a look back at six data breaches that dominated the headlines and defined the state of cyber security in 2016.

1. The SWIFT Network Attacks

It was a plot that sounded like it came straight out of a Bond movie: A band of international bank robbers stole nearly $100 million from a bank in Bangladesh, spooking finance executives around the world and leaving them wondering where the thieves would strike next. But these robbers didn’t hand a note to a teller or dynamite their way into a vault; they breached the victimized banks’ networks and accessed their accounts on the SWIFT network, a proprietary messaging system that few people outside the finance industry have ever heard of. Once inside SWIFT, they were able to remotely send billions of dollars in fraudulent money transfer requests. Most of these were caught and flagged, but $81 million went through, and the hackers remain at large. These data breaches sent shockwaves through the finance world and threw into question the integrity of what was once thought to be one of the world’s safest networks.

2. The Yahoo Data Breach

The Yahoo data breach, which compromised 500 million user accounts, resulted in at least 23 lawsuits, and put the company’s planned acquisition by Verizon at risk, didn’t happen out of nowhere. It was the result of years of the company putting cyber security on the back burner in the name of not compromising “the user experience.” Other companies should look to Yahoo as an example of what can happen – in fact, what is bound to eventually happen – when information security is not taken seriously. While it’s true that end users of software products can be fickle and impatient, it is far better to risk annoying customers with product security measures than to leave their personal information open to data breaches.

3. The DNC Hack

Cyber security took center stage early on in this year’s contentious U.S. presidential election, and the Democratic National Committee became the poster child for embarrassing email data breaches. In June, WikiLeaks released a number of damaging emails stolen from the DNC’s email server. Among the “highlights” were what appeared to be messages written by high-ranking party officials plotting to smear candidate Bernie Sanders and planning to reward high-dollar DNC donors with federal appointments in an anticipated Hillary Clinton administration. As if that weren’t bad enough, some of the emails compromised these same donors’ private data, with one email attachment containing an un-redacted image of a six-figure check, complete with the donor’s routing and bank account numbers. The hack was so scandalous that the DNC’s chairperson, CEO, and communications director were forced to resign.

4. The FriendFinder Data Breaches

Apparently, last year’s Ashley Madison data breach didn’t teach companies that store sensitive information to be adults about data security. In October, news broke that six sites owned by FriendFinder Networks, Inc., owners of some of the world’s largest adult entertainment sites, had been hacked. Over 412 million user accounts were compromised, most of which came from a site called AdultFriendFinder, which bills itself as the “World’s Largest Sex and Swinger Community.” In addition to users’ email addresses and passwords – which had been stored as plain text or hashed and converted to all lower-case, making them far easier to compromise – hackers also got hold of the company’s source code and private/public key pairs. As of this writing, the FriendFinder hack is set to win the “award” for the largest data breach of 2016.

5. The Wendy’s POS Hack

Where’s the cyber security? Around the same time fast-food chain Wendy’s announced it would be switching from human clerks to automated ordering kiosks, the company was forced to admit that it had been victimized by a massive breach of its existing POS systems, which exposed customer credit card information captured at 1,000 of its locations in the U.S. Rather than taking responsibility for the data breaches, Wendy’s decided to pass the buck, insisting that “only” independently owned franchises, not company-owned locations, had been breached, and further claiming that the breaches were the fault of third-party POS service providers hired by its franchisees. This spin-doctoring didn’t dissuade dozens of credit unions from joining a class-action lawsuit against the chain, alleging that Wendy’s knew that its POS systems were not secure but did nothing to address the problems.

6. The Hollywood Presbyterian Medical Center Ransomware Attack

While it was not technically a data breach, we felt we would be remiss if we did not mention the infamous Hollywood Presbyterian ransomware attack, which happened early in the year and was a harbinger of things to come for the healthcare industry. Hackers managed to lock down the hospital’s entire network, including its electronic health records (EHR) system. Hollywood Presbyterian ended up forking over $17,000 in Bitcoin to get back in – an act which, unfortunately, emboldened hackers, who now knew they could easily extort big paydays from healthcare facilities. A spate of similar attacks hit medical facilities across the U.S., Canada, and even the U.K. As of this writing, Intel estimates that hospitals have paid various hackers nearly $1,000,000 in ransom this year.

Here’s hoping that 2017 is the year the “good guys” finally get the upper hand in the fight against data breaches, ransomware, and other cyber crimes.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help your organization secure your systems.

Proactive Cyber Security Can Prevent Vote Hacking

In a heated political climate, even the appearance of vote hacking could threaten our nation’s democracy.

The most contentious issue this election season may not be immigration or minimum wage laws but cyber security; specifically, the specter of vote hacking. Shortly after the discovery that the Democratic National Convention’s email server had been hacked came news that voter databases in Illinois and Arizona had been compromised, exposing the personal information of as many as 200,000 voters.

Proactive Cyber Security Can Prevent Vote Hacking

Granted, these were state voter databases, not voting machines. However, between GOP candidate Donald Trump suggesting that the election could be “rigged” and going so far as to encourage his supporters to “monitor the polls” for vote hacking, disturbing results from recent studies on voting machine cyber security, including one by Princeton researchers that found some machines to be less secure than iPhones, and another study showing that nearly all Americans are “unsettled” about data breaches in general, the American public is understandably nervous as they prepare to go to the polls.

Vote hacking isn’t an Area 51-style conspiracy theory; it is a legitimate concern that must be addressed with proactive cyber security.

Could the election be hacked?

In theory, yes. Many states use voting machines that are more than 15 years old, run wildly outdated operating systems such as Windows 2000 and XP, and, in some cases, provide no paper audit trail. Some election officials argue that these machines are generally not connected to the internet, and are therefore secure. However, isolation from the internet does not equate to security against voting hacks; malware could be installed via an infected thumb drive inserted into a machine by an intruder, a malicious insider, or even an unwitting election volunteer who fell victim to a social engineering scheme. While the logistics of manually installing malware may appear insurmountable – after all, there are tens of thousands of voting machines across the U.S. – hackers would not have to access every voting machine in America to alter the election results. They could focus their efforts on swing states, and then zero in even further to target specific voting districts where the results are expected to be very close.

Hackers could also decide not to actually tamper with votes but simply cause enough chaos to discourage some Americans from voting and plant seeds of doubt regarding the election results. For example, hackers could breach voter databases and delete or alter voter registration records, which would prevent some voters from being able to cast ballots; launch Election Night DDoS attacks on polling places that use the internet to verify voter records; or even disable media feeds and prevent news networks from accessing exit poll information and election returns.

What can election officials do to reassure the public about vote hacking?

In an effort to address the public’s concerns, Rep. Hank Johnson (D-Ga.) recently proposed the Election Integrity Act of 2016 and the Election Infrastructure and Security Promotion Act of 2016. The first bill would impose cyber security measures on voting machines, such as prohibiting the machines from being connected to the internet and requiring that they be subject to regular audits, updated frequently, and have the ability to produce a paper audit trail. The second bill would designate voting machines as part of the nation’s critical infrastructure, which would put them under the purview of the Department of Homeland Security and ensure that voting machines are treated with the same level of seriousness as the country’s power grid and water supply.

While these bills are a good starting point to address vote hacking, more needs to be done, and since the election is only a month away, election officials need to act now. In addition to voting machines themselves, voter databases and polling places must be secured. Since election officials are not information security experts, the help of qualified cyber security professionals should be enlisted to secure voter databases and polling places and ensure that Election Night is uneventful from a cyber security perspective.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help your organization secure your systems.