Feeds

Smart TVs riddled with DUMB security holes

Fake content, snooping, LAN attacks and more

Combat fraud and increase customer satisfaction

It's been known for some time that “smart TVs” are dumb about security, but a German researcher has demonstrated that the stupidity goes so far as to enable remote snooping or even a takeover of the in-set computer.

Nruns researcher Martin Herfurt has taken work begun at the Darmstadt University of Technology to demonstrate a range of remote attacks on Samsung Hybrid Broadcast Broadband TVs – HbbTVs – that include WiFi eavesdropping, fake analytics, content redirection, fake news tickers, Bitcoin mining and more.

Herfurt's post describing the attacks, here, credits TU Darmstadt for demonstrating that MAC addresses and packet lengths sniffed from the TV's WiFi stream allow an eavesdropper to snoop someone's viewing habits.

More entertaining, however, is the number of ways an attacker could redirect the viewing of a victim, because the smart TVs use an embedded Web browser – in the case of Samsung, complete with Javascript support and WebKit 1.1 compatibility – which among other things reads HTML embedded in DVB streams.

This, Herfurt writes, makes it trivial for an attacker to inject their own URLs into the stream, or use DNS attacks to redirect the TVs to their own content. He also noted that none of the broadcasters using HbbTV capabilities are doing so over SSL, allowing content spoofing.

All of these attacks suggest other, even more malicious, possibilities: “Once attackers managed to redirect the HTTP requests of the TV to controlled sources, many different HTML-/Javascript-based attacks become possible,” he writes.

And yes, those attacks include Bitcoin mining – although The Register presumes you'd need a lot of televisions to get anywhere – because one of Herfurt's collaborators, Matthias Zeitler, demonstrated dropping the Javascript-based BitcoinPlus onto an attacked TV.

Finally, Herfurt notes, the presence of the Javascript XmlHttpRequest object in the TVs provides a vector for a number of attacks on the LAN the device is attached to. He suggests that TV manufacturers do more work to make the browsers secure and configurable by users. ®

SANS - Survey on application security programs

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.