Feeds

Hey, does your Smart TV have a mic? Enjoy your surveillance, bro

Little reminder: Your shiny new telly is a computer, it can run malware

Using blade systems to cut costs and sharpen efficiencies

NSA whistleblower Edward Snowden told lawyers he met during his sojourn in Hong Kong to put their cell phones in his fridge to thwart any eavesdroppers.

But new research suggests he should have been worried about nearby TVs, too.

Smart tellies with built-in microphones and storage can be turned into bugging devices by malware and used to record conversations, security experts at NCC Group said. And they demonstrated exactly that just down the road from the Infosec Europe conference, held in London.

"Installing the bugging software requires physical access to the device, which is how we did it, or by installing a malicious app," said Felix Ingram, principal consultant at NCC Group.

"Malicious apps could be downloaded from the manufacturer’s app store. The TV does have the option for auto-updating, so releasing a legitimate app, then releasing a malicious update, is another attack vector."

In other words, Ingram's research shows smart TVs can be abused in much the same way that dodgy apps on Android software stores hijack smartphones and tablets.

In the NCC demo, the internal storage of a smart TV was used to hold 30 seconds of audio, but a far longer buffer could be set up. The main limitation of the attack is getting malicious code onto vulnerable devices in the first place, as Ingram noted.

"The devices contain microphones and cameras that can be utilised by applications, Skype and similar apps being good examples," Ingram told El Reg.

"The TV has a fairly large amount of storage, so would be able to hold more than 30 seconds of audio – we only captured short snippets for demonstrations purposes. A more sophisticated attack could store more audio locally and only upload it at certain times, or could even stream it directly to a server, bypassing the need to use any of the device’s storage.

TV builders have released source code that makes developing malware a little easier

"There is nothing specific about them running Linux that makes the hacking any easier, though some manufacturers have released some of their source code, which could make developing applications for the devices a little easier."

The smart TV hacking was part of a demonstration by NCC experts to highlight security shortcomings on the home front of the Internet of Things. Broadband routers and Wi-Fi-controlled power plugs were also attacked, and a smartphone with NFC wireless radio was used in an attempt to clone a hotel room access card.

Whatever cryptography was used by the hotel system, it was able to thwart the cloning software, thankfully.

The Wi-Fi plugs came with a default password, but without clear instructions on how to change this: users have to download and run an executable to do this, but the software presents an alarming warning that any cock-ups will brick the device.

"To update or change the firmware is too complicated," noted Paul Vlissidis, technical director of NCC Group, in something of an understatement.

Software vulnerabilities and weak configurations made it easy for NCC staffers to break into home routers. Folks using compromised broadband gateways could be directed to servers under the control of crims, allowing the crooks to intercept sensitive e-banking or webmail usernames and passwords, for instance.

As for internet-connected coffee makers and such gear, compromising that kit provides a stepping stone into a home network for a criminal. Seemingly innocuous devices can be chained together to attack the home of the future, we were told.

Net-connected devices are designed with price and functionality in mind rather than security, it seems. "Interoperability trumps security every time," Vlissidis concluded. ®

Boost IT visibility and business value

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.