Cracker takes control of 200 rooms in Chinese hotel

Blinds go up, blinds go down, hotel manager has no idea why

Security for virtualized datacentres

Black Hat 2014 A security consultant staying in the St Regis hotel in the Chinese city of Shenzhen got bored one night and successfully commandeered the controls of 200 rooms thanks to an insecure automation protocol.

Jesus Molina, a former chair of the Trusted Computing Group and independent security consultant, was staying in the hotel and started playing around with the in-room iPad which was used to control the lights and blinds. Each room has its own iPad and Molina started thinking about how the system worked.

Firstly he noticed that the version of iOS running the in-room iPad wasn't locked down, and that it used the hotel’s guest internet service to communicate with the fixtures and fittings. He also spotted that the automation commands used a protocol called KNX/IP.

KNX/IP was originally put together in 1990 and has no security settings. Yet it is the standard for hotel device automation in China and is also widely used in Europe. A new version with some security built in has been developed but most users haven’t updated.

One possible reason for this is that KNX/IP claims to be an open standard, but the documentation on how to use it costs €1,000, Molina said. Since he didn't have that kind of cash lying around Molina decided to do some digging of his own.

By examining the system he discovered that simply by changing the last digit of a devices IP address he could take over another device. He then wrote a script on the iPad which appeared to map out the IP addresses for lights and blinds in 200 rooms.

To test out his theory Molina called the front desk, said he wasn't happy with his room and asked to be moved to a new one. After doing this four times (earning a stern talking to from the hotel manager) he got a good enough read to map out the hotel’s network.

"I thought about looking to see if a similar system controlled the door locks but got scared," he told his audience at the Black Hat hacking conference.

Molina then got in touch with the St Regis' parent company and informed them of the flaw. The system has now been fixed, he said, put plenty of other hotels might be vulnerable. ®

Beginner's guide to SSL certificates


Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.