• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   iiot

Hacking LED Wristbands: A ‘Lightning’ Recap of RF Security Basics

  • Posted on:September 13, 2019 at 5:02 am
  • Posted in:Internet of Things
  • Author:
    Trend Micro
0

We’re always eager for new research and learning opportunities, but this time, serendipitously, the opportunity found us. At the closing party of the Hack In The Box Amsterdam conference — where we presented our industrial radio research and ran a CTS contest — we were given LED wristbands to wear. They’re flashing wristbands meant to enhance the experience of an event, party, or show. At the beginning, we were not interested in the security impact; we just wanted to learn. Later on, however, we discovered that the RF link was used to transport an industrial protocol: DMX512 (Digital MultipleX 512), the same protocol used to pilot large light exhibitions.

Read More
Tags: iiotIOTradio frequencyRFIDSoftware Defined Radio

IoT Attack Opportunities Seen in the Cybercrime Underground

  • Posted on:September 10, 2019 at 2:37 am
  • Posted in:Internet of Things
  • Author:
    Trend Micro
0

We looked into IoT-related discussions from several cybercrime underground communities and found discussions ranging from tutorials to actual monetization schemes for IoT-related attacks. For this entry, we provide an overview of what cybercriminals see as perfect openings for attacks on IoT technologies.

Read More
Tags: cybercrime undergroundiiotindustrial internet of thingsinternet of thingsIOT

Malware in Smart Factories: Top Security Threats to Manufacturing Environments

  • Posted on:April 3, 2019 at 4:56 am
  • Posted in:Internet of Things
  • Author:
    Trend Micro
0

We tackle the top malware detections in manufacturing networks, based on data from the Trend Micro™ Smart Protection Network™ infrastructure, review the common security threats to the manufacturing industry, and discuss how cybersecurity can be improved.

Read More
Tags: iiotipitmanufacturingot

Demonstrating Command Injection and E-Stop Abuse Against Industrial Radio Remote Controllers

  • Posted on:January 15, 2019 at 5:37 am
  • Posted in:Internet of Things, Vulnerabilities
  • Author:
    Trend Micro
0

In our research, we found that it is possible to perform attacks within or out of RF range. For remote attackers out of the transmission range, there are two possibilities: be a truly remote attacker and do a computer-borne attack (that is, to take control of a computer used to software-program or -control the RF devices), or have temporary physical access to the facility to drop a battery-powered, pocket-sized embedded device for remote access. As a proof of concept (PoC), we developed such a device to show the feasibility.

Read More
Tags: iiotradio frequencyRF

Machine-to-Machine (M2M) Technology Design Issues and Implementation Vulnerabilities

  • Posted on:December 4, 2018 at 5:02 am
  • Posted in:Internet of Things, Vulnerabilities
  • Author:
    Federico Maggi (Senior Threat Researcher)
0

We delve into the protocol security issues that may crop up from a technology perspective. The scarce awareness that we’ve observed around the current state of MQTT and CoAP can enable attackers in achieving their goals, ranging from reconnaissance and lateral movement to remote control and targeted attacks.

Read More
Tags: CoAPiiotM2MMQTTprotocols
Page 1 of 212

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.