Fish Tank Creates Gateway for Security Breach

Security Breach Executes From Fish Tank

The concept of smart devices leaving people and companies vulnerable for cyber attacks is nothing new.  However, hackers using a smart fish tank to breach the cyber security of an unnamed North American casino, is a first.

Hackers breached the fish tank, then scanned the system for any additional vulnerabilities.  After finding more security gaps, the hackers sent data to an account in Finland.  It was then, that the casino knew something was wrong and stopped the attack from going any further.

The data that was transmitted to Finland, is not being released.

Other Internet of Things (IoT) Devices Attacks

CNN reports,

“Last year, the Mirai botnet took control of smart home devices, like security cameras, all over the world, effectively turning them into zombie machines directing web traffic to take down popular websites like Netflix and Twitter.”

There have also been reports of smart televisions and smart cars being vulnerable to hackers.  The issue with IoT devices are, few security programs are compatible with these devices.  Another issue lies within the manufacturers.  The companies that make IoT devices (smart watches, televisions, fish tanks, cameras, cars, appliances, etc.) are focused more on the bottom dollar, instead of understanding the cyber security needs of creating a product with these functionalities.  These needs must be addressed sooner than later.

6,971 total views, 2 views today

(Visited 1 times, 1 visits today)

10 thoughts on “Fish Tank Creates Gateway for Security Breach

  1. Does a method or device exist that will verify data usage on a router or Wi-Fi hot spot? Can’t say I trust anyone that offers an unlimited 4G data plan only to find out later that only the first 10 GB are at 4G and the rest is a 3G speed from 650 KB per second to 0 KB per second.

  2. I started my IT career in August 1968 with the US Air Forces Strategic Air Command (SAC) and Control System when a 300 baud modem was high tech. It was secure because it didn’t share resources with other AF commands, TAC, MATS, AFCS, etc.
    Now we are required to use a common use highway, the internet. If you want to increase your security, don’t control your fish tanks from the same IP address you used for your casino.
    Common sense.

  3. Why is it that a so-called “smart fish tank” needs to be connected to the internal systems of the casino in the first place? The idea of this tank being available to monitor the composition of the water (salinity, chemical balance, etc) and the temperature remotely is somewhat useful. I don’t know why the any active inputs to the controls for the tank should be allowed in this case. A hacker could assert control over the control functions to kill all the fish. Of course this leads to a broader discussion that consumers need education into which of their own devices are vulnerable to attack. Recently, I had my internet connection company to the house to verify that I was receiving the speed I am paying to use. The technician was surprised to find that I had turned of SSID Broadcast and that I had given my SSID a strange name. He said no one he knew had done this small, but limited, security action.

  4. When will someone come up with a security system that operates at the router level? All devices connected to the router could be secure if such a system existed.

    • @Terry: Good point Terry. I am trying to relocate an article I read a few months back that addressed security at the router level. I recall the Chinese are working or should I dare say, copying and updating this level of security. Will share if found.

  5. Another reason I don’t want or need a smart TV, refrigerator or anything else like that in my house. Unfortunately that means hunting far and wide for dumb appliances……..

  6. Another reason I don’t want or need a smart TV, refrigerator or anything else like that in my house. Unfortunately that means hunting far and wide for dumb appliances……..

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.