{"id":11856,"date":"2018-03-26T12:30:21","date_gmt":"2018-03-26T20:30:21","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/03\/26\/news-5625\/"},"modified":"2018-03-26T12:30:21","modified_gmt":"2018-03-26T20:30:21","slug":"news-5625","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/03\/26\/news-5625\/","title":{"rendered":"A robot&#8217;s ransom"},"content":{"rendered":"<p><strong>Credit to Author: Julia Glazova| Date: Mon, 26 Mar 2018 13:00:37 +0000<\/strong><\/p>\n<p>Like most electronic stuff, robots are not immune to cybercriminals. Last year, researchers at IOActive detected as many as 50 vulnerabilities in robots developed by the Japanese firm SoftBank. They informed the manufacturer but never heard back. So this year at the <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/tag\/thesas2018\/\">Security Analyst Summit 2018<\/a>, they decided to demonstrate what can happen if a robot gets hacked.<a href=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2018\/03\/23073757\/hacking-robots-sas2018-featured.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/d1srlirzdlmpew.cloudfront.net\/wp-content\/uploads\/sites\/92\/2018\/03\/23073757\/hacking-robots-sas2018-featured-1024x672.jpg\" alt=\"\" width=\"1024\" height=\"672\" class=\"aligncenter size-large wp-image-21756\" \/><\/a><\/p>\n<p><strong><\/p>\n<h2>Hackable robots<\/h2>\n<p><\/strong><\/p>\n<p>Robots are all around us, toiling away in factories and <a target=\"_blank\" href=\"http:\/\/uk.businessinsider.com\/amazons-robot-army-has-grown-by-50-2017-1\">warehouses<\/a>, busting a gut in <a target=\"_blank\" href=\"https:\/\/techcrunch.com\/2013\/06\/21\/zenrobotics\/\">landfills<\/a>, and even working in <a target=\"_blank\" href=\"https:\/\/www.cnet.com\/news\/robots-give-a-helping-hand-in-san-franciscos-newest-hospital\/\">hospitals<\/a>. For its part, SoftBank Robotics supplies electronic helpers to work with people. The <a target=\"_blank\" href=\"https:\/\/youtu.be\/3G4v0hakLpM\">NAO<\/a> model introduces school kids and students to programming and robotics, and it also teaches children with autism. Another model, <a target=\"_blank\" href=\"https:\/\/youtu.be\/60j4rdWsAIQ\">Pepper<\/a>, was created to work in the service sector \u2014 its tasks include attracting potential customers and consulting with buyers.<\/p>\n<p>As the IOActive team discovered, to seize control of NAO you only need to be on the same network as the robot. The experts found vulnerabilities allowing commands to be remotely executed on it, effectively giving over full control of its actions.<\/p>\n<p>To demonstrate how these vulnerabilities can be exploited, the team forced NAO to <a target=\"_blank\" href=\"https:\/\/www.youtube.com\/watch?v=4djvZjme_-M&amp;feature=youtu.be\">demand<\/a> bitcoins from its human interlocutor; but real criminals would be limited only by their imagination and programming skills. What&#8217;s more, it&#8217;s not just NAO that can be infected with ransomware; the more business-oriented Pepper is just as vulnerable, and other models probably are as well.<\/p>\n<p><span class='embed-youtube' style='text-align:center; display: block;'><iframe  src='https:\/\/www.youtube.com\/embed\/4djvZjme_-M?version=3&#038;rel=1&#038;fs=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;wmode=transparent' width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/span><\/p>\n<p>Just imagine if one fine day a robot teacher or store clerk, in full view of John Q. Public, started swearing and insulting people before going on strike or picking a fight. You never know!<\/p>\n<p><strong><\/p>\n<h3>But why would anyone hack a robot?<\/h3>\n<p><\/strong><\/p>\n<p>What do criminals have to gain here? Won&#8217;t it just spoil someone&#8217;s day \u2014 or their life? That might be enough incentive for some hackers, who often do such things just for fun. But there&#8217;s another reason: money.<\/p>\n<p>The profit motive is pretty simple. Buying a robot costs about $10,000; and if it breaks, it has to be repaired or replaced. Both of those require a fair bit of cash to start \u2014 but factor in the downtime cost and reputational loss of having a robot threaten customers and the sum rises considerably. And if an <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/hacking-industrial-robots\/18152\/\">industrial robot<\/a> is hacked, it can pose an immediate threat to employee safety or production quality.<\/p>\n<p>An attacker compromising a robot in one of those ways might offer a quick solution to the problem (which they caused) \u2014 pay a ransom and everything will be just fine. But, as you might guess, cybercriminals don&#8217;t always keep their word. And, of course, the vulnerable robot might be hacked again, requiring another payout. And then another one.<\/p>\n<p><strong><\/p>\n<h3>What can you do?<\/h3>\n<p><\/strong><\/p>\n<p>Robots are here to stay (and multiply), so avoiding contact with them ain&#8217;t the way to go. For that, you&#8217;d need to invent a time machine and go back a ways. Instead, users \u2014 and especially manufacturers \u2014 need to be sensitive to robots&#8217; weaknesses.<\/p>\n<p>To ensure that devices don&#8217;t go from cutting-edge to catastrophic in the blink of an eye, robot creators need to think through security issues in advance, before production starts. Today. Better still, yesterday. And then, after product release, all ears must be kept firmly to the ground so as to respond promptly to reported vulnerabilities and get them fixed.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/hacking-robots-sas2018\/21755\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Julia Glazova| Date: Mon, 26 Mar 2018 13:00:37 +0000<\/strong><\/p>\n<p>Researchers investigate how vulnerabilities in robots can be exploited to take control of them.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[16465,6269,6145,11760,11761,12876,1331,17231,10438,10752],"class_list":["post-11856","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-thesas2018","tag-internet-of-things","tag-robots","tag-sas","tag-security-analyst-summit","tag-technologies","tag-technology","tag-the-sas-2018","tag-threats","tag-vulnerabilities"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11856"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11856\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11856"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}