Financial
systems
Web sites and apps that
accept or store credit card numbers, brokerage accounts, and bank account
information are prominent hacking targets, because of the potential for
immediate financial gain from transferring money, making purchases, or selling
the information on the black market. In-store payment systems and ATMs have
also been tampered with in order to gather customer account data and PINs.
Utilities
and industrial equipment
Computers control functions
at many utilities, including coordination of telecommunications, the power grid,
nuclear power plants, and valve opening and closing in water and gas networks.
The Internet is a potential attack vector for such machines if connected, but
the Stuxnet worm demonstrated that even equipment controlled by computers not
connected to the Internet can be vulnerable to physical damage caused by
malicious commands sent to industrial equipment (in that case uranium
enrichment centrifuges) which are infected via removable media. In 2014, the Computer
Emergency Readiness Team, a division of the Department of Homeland Security,
investigated 79 hacking incidents at energy companies. Vulnerabilities in smart
meters (many of which use local radio or cellular communications) can cause
problems with billing fraud.
Aviation
The aviation industry is
very reliant on a series of complex system which could be attacked. A simple
power outage at one airport can cause repercussions worldwide, much of the
system relies on radio transmissions which could be disrupted, and controlling
aircraft over oceans is especially dangerous because radar surveillance only
extends 175 to 225 miles offshore. There is also potential for attack from
within an aircraft.In Europe, with the (Pan-European Network Service) and NewPENS, and in the US with the NextGen program, air navigation service providers are moving to create their own dedicated networks.
The consequences of a successful attack range from loss of confidentiality to loss of system integrity, which may lead to more serious concerns such as exfiltration of data, network and air traffic control outages, which in turn can lead to airport closures, loss of aircraft, loss of passenger life, damages on the ground and to transportation infrastructure. A successful attack on a military aviation system that controls munitions could have even more serious consequences.
Consumer
devices
Desktop computers and
laptops are commonly infected with malware either to gather passwords or
financial account information, or to construct a botnet to attack another
target. Smart phones, tablet computers, smart watches, and other mobile devices
such as Quantified Self devices like activity trackers have also become targets
and many of these have sensors such as cameras, microphones, GPS receivers,
compasses, and accelerometers which could be exploited, and may collect
personal information, including sensitive health information. Wifi, Bluetooth,
and cell phone networks on any of these devices could be used as attack
vectors, and sensors might be remotely activated after a successful breach.Home automation devices such as the Nest thermostat are also potential targets.
Large
corporations
Large corporations are
common targets. In many cases this is aimed at financial gain through identity
theft and involves data breaches such as the loss of millions of clients'
credit card details by Home Depot Staples, and Target Corporation. Medical
records have been targeted for use in general identify theft, health insurance
fraud, and impersonating patients to obtain prescription drugs for recreational
purposes or resale.Not all attacks are financially motivated however; for example security firm HBGary Federal suffered a serious series of attacks in 2011 from hacktivist group Anonymous in retaliation for the firm's CEO claiming to have infiltrated their group, and Sony Pictures was attacked in 2014 where the motive appears to have been to embarrass with data leaks, and cripple the company by wiping workstations and servers.
Automobiles
If access is gained to a
car's internal controller area network, it is possible to disable the brakes
and turn the steering wheel. Computerized engine timing, cruise control, anti-lock
brakes, seat belt tensioners, door locks, airbags and advanced driver
assistance systems make these disruptions possible, and self-driving cars go
even further. Connected cars may use wifi and bluetooth to communicate with
onboard consumer devices, and the cell phone network to contact concierge and
emergency assistance services or get navigational or entertainment information;
each of these networks is a potential entry point for malware or an
attacker.Researchers in 2011 were even able to use a malicious compact disc in
a car's stereo system as a successful attack vector, and cars with built-in
voice recognition or remote assistance features have onboard microphones which
could be used for eavesdropping.A 2015 report by U.S. Senator Edward Markey criticized manufacturers' security measures as inadequate, and also highlighted privacy concerns about driving, location, and diagnostic data being collected, which is vulnerable to abuse by both manufacturers and hackers.
Government
Government and military
computer systems are commonly attacked by activists and foreign
powers. Local and regional government infrastructure such as traffic light
controls, police and intelligence agency communications, personnel records,
student records, and financial systems are also potential targets as they are
now all largely computerized. Passports and government ID cards that control
access to facilities which use RFID can be vulnerable to cloning.
Internet
of Things and physical vulnerabilities
The Internet of Things
(IoT) is the network of physical objects such as devices, vehicles, and
buildings that are embedded with electronics, software, sensors, and network
connectivity that enables them to collect and exchange data – and concerns have
been raised that this is being developed without appropriate consideration of
the security challenges involved.While the IoT creates opportunities for more direct integration of the physical world into computer-based systems, it also provides opportunities for misuse. In particular, as the Internet of Things spreads widely, cyber attacks are likely to become an increasingly physical (rather than simply virtual) threat. If a front door's lock is connected to the Internet, and can be locked/unlocked from a phone, then a criminal could enter the home at the press of a button from a stolen or hacked phone. People could stand to lose much more than their credit card numbers in a world controlled by IoT-enabled devices. Thieves have also used electronic means to circumvent non-Internet-connected hotel door locks.
Medical
systems
See also: Medical
device hijack
Medical devices have either been successfully attacked or had potentially deadly vulnerabilities demonstrated, including both in-hospital diagnostic equipment and implanted devices including pacemakers and insulin pumps. There are many reports of hospitals and hospital organizations getting hacked, including ransomware attacks, Windows XP exploits, viruses, and data breaches of sensitive data stored on hospital servers. On 28 December 2016 the US Food and Drug Administration released its recommendations that are not legally enforceable for how medical device manufacturers should maintain the security of Internet-connected devices.
0 commentaires:
Enregistrer un commentaire