{"id":22248,"date":"2018-04-28T10:24:45","date_gmt":"2018-04-28T14:24:45","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=22248"},"modified":"2019-11-15T06:37:36","modified_gmt":"2019-11-15T11:37:36","slug":"leaking-fish-tank","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/leaking-fish-tank\/22248\/","title":{"rendered":"Leaking fish tank"},"content":{"rendered":"<p>When it comes to the Internet of Things, security still lags behind ingenuity. Among its connected devices are a fair few unknowns. And practice shows that IoT threats <a target=\"_blank\" href=\"https:\/\/www.kaspersky.co.uk\/blog\/insecure-vibrator\/7544\/\" rel=\"noopener noreferrer\">have a nasty habit of catching<\/a> users with their pants down, so to speak. Our agenda today features another seemingly harmless contraption.<\/p>\n<p><strong><\/strong><\/p>\n<h2>High-tech interior<\/h2>\n<p><\/p>\n<p>A short while back, a US casino installed a \u201csmart\u201d fish tank in the lobby. The fish feeding schedule, plus salt and temperature levels, were regulated automatically. The thermostat could warn the owner online if the water got too hot or cold.<\/p>\n<p>The device was hidden behind a <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/vpn\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">VPN<\/a>, clearly to shield it from intruders. But that proved insufficient \u2014 the seemingly innocuous thermostat provided a backdoor to other nodes in the local network.<\/p>\n<p><strong><\/strong><\/p>\n<h3>I spy<\/h3>\n<p><\/p>\n<p>It transpired that the double-dealing fish tank had sent 10GB of data to somewhere in Norway. Internet security staff struggled to work out what information had fallen into the hands of the faceless hackers. The answer was the casino\u2019s database of high rollers. Open sources do not specify what precise information it contained, but whether it\u2019s just names or, more seriously, contact information and even credit-card numbers, the reputational damage is incalculable. The name of the casino was not publicized, but it was obliged to report the incident to victims of the leak.<\/p>\n<p><strong><\/strong><\/p>\n<h3>Forewarned is forearmed<\/h3>\n<p><\/p>\n<p>Companies that don\u2019t want to risk their clients, like this unnamed casino, are advised to keep these rules in mind:<\/p>\n<ul>\n<li>Protecting only end devices is not enough. Intruders can use any device as a foothold for attack, so security solutions should be installed on servers and <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/gateway\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">gateways<\/a> as well. Ideally, they should block all contact with the outside world that seeks entry through unknown ports or arcane protocols.<\/li>\n<li>Deny Internet access to any equipment that does not need it for core tasks.<\/li>\n<li>Configure all IoT devices very carefully; as yet there is no way to install security solutions on them.<\/li>\n<li>Carry out <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/enterprise-security\/security-assessment?redef=1&amp;reseller=gl_entsa_acq_ona_smm__onl_b2b_blog_post_______\" rel=\"noopener noreferrer nofollow\">periodic penetration tests<\/a>. These checks will help find security holes at the fixable stage, including less-obvious gaps that could lead to major problems.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The house always wins? How a smart device took down a casino.<\/p>\n","protected":false},"author":2484,"featured_media":22249,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[658,794,97,422],"class_list":{"0":"post-22248","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-internet-of-things","10":"tag-iot","11":"tag-security-2","12":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/leaking-fish-tank\/22248\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/leaking-fish-tank\/13233\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/leaking-fish-tank\/11039\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/leaking-fish-tank\/5721\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/leaking-fish-tank\/15310\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/leaking-fish-tank\/13579\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/leaking-fish-tank\/12927\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/leaking-fish-tank\/16008\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/leaking-fish-tank\/15657\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/leaking-fish-tank\/20308\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/leaking-fish-tank\/4889\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/leaking-fish-tank\/10389\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/leaking-fish-tank\/10280\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/leaking-fish-tank\/16572\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/leaking-fish-tank\/20297\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/leaking-fish-tank\/20205\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/leaking-fish-tank\/20194\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/iot\/","name":"IoT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22248"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22248\/revisions"}],"predecessor-version":[{"id":29740,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22248\/revisions\/29740"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22249"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}