Internet Connected Refrigerators Can Be Remote Defrosted

Anthony PeroVulnerabilitiesLeave a Comment

hackers-control-fridge-temperatures

Industrial Internet Connected Refrigerators Can Be Remote Defrosted

The ability to remotely control a variety of devices and tools like refrigerators has a plethora of benefits. First, industrial refrigerators are used in a variety of ways from restaurants, to grocery stores, hospitals, and more. However, imagine what could happen if these devices were breached and hackers were able to control the temperatures. In one regard, one might wonder why hackers would target a refrigerator. One reason would be the ability is ransomware and not allowing control of the temperature. This is the problem hat U.K. – based firm Resource Data Management found.

Hypothetically, if hackers were able to access the refrigerator of a hospital, they could easily ruin many things. Considering what could happen for a variety of medicines that need to be temperature controlled, organ transplants, or even worse the morgue. This would offer the prime chance for a hacker to ask for mass amounts of money to release the systems back into proper control.

In their official statement, they believe that the mix up occurred when they changed their software. This involved them moving their services to the cloud on that very day. Once they spotted the slight breach, and account mix up they quickly reverted back to their old system. Once the system was reverted they did not notice any other problems.

How Was The Hack Discovered?

Originally reported on TechCrunch, the tech website discovered hundreds of fridges on a public search engine. The fridges were listed on a publically available database called Shodan. With this information and access to the different refrigerators, malicious third parties could do serious damage. Hackers would be able to modify user settings, alarms, and other features on the exposed device. Meanwhile, damage from access could include unexpected water damage, financial loss, and the destruction of inventory.

In the original report, they state that the units are commonly found in Europe, with some in China and a Pharmaceutical company in Malaysia. One of the researchers, Noam Rotem said that the system could be accessed through any internet browser. Fortunately, the problem was rectified before any major damage occurred.

Resource Data Management said to tell their customers to change their passwords while they update their systems. However, it’s not required to change the password, although strongly recommended.

What To Do In Case of a Data Breach

<p style="font-size: 20px;line-height: 38px;text-align: left"If you are a customer and alerted that a company you frequently shop at is breached, the first thing to do is immediately change your password. Not only change your password on the affected account but on all accounts that use that same login.

If you are a business and hacked. Contact SecureData immediately. SecureData can deploy anywhere in the world, within 24 hours to help you stop a data breach. For a free phone consultation call us at 1-800-288-1407.

Leave a Reply

Your email address will not be published. Required fields are marked *