Too Smart For Their Own Good: Attacking Smart TVs

  /     /     /  
Publicated : 22/11/2024   Category : security


Too Smart For Their Own Good: Attacking Smart TVs


Black Hat researchers show how the watchers can become the watched through smart TV attack techniques



BLACK HAT USA -- LAS VEGAS -- Just like with mobile phones, the more advanced the common television gets, the more likely it can be turned against its users by attackers who can use embedded features, such as microphones, cameras, and lots of storage, to spy on people and steal their sensitive data. Yesterday at Black Hat USA, two different presentations offered research on how these activities can be carried out against the current generations of Smart TVs.
Its a troubling development for consumers because, as researcher Seungjin Lee with Korea University put it, when a home computer is hacked there is usually just one main victim. But if a home television is hacked and the camera trained on its watchers, that affects the whole family and invades the most private areas of the home. However, remote attacks against smart TVs arent just a consumer concern.
I know some big companies like Google or Microsoft, they use smart TVs in their offices, he said. It is not just about personal stuff or home privacy stuff. It is also about companies that administrate some sensitive data.
Lee demonstrated some rootkit technology he developed in order to gain complete control over a range of smart TVs for the purpose of spying on their owners. As he explained, the stationary nature of smart TVs actually make them much better for attackers to photograph or videotape victims than a similarly hacked smart phone. In his research on mobile devices, he has found that usually only about 1 percent of photos snapped are anything but a blurry mess. Additionally, unlike mobile devices, smart TV have persistent power, so a battery drain is not likely to alert a user about potential unwanted activity on the device.
Similar to Lees talk, two researchers with iSEC Partners, Aaron Grattafiori and Josh Yavor, more specifically trained their exploratory research on Samsung TVs. They also found these televisions to be excellent spy platforms. In particular, they showed how these TVs advanced functions were essentially being run as Web apps, with the same potential for vulnerabilities as Web apps in any other context. In particular, due to its use of the devices camera and microphone, Skype was a particularly juicy target.
Skype was a mess on a smart TV, Grattafiori said. Anything that could be entered by the user, you could inject JavaScript, and that would execute in the context of the application.
Other social media applications also made for great remote compromise targets, as well.
Anyplace where we can get remote content injected, we can install a rootkit and have full system control anytime we boot up, he said. And because its a social media platform, we can distribute our code to smart TV users -- which means that we have created potential for a TV worm.
Even the TVs browser was ready to be compromised, with the researchers reporting that not only could they execute cross-site scripting on sites running on the browser, but also the browser itself.
We can change your home page to be our attacker site so that before you even do anything at all, the next time you load the browser it hooks our code. We can start doing whatever we want at that point, Grattafiori said. Thats a cheap persistence trick.
As he puts it, this is a wake-up call for manufacturers to develop some cross-platform security for their smart TV products, and for their developers to remember the basics of Web app secure coding, especially sanitizing input and not trusting storage.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Too Smart For Their Own Good: Attacking Smart TVs