Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Communications Networking Privacy Security The Internet IT

IoT Security Is So Bad, There's a Search Engine For Sleeping Kids (arstechnica.com) 127

An anonymous reader writes: Shodan, a search engine for the Internet of Things (IoT), recently launched a new section that lets users easily browse vulnerable webcams. The feed includes images of marijuana plantations, back rooms of banks, children, kitchens, living rooms, garages, front gardens, back gardens, ski slopes, swimming pools, colleges and schools, laboratories, and cash register cameras in retail stores. While IoT manufacturers are to blame, this also highlights the creepy stuff you can do with Shodan these days. At the start of January, Check Point recommended companies to block Shodan's crawlers. The infosec community came to defend Shodan, and even its founder said that Shodan is uselessly branded as a tool of evil, saying that attackers have their own scanning tools.
This discussion has been archived. No new comments can be posted.

IoT Security Is So Bad, There's a Search Engine For Sleeping Kids

Comments Filter:
  • Oh well (Score:0, Funny)

    by Anonymous Coward on Saturday January 23, 2016 @10:03PM (#51359443)

    These are some of the same terrified idiots who support things like the TSA and NSA spying. You know, to win the war against terror...

  • by Anonymous Coward on Saturday January 23, 2016 @10:08PM (#51359469)

    Now that the FBI's kiddie porn site got shutdown, that task-force needed a new project that exploits children.

  • by Anonymous Coward on Saturday January 23, 2016 @10:17PM (#51359491)

    I'm not a member of the site, but I don't think it's specifically for certain types of images as far as I can tell.

    • by rudy_wayne ( 414635 ) on Saturday January 23, 2016 @10:27PM (#51359521)

      According to TFA, which of course no one has bothered to read:

      Shodan crawls the Internet at random looking for IP addresses with open ports. If an open port lacks authentication and streams a video feed, the script takes a snap and moves on. The cameras are vulnerable because they use the Real Time Streaming Protocol (RTSP, port 554) to share video but have no password authentication in place. The image feed is available to paid Shodan members at images.shodan.io. Free Shodan accounts can also search using the filter "port:554 has_screenshot:true."

  • by Anonymous Coward on Saturday January 23, 2016 @10:20PM (#51359501)

    This must not be an article about ad-blockers.

  • Johnny can't encrypt (Score:4, Interesting)

    by dfn5 ( 524972 ) on Saturday January 23, 2016 @10:22PM (#51359507) Journal
    Security is hard and companies have to make their video surveillance products easy enough for a socker mom to install. Frankly I'm not surprised. Nor do I have a solution. As someone who has to provide tech support to family and friends I realize how hard it is to "just make it work" for those who couldn't care less about the technical details.
  • by westlake ( 615356 ) on Saturday January 23, 2016 @10:31PM (#51359529)

    The infosec community came to defend Shodan, and even its founder said that Shodan is uselessly branded as a tool of evil, saying that attackers have their own scanning tools.

    It won't matter to the families of the children you have exposed that other scanning tools are available. Yours is public and visible --- and it has a deliberately provocative name. You can't search Google for Shodan and miss the connection.

    • by Anonymous Coward on Saturday January 23, 2016 @10:52PM (#51359593)

      Yours is public and visible --- and it has a deliberately provocative name.

      That's the point, Shodan is selling a service, and they want publicity.

      Hopefully this will make the mainstream news and people who have their cameras connected to the internet will learn and take them down.

      • by anyGould ( 1295481 ) on Monday January 25, 2016 @01:55PM (#51367693)

        And realistically, Shodan is offering a more useful service for free - showing people that their webcam is broadcasting to the entire world.

        The fact that the "solution" is "hey, block this one provider" and not "holy crap, unplug that thing NOW and get one that isn't broadcasting our cash register to anyone with half a brain.

        I suspect this will get fixed when someone gets hurt or robbed, and decides to take it out on the manufacturer. (I'm guessing there's a (media) case to be made in "hey, the webcam you sold me isn't secure, so the crooks watched my register to pick the perfect time to rob us")

    • by Anonymous Coward on Saturday January 23, 2016 @10:55PM (#51359603)

      It won't matter to the families of the children you have exposed that other scanning tools are available. Yours is public and visible --- and it has a deliberately provocative name. You can't search Google for Shodan and miss the connection.

      The device manufacturers are clearly to blame here.....this isn't a Shodan problem. Any reasonable timeline for a response to responsible disclosure has long since passed.

    • by Lunix Nutcase ( 1092239 ) on Saturday January 23, 2016 @11:18PM (#51359651)

      Because sweeping this under the rug means bad guys won't ever attack these devices. *rolls eyes* Their point won't have been made until these *groan* IoT *groan* device making shitheads secure their crapware.

      • by excelsior_gr ( 969383 ) on Sunday January 24, 2016 @12:49AM (#51359847)

        I'm afraid I have to agree. This search engine needs to receive as much publicity as possible, not get swept under the rug. Only then, I hope, will the people become aware of how orwellian the IoT really is.

      • by westlake ( 615356 ) on Sunday January 24, 2016 @01:31AM (#51360001)

        Because sweeping this under the rug means bad guys won't ever attack these devices. *rolls eyes* Their point won't have been made until these *groan* IoT *groan* device making shitheads secure their crapware.

        The geek makes this argument whenever one of his pet "white hat" hacking projects is clearly open to abuse.

        The problem here is that the argument appeals only to other geeks --- not to those who see only an invasion of privacy made possible --- made easier --- by a search engine like Shodan. That a door was unlocked or the lock was broken does not imply a right to enter.

        The geek needs to learn that others see him as the shithead whether he is wearing the white hat or the black.

    • by tlambert ( 566799 ) on Sunday January 24, 2016 @12:25AM (#51359795)

      Yours is public and visible --- and it has a deliberately provocative name. You can't search Google for Shodan and miss the connection.

      The malevolent AI villain in System Shock 2? I fail to see the connection...

      You've made your point...now shut it down.

      Yes. They've made their point. Now it's the job of the manufacturer to shut it down, since people anywhere on the planet can run a similar service, and there's not dick you can do about it without a policing treaty, and extradition treaty, and a willingness to spend a lot of money following up the events.

      • by grimJester ( 890090 ) on Sunday January 24, 2016 @05:47AM (#51360463)

        SHODAN is an artificial intelligence whose moral restraints were removed from her programming by a hacker in order for Edward Diego, station chief of Citadel Station, on which SHODAN was installed, to delete compromising files regarding illegal experiments and his corruption. She is a megalomaniac with a god complex and sees humans as little better than insects, something which she constantly reminds the player of.

        No moral restraints, megalomaniac?

    • I did the impossible. I searched Google and came up with martial arts, Go, and this article. And similar articles from back when this was news. The connection you claim is obvious is clearly missing.

      I'm more interested in this having been news for years, and devices aren't even using minimal security via obscurity. A normal ISP might knock you off for port scanning, but hitting random addresses on a single port might not trigger the same response, making it trivial to replicate this search engine.

    • by Anonymous Coward on Sunday January 24, 2016 @06:14AM (#51360519)

      Wait, why would you want to film you sleeping children in the first place? I find that terribly creepy, borderline perverse and sure as shit stinks, a violation of their privacy! Laissez-faire parenting gone amok. Stop it at once.

    • by Opportunist ( 166417 ) on Sunday January 24, 2016 @07:15AM (#51360649)

      So killing the messenger it is again? Let's hush it up, when nobody talks about it, maybe it just goes away.

      You know the old saying, if you make Shodan a criminal, only criminals will go onto the orbital station and fight her. Or something like that.

    • You can search Google for unsecured webcams. They periodically remove them from their database, but if you stay ahead of the curve with new models they are easily accessible via google.

  • by kriston ( 7886 ) on Saturday January 23, 2016 @11:21PM (#51359659) Homepage Journal

    I'm not sure if everyone already knew this but Shodan *started* as an non-secured webcam search engine back in 2009.

  • The feds will shut down the sleeping-kids search engine in a couple of weeks, after they infect a bunch of computers with phone-home-ware.

    What's that you say? I'm posting in the wrong thread [slashdot.org]? Sorry, saw "kids" and "cameras" and "creepy" and they sort of blended together there for a minute.

    Strange but true: My captcha is warrants. Now THAT is creepy!

  • by Morgaine ( 4316 ) on Sunday January 24, 2016 @12:07AM (#51359765)

    An AC wrote:

    People who don't secure their systems and devices are to blame for someone breaking into them?

    There was no breaking in.

    If you provide data to the public Internet without any form of restriction, you can't then validly complain when the Internet public sees that data. You offered it publicly, and the public took you up on your offer.

    This isn't anything like breaking and entering, nor even like someone walking through a door which you left wide open. It's much more intentional on your part than that:-- you offered data to the public by creating an unrestricted access port on the Internet, your offer was accepted when someone opened that port, and then you deliberately sent your data out to that recipient. It was your choice, before and after you made the offer to the public. Nobody can force you to send your data if you don't want to. Your system wasn't hacked to change its code to something that you did not intend.

    The closest analogy I can make is to imagine yourself standing on the sidewalk in the high street, an open sweet jar in one hand, and the other hand outstretched offering sweets to passers by. The highstreet is the public Internet, and your invitingly outstretched hand is the open port. If someone takes hold of the sweet, you can still prevent it from being taken by holding tightly onto the wrapper (an access restriction, perhaps you want to check that recipients are smiling first).

    But if you first offer a sweet and then release it, you don't get to complain --- it was your visible intention to hand out sweets to passers by, and nobody can read your mind, only your actions. If you don't understand this then perhaps you don't grasp how Internet protocols work, and you would be best advised to stay well clear of the Internet.

    You may wish that Internet protocols worked some other way, perhaps using ESP, but they don't. They work as they were defined.

    • by Anonymous Coward on Sunday January 24, 2016 @12:19AM (#51359781)

      Ok so how about somebody standing on a public street and peeping into a house through a window that has a small opening and person getting undressed on the other side. Im fairly sure you can get arrested for that, so why not be arrested for peeping through an open internet port?

      • by NotQuiteReal ( 608241 ) on Sunday January 24, 2016 @02:40AM (#51360159) Journal
        Ok so how about somebody standing on a public street and looking into a house through a window that has a large opening and a person getting undressed on the other side. I'm fairly sure you can't get arrested for that, nor can the "exhibitionist". So why is there a problem for consuming data from an open internet service?
      • by Anonymous Coward on Sunday January 24, 2016 @06:22AM (#51360533)

        Ok so how about somebody standing on a public street and peeping into a house through a window that has a small opening and person getting undressed on the other side. Im fairly sure you can get arrested for that,

        Not where I live you don't, and I wager nowhere in the civilized free world either. Just by definition.
        The one doing the stripping down in front of the window might be reprimanded, but I doubt it would go as far as fines.

      • by Opportunist ( 166417 ) on Sunday January 24, 2016 @07:20AM (#51360655)

        It's considered impolite where I'm from. And it's considered indecent to undress in front of open windows. I fail to see the illegal part, though, on either side. Well, maybe the one undressing could be in for indecent exposure, but that would have to be like a shopping window in a well frequented street where you pretty much have to assume someone would be looking in.

    • by jones_supa ( 887896 ) on Sunday January 24, 2016 @12:47AM (#51359843)

      If you provide data to the public Internet without any form of restriction, you can't then validly complain when the Internet public sees that data. You offered it publicly, and the public took you up on your offer.

      Was it their choice though? Were they aware that the device is exposed?

      Part of the blame lies on the manufacturer if they make it too easy for an uninformed person to leave the device in an unwanted state. Bad design.

  • by jones_supa ( 887896 ) on Sunday January 24, 2016 @12:42AM (#51359833)

    ...front gardens, back gardens...

    Aha! But not side gardens! Those have better privacy...

  • by Anonymous Coward on Sunday January 24, 2016 @01:35AM (#51360013)

    Like electricians who need a license to work (atleast where I live), IoT devices should require a license to install.

  • by gavron ( 1300111 ) on Sunday January 24, 2016 @01:44AM (#51360051)

    ...they they don't need to worry about the surveillance.

    And the parents who put these protections in place, that's just like our big brother the NSA and GCHQ putting protections in place for us. No encryption necessary. Hope no bad guys get a hold of this.

    But if you're doing nothing wrong... ...you have no reason to worry.

    E

  • by gweihir ( 88907 ) on Sunday January 24, 2016 @04:56AM (#51360381)

    It is as the IoT people never even have heard of the, by now, 30+ years of history of Internet security fails. These must be the dumbest, most arrogant and most clueless developers, lead by managers of the same quality. It is high time that we get legally actionable gross negligence for manufacturers that ignore Internet security best practices.

  • by Chris Mattern ( 191822 ) on Sunday January 24, 2016 @09:07AM (#51360877)

    "Look at you, hacker: a pathetic creature of meat and bone, panting and sweating as you run through my corridors."

  • by JustAnotherOldGuy ( 4145623 ) on Sunday January 24, 2016 @01:24PM (#51361763) Journal

    IoT: Internet of Trouble

    Lets see....cheaply-made products produced and sold with barely a nod to security, installed by users who are likely to be as clueless as they could possibly be, all connected to a worldwide network easily accessible by lots and lots and lots and lots of malicious people with too much time on their hands.

    What could possibly go wrong??

    Trust me, you ain't seen nothin' yet. I'd wager that 98% of all of these consumer-grade gadgets are going to be easily hackable in their default configuration. It's only a matter of time- eventually one of them will cause a serious injury or death, or at the very least some kind of significant property damage.

    You want your refrigerator to be internet enabled? Great! But should it also have the unfettered ability to turn the temperature down and spoil all the food?

    You want door locks you can control from the other side of the world? Great! But should any Joe Blow with a free hacking kit be able to unlock your doors at will?

    You want to be able to remotely turn on your stove and start heating some water? Great! But should it blindly start "heating" a cardboard box left sitting on the burner because some dickhead in Moldavia can bypass your login?

    You want an internet-enabled thermostat? Great! But should some malicious asshole be able to turn off your heat in the dead of winter when you're on vacation, freezing your house and causing your water pipes to burst?

    Don't get me wrong- I think the overall idea of IoT is fascinating and holds great promise, but mark my words... like anything else it's gonna be abused too. Unfortunately I think it's going to take some major-league lawsuits before manufacturers start taking the security aspect of it seriously.

  • by hyperar ( 3992287 ) on Sunday January 24, 2016 @06:00PM (#51362831)
    Internet traffic on the Vatican City grew 500% in 15 minutes.

Swap read error. You lose your mind.

Working...