Latest Hacker Target: Light Blubs

The ability for hackers to attack smart light blubs illustrates the potential security pitfalls of IoT.

Many of us have become enamored with the concept of the smart home. A fridge that tells us we are out of milk and eggs. Cool. A home automation system that locks doors and calibrates thermostats based on weather conditions. Excellent. Smart light blubs that adjust for energy savings—okay, my electric bill is down with that.

On the other hand, all may not be as wonderful as first appears. According to a New York Times article, researchers have just discovered a flaw in the wireless technology powering many of these smart home devices that could open the door for some major hacking. The experts demonstrated how others could gain control of a common brand of smart light blubs through a wireless flaw and spread an infection in a network inside a building.

The risks seemed to be tied to the ZigBee radio protocol, which is widely used in consumer devices. The researchers were able to tap into the ZigBee standard to create a computer worm that launched a chain reaction to spread malicious software among connected devices. A pair of videos highlighted how the researchers took control of the devices through the light blubs, with one showing access via a drone that uses a USB stick to produce an SOS message in Morse Code, and the other doing the same from a car driving from about 230 feet away.

No need to fret––for now. The researchers gave the light bulb manufacturer a heads up on the problem, and the company fixed the security holes prior to the report’s publication. But it still shines a light on potential for similar security breaches going forward.

About the Author

Beth Stackpole, contributing writer | Contributing Editor, Automation World

Beth Stackpole is a veteran journalist covering the intersection of business and technology, from the early days of personal computing to the modern era of digital transformation. As a contributing editor to Automation World, Beth's coverage traverses a range of industries and technologies, including AI/machine learning, analytics, automation hardware and software, cloud, security, edge computing, and supply chain. In addition to her high-tech and business journalism work, Beth writes an array of custom editorial content and thought leadership pieces.

Sponsored Recommendations

Food Production: How SEW-EURODRIVE Drives Excellence

Optimize food production with SEW-EURODRIVE’s hygienic, energy-efficient automation and drive solutions for precision, reliability, and sustainability.

Rock Quarry Implements Ignition to Improve Visibility, Safety & Decision-Making

George Reed, with the help of Factory Technologies, was looking to further automate the processes at its quarries and make Ignition an organization-wide standard.

Water Infrastructure Company Replaces Point-To-Point VPN With MQTT

Goodnight Midstream chose Ignition because it could fulfill several requirements: data mining and business intelligence work on the system backend; powerful Linux-based edge deployments...

The Purdue Model And Ignition

In the automation world, the Purdue Model (also known as the Purdue reference model, Purdue network model, ISA 95, or the Automation Pyramid) is a well-known architectural framework...