Unlock stock picks and a broker-level newsfeed that powers Wall Street.

Hackers could use your smart home devices to launch web attacks
A Samsung smart refrigerator
Your humble refrigerator could be a portal for hackers to take launch online attacks.

That new Internet-connected security camera you just installed may be the next weapon in a hacker’s cyberattack. Or maybe it’s your connected teakettle, or your smart fridge or another one of your web-accessible household gadgets — any of which could be vulnerable to being hacked and used to launch online attacks.

The danger of insecure “Internet of Things” hardware has been obvious since at least 2013, when journalist Kashmir Hill memorably recounted how she took over the lights and other devices in strangers’ homes (with their permission) by exploiting poorly-configured default settings.

Unfortunately, connected devices haven’t gotten much more secure since then — a 2015 study by HP Enterprise found that six out of 10 popular IoT gadgets had vulnerabilities that could be exploited by hackers. That risk became a reality two weeks ago when cybersecurity reporter, and my onetime Washington Post colleague, Brian Krebs had his site forced offline by a sustained, massive distributed-denial-of-service (DDoS) attack.

The most likely weapons in the attack? IoT devices “exposed to the Internet and protected with weak or hard-coded passwords,” Krebs wrote in a post about the attack.

Quarantining the threat

After getting his site back online using Google’s Project Shield, an initiative launched to protect journalists and activists from censorship — Krebs urged collective action by Internet providers to quarantine attacks from hacked IoT gear.

DDoS attacks work when hackers exploit vulnerabilities in connected devices, like your thermostat, and conscript them into their army of machines which the hackers can remotely direct to flood websites or other service with requests for information, overwhelming the sites and bringing them offline.

Individual users are unlikely to notice that their devices have been hacked and enslaved into a botnet, but internet providers can watch for “spoofed” traffic, a telltale sign of an attacker trying to hide a DDoS attempt.

In his post, however, Krebs expressed fear that US internet service providers would pass on the expense of deploying a basic filtering measure called BCP38 (“BCP” is short for “Best Current Practices,” making a recommendation but not a requirement) to customers.

But one security expert who helps run an ongoing test of which providers and hosts deploy this screening said the picture wasn’t as bleak.

Recent tests of US providers by the Center for Applied Internet Data Analysis’ (CAIDA) Spoofer Project found that AT&T (T), Comcast (CMCSA) and Verizon (VZ) all generally caught and blocked spoofed traffic.