โŒ

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

New Whitepaper: Exploiting Cellular-based IoT Devices

24 March 2026 at 16:00

Rapid7 has released a whitepaper titled โ€œThe Weaponization of Cellular Based IoT Technology,โ€ by Deral Heiland, principal security researcher, IoT, at Rapid7, and Carlota Bindner, lead product security researcher at Thermo Fisher Scientific. The paper examines how attackers with physical access can exploit cellular modules in Internet of Things (IoT) devices to move into cloud and backend environments, exfiltrate data, and conceal command channels within expected device traffic. Heiland presented their findings at the RSAC 2026 conference in San Francisco.

The research focuses on how these attacks work in practice. It details how interchip communications such as USB and universal asynchronous receiver-transmitter (UART) can be observed and manipulated. It also shows how hardware modifications can replace a device host, allowing an external system to assume control of the cellular module. The authors developed proof-of-concept tools, including a TCP port scanner using AT commands, an S3 bucket enumerator, a SOCKS5 proxy that routes traffic through the cellular module, and a Metasploit proxy module. These examples demonstrate how attackers can take advantage of trusted relationships between devices and connected services.

The findings highlight consistent risks across tested devices. Cellular modules often expose multiple interfaces, and unused UART or USB paths can provide direct access. With targeted printed circuit board modifications, an attacker can reroute traffic through the cellular interface. Many modules accept AT commands that support raw sockets, HTTP requests, and TCP tunnels, which can enable reconnaissance and lateral movement. All cellular devices the researchers examined lacked tamper protections and most did not encrypt sensitive data before transmission, increasing exposure in environments that use private access point names (APNs).

Organizations should treat cellular-enabled devices as privileged entry points into their networks as well as their critical data storage and management environments. This includes disabling or removing unused interchip interfaces, enforcing end-to-end encryption before data is transmitted through the cellular modules, and applying monitoring and outbound controls within APN architectures. Hardware-level security testing should be part of standard product security practices.To read the whitepaper, click here.

โ€˜Internet of Thingsโ€™ malware now survives a factory reset

26 January 2026 at 03:44
PUBLIC DEFENDER By Brian Livingston Malware apps that infect โ€œInternet of Thingsโ€ devices (Wi-Fi routers, smart TVs, doorbell cameras, and the like) used to get erased whenever the gadget was unplugged, rebooted, or reset โ€” but not anymore. Suddenly, state-sponsored hacker teams are now infecting IoT firmware with botnet apps that survive a loss of [โ€ฆ]

The best and most secure Wi-Fi routers for 2026

15 December 2025 at 03:44
PUBLIC DEFENDER By Brian Livingston There are about 21 billion Wi-Fiโ€“enabled devices in the world, according to an IMARC Group estimate. Thatโ€™s more than 2ยฝ per person alive today. In the US, households with Internet access now have an average of 18 connected devices: Wi-Fi routers, smart TVs, remote-controlled cameras, even refrigerators that report when [โ€ฆ]

Internet of Things Exploration: 2016 Ford Flex

By: BHIS
31 August 2017 at 09:43

David Fletcher// My wife and I recently purchased a 2016 Ford Flex to replace an aging version of the same make and model that met an untimely fate. During the [โ€ฆ]

The post Internet of Things Exploration: 2016 Ford Flex appeared first on Black Hills Information Security, Inc..

Creating the Next Generation of Interns

By: BHIS
5 October 2016 at 10:28

Chevy Swanson // I got my start in InfoSec through a few competitions during my time in high school. My team and I were fortunate to have aย supportive school and [โ€ฆ]

The post Creating the Next Generation of Interns appeared first on Black Hills Information Security, Inc..

โŒ
โŒ