Page 124 - Cyber Safety C-8
P. 124

21 st   #Critical Thinking
                                                                                          Century
                                                                                           Skills  #Information Literacy
                                                       THE SMART HOME HACK
                    Akash’s  family  recently  upgraded  their  home  using smart  LED bulbs,  a smart  speaker  and a
                    Wi-Fi–connected automation hub. Everything worked smoothly, so they never changed the default
                    passwords, assuming, “Who would hack our lights?”

                    Meanwhile, Vishal, a tech-savvy student  experimenting  with  IoT vulnerabilities,  used  a device-
                    scanning tool to  search for nearby  networks  with weak  security.  Within  minutes,  he detected
                    several unprotected IoT devices inside Akash’s home network. Because the default passwords were
                    unchanged, he easily accessed the smart-light hub and later moved into the smart speaker, since
                    both were connected to the same router.

                    Soon, strange things began happening:

                        The lights flickered at random times.

                        The smart speaker woke up even without using the wake word.

                         Akash’s father checked the device app and noticed microphone activity logs during hours when
                        nobody was at home.


                        The automation hub also displayed login attempts from an unknown device ID.

                    When the service provider investigated, they confirmed that multiple IoT devices had been accessed
                    and attempts were made to link them, behaviour commonly seen in botnet-style attacks, which are
                    expected to grow further as 5G-powered IoT devices increase.

                    Akash’s family finally realised that their simple, everyday smart gadgets had been misused to listen,
                    monitor and possibly attack other networks.

                    Based on the above case, answer the following questions:

                    1.  What unusual behaviour made the family suspicious about the smart speaker?






                    2.   Why is it dangerous when a hacker can control or link multiple IoT devices together?















                   122  Computer Science - VIII
   119   120   121   122   123   124   125   126   127   128   129