https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Supply Chain, Transportation & Logistics


Getty Images

New ThroughTek IoT Supply Chain Vulnerability Announced

More supply chain vulnerabilities have been uncovered, Nozomi Networks Lab has announced a new vulnerability in a ThroughTek software component that’s used broadly by security cameras and smart device vendors.
  • Written by Lauren Horwitz
  • 16th June 2021

This week, the U.S. Department of Homeland Security announced a new IoT supply chain vulnerability with serious impact for Internet of Things devices.

DHS and Nozomi Networks Labs announced a new vulnerability discovered in a ThroughTek software component that’s used broadly by security camera and smart device vendors.

IoT supply chain vulnerabilities like this have become more prevalent.

With this kind of breach, malicious attackers tamper with the development process of software to inject a malicious component, such as a remote access tool, that will let them establish a foothold into the targeted organization or individual.

Indeed, supply chain attacks rose by 42% in the first quarter of 2021 in the U.S., affecting up to 7million people, according to the Identity Theft Resource Center. Supply chain vulnerabilities can proliferate quickly, as code is copied  and incorporated into various products, as noted in “Finite State Supply Chain Assessment,” a 2019 report from Finite State, an IoT cybersecurity company.

“Supply chain cyberattacks are especially challenging for security pros to address, as their nature allows these flaws to proliferate rapidly,” said Tanner Johnson, “principal analyst, data security, Omdia. “The ubiquity of widely used hardware and software technologies means that, when such vulnerabilities result in an exponential increase in the fallout from the successful attack, making these types of flaws highly sought after among would-be adversaries.”

ThroughTek Supply Chain Vulnerability Could Affect Millions of IoT Devices

The ThroughTek component is part of the supply chain for many original equipment manufacturers (OEMs) of consumer-grade security cameras and IoT devices. ThroughTek states that its technology is used by several million Internet of Things (IoT)-connected devices.

ThroughTek’s P2P software development kit (SDK) provides remote access to audio/video streams over the Internet.

Several million connected devices, including IP cameras, baby monitoring cameras, and robotic and battery devices. P2P allows a client to access audio/video streams through the internet. The new vulnerability found in a commonly used software component found in the security cameras and smart sensors, makes it possible for unauthorized viewers to gain access to video streams and encroach on consumers’ lives. And for business users, access to sensitive business, production, employee and customer information.

This vulnerability comes on the heels of other high-profile breaches, including the SolwarWinds and Blackbaud data breaches, which signal a disturbing rise in supply chain vulnerabilities.

As supply chain vulnerabilities mount, enterprises have to be on guard against the potential for breaches and scrutinizer the code they incorporate into their IT landscape.

“Supply chain vulnerabilities that target IoT devices add complexities that are exacerbated by the sheer volume of vulnerable connected devices in the field: roughly 40 billion by the end of 2020,” Johnson said.  “Securing IoT devices can be more challenging than traditional networked components, as many of these devices lack basic functions, such as operating systems, user interfaces, or onboard agents with which to interact.  As a result, an organization may be completely unaware that a successful supply chain attack has compromised IoT components.

 Protecting Against IoT Supply Chain Vulnerability

CISA recommends users take measures to minimize the risk of exploitation of this vulnerability, including considering the following actions:

  • Follow the Cybersecurity and Infrastructure Security Agency’s certification advisory for remediation.
  • Further considerations include assessing the security and privacy policies of the camera vendor and the jurisdiction in which the vendor is located.
  • Nozomi Networks recommends that industrial and critical infrastructure users enable P2P only in the rare situations where the device vendor can provide a thorough technical explanation of why the algorithms used in their products are secure.
  • /Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.
  • Locate control system networks and remote devices behind firewalls and isolate them from business networks.
  • When remote access is required, use secure methods, such as virtual private networks, recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.

 

 

 

Tags: Digital twins Hardware-based security Supply Chain, Transportation & Logistics Technologies

Related


  • CES 2022: IMUZAK Launches Steering Wheel Display System
    The IMUZAK design packs a 2.8 inch monitor into the steering wheel to produce free-floating visual notifications and dashboard controls
  • CubeSat
    ST Engineering Invests in IoT Satellite Company
    The Singapore hardware giant made a strategic investment to add IoT satellite terminals from hiSky to its portfolio
  • Walmart Testing Fully Autonomous Deliveries
    Walmart’s partner Gatik is running fully autonomous deliveries of groceries in Arkansas with its fleet of self-driving box trucks. This marks the first time an autonomous trucking company is handling a delivery route without a safety driver behind the wheel.   Walmart contracted the Gatik vehicles to deliver groceries from dark warehouses, which fulfill e-commerce orders […]
  • Make Maritime Digitalisation a Reality
    New digital technologies and cloud-based service models for commercial maritime can reduce costs by improving efficiency, minimizing errors, and enhancing crew welfare and security wherever they sail. Commercial shipowners need a communications infrastructure that can adequately support their digital transformations. SES’s satellite-enabled network solutions, delivered by our maritime service provider partners, can help make maritime […]

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Automotive Chip Shortage Byproduct of ‘Perfect Storm’
  • Despite Semiconductor Market Exuberance, Supply Chain Asymmetry Continues
  • Supply Chain Needs to Be Secured to Address Chip Shortage
  • Going Beyond Just IoT GPS: A Cookbook for Mobile IoT Applications

Roundups

View all

IoT Product Roundup: PTC, Nokia, Arm and More

19th May 2022

IoT Deals, Partnerships Roundup: Intel, Nauto, Helium and more

14th May 2022

IoT Product Roundup: Amazon, Synaptics, Urban Control and More

27th April 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Dylan Kennedy of EMQ

Embedded IoT World 2022: Dylan Kennedy of EMQ

Dylan Kennedy, EMQ’s VP of global operations, sat down with Chuck Martin at Embedded IoT World 2022.

Embedded IoT World 2022: Omdia’s Sang Oh Talks Vehicle Chip Shortage

Omdia’s automotive semiconductor analyst sits down with Chuck Martin at this year’s event

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

Europe’s First Automated Gas Station Convenience Store dlvr.it/SR45J9 https://t.co/eDJDJ7CxkI

25th May 2022
IoTWorldToday, IoTWorldSeries

Zero-Emission, Autonomous Cargo Ship Under Development dlvr.it/SR3xgb https://t.co/3oU7CrKWkW

25th May 2022
IoTWorldToday, IoTWorldSeries

Hannover Messe 2022: 5 Key Themes at This Year’s Show dlvr.it/SR3wtW https://t.co/j0fQUiU2LW

25th May 2022
IoTWorldToday, IoTWorldSeries

Can AI Help Stop Mass Shootings? dlvr.it/SR3tqK https://t.co/VxPBdajWA3

25th May 2022
IoTWorldToday, IoTWorldSeries

China has revealed an autonomous marine drone carrier dlvr.it/SR3qXs https://t.co/yMiiqeMNrZ

25th May 2022
IoTWorldToday, IoTWorldSeries

ISQ’s #UAV inspection drones will be on display at this year’s @hannover_messe dlvr.it/SR35dg https://t.co/U6QOQtMbGw

25th May 2022
IoTWorldToday, IoTWorldSeries

👀 Looking to integrate #AI into your manufacturing process? Explore how #manufacturers can begin the process of… twitter.com/i/web/status/1…

25th May 2022
IoTWorldToday, IoTWorldSeries

The U.S. Army is getting a 5G boost for #AR #VR capabilities from #5G network provider @OceusNetworks.… twitter.com/i/web/status/1…

24th May 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X