Competition: Hacked home office devices

Competition: Hacked home office devices

Share post

The Zero Day Initiative (ZDI) organized the hacking competition Pwn2Own, which quickly showed the danger that home devices, for example in the home office, pose for the security of companies. Trend Micro's ZDI uncovers vulnerabilities and helps mitigate them.

Trend Micro announces the winners of its recent Pwn2Own hacking contest, held in Toronto late last week. During the event, the Japanese IT security provider's Zero Day Initiative (ZDI) awarded prize money worth almost one million euros for the discovery of 63 zero-day vulnerabilities. If these vulnerabilities were exploited in real cyber attacks, the potential damage in terms of time, data and financial losses would be many times that amount.

Home office devices - 63 vulnerabilities discovered

According to Statista, more than a quarter of all employees in Germany have worked at least partially from their home office in the past two years. However, this can increase the attack surface for businesses if home devices such as routers, smart speakers, printers, and network attached storage (NAS) devices are not properly secured.

Vulnerabilities discovered through Pwn2Own and Trend Micro's Zero Day Initiative feed into the security vendor's threat intelligence analysis. Increasingly networked networks of private users and companies can thus be better secured. Multiple waves of Deadbolt ransomware attacks that compromised NAS devices worldwide in 2022 highlight the increased business risk.

Vulnerable Small Office – Home Office Devices

An equally large security risk emanates from compromised SOHO devices (small office/home office) as a starting point for lateral movements within a network. Attackers can use these to gain access to a device connected to corporate resources. That's why this year's Pwn2Own competition featured a "SOHO Smashup" category for the first time, in which hackers had to hijack a wireless router and connected device. If the participants managed to take complete control of both devices within 30 minutes, they could win prize money of almost 100.000 euros and 10 "Master of Pwn" points.

The planned EU Cyber ​​Resilience Act, which will set new minimum requirements for the security of networked products, also shows the increasing awareness of the risks emanating from SOHO devices. A new safety labeling system is also to be introduced in the USA.

More at TrendMicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more