Embedded IT infrastructure is everywhere and full of holes evil-doers can use for world domination. How SecurityFAIL.com could stem the tide. Embedded IT infrastructure is everywhere, controlling the flow of water and electricity and maintaining the equilibrium of sewage treatment and nuclear power plants. Forget about car bombs and crude atomic devices. That’s the stuff Dr. Evil would use to fail.To take over the world, the bad guys are better off hijacking all those embedded systems. That’s exactly what they’re trying to do, and there are plenty of vulnerabilities for them to choose from.So says Paul Asadoorian, a volunteer at the SANS Institute, founder and CEO of PaulDotCom Enterprises and host of a popular podcast of the same name. He says it’s time the security community did something to blunt the threat, and hopes his new SecurityFAIL.com wiki will help move the needle along.Think of it as something like the data breach list the Privacy Rights Clearinghouse keeps, except the items listed are embedded system flaws instead of who suffered the latest breach. There’s not much on the wiki right now, as it’s brand new. But Asadoorian expects people to fill it up quickly. From there, the hope is that critical infrastructure providers running the flawed technology will take steps to fix it before the bad guys make an example of them. He explained the danger he’s trying to flag in a presentation he gave at SOURCE Boston last week. “Using embedded systems to gain power is easy,” he says. “Lots of information flows through them, information is power and the ability to manipulate information is powerful. Multiple computers can be controlled at once.”When picturing embedded systems, don’t limit your thinking to the big critical infrastructure. The damage can begin with your own laptop or the videogame you play religiously. Asadoorian gives a few examples of how embedded systems are used to make money:Video games: Most are involved in commerce and network connected.Entertainment: Things like Apple TV and Roku all link back to your credit card somehow.Wireless routers: Route your traffic when doing online banking, Paypal, Ebay, etc.Printers/Fax: How many times have you printed sensitive information?The benefits of attacking embedded systems are myriad, he says: No one pays attention to them until they break, security and logging are often sacrificed to save money, and there’s often no interactive user to deal with. “Embedded systems contain vulnerabilities that go unnoticed (because) vendors are focused on profit, which never equals security,” he said.In one chilling part of his presentation, Asadoorian points to how researchers scanning the Internet for vulnerable embedded devices have found nearly 21,000 routers, webcams and VoIP products open to remote attack. Their administrative interfaces are viewable from anywhere on the Internet and their owners have failed to change the manufacturer’s default password.So if Dr. Evil smartened up and decided to go after this target-rich environment, what might he do? Asadoorian offered up the following examples:Using Google to find the most popular ISPs that provide cable modem routers to usersUsing ARIN to discover the IP address ranges assigned ISPsUsing Nmap to discover all devices that have port 80 open and identify the serviceManually poke through results and find “interesting stuff”Enter SecurityFAIL.com, which the security community can use to put pressure on embedded system providers to close their security flaws. It’s a public wiki where people can write mini-articles on security failures. The first section is dedicated to embedded systems and participants can offer up personal anecdotes on how embedded security have failed them personally.Participants will have to sign up for an account, and Asadoorian says registration will be active in a few weeks. Meantime, those interested in getting started can e-mail him a request or send him their stories anonymously, which he will post. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe