Menu

SMART HOME FEATURE NEWS

Armis IoT Security Says Airborne Cyber Threats Are in Smart Home Hubs

By Ken Briodagh November 15, 2017

Armis, an enterprise IoT security company, today announced that popular, voice-activated personal assistant devices including the Amazon Echo and Google Home were impacted by BlueBorne vulnerabilities recently discovered by Armis researchers. By exploiting unpatched devices, hackers can take them over, spread malware, and establish a "man-in-the-middle" attack to gain access to critical data, personal information, traffic and networks. BlueBorne is especially dangerous as hackers can execute airborne attacks through any vulnerable Bluetooth-enabled device without having to fool users by clicking on malicious links, downloading a file, or interacting with them in any way. 

In the first wave of BlueBorne vulnerabilities announced, Armis said that more than 5 billion devices were subject to attack. In this new phase, researchers have confirmed the attack surface includes as many as 20 million Amazon Echo and Google Home devices running on Android and Linux. BlueBorne is the first severe airborne vulnerability found to affect the Amazon Echo; it doesn’t require an extensive physical attack. 

Device Demand Climbing
Amazon and Google voice-activated intelligent personal assistants have created a multibillion-dollar market. It is estimated that there are 15 million Amazon Echoes sold and 5 million Google Home devices sold, according to September report by Consumer Intelligence Research Partners (CIRP).  Additional estimates indicate that more than 128 million Echoes will be installed by 2020 and that they will drive more than $10 billion in revenue for the company by then.

“Burgeoning demand for digital personal assistants is expanding the avenues by which attackers can infiltrate consumers’ lives to steal personal information and commit fraud,” said Yevgeny Dibrov, CEO, Armis. “Consumers and businesses need to be aware how their devices are connecting via Bluetooth, and the networks they may be accessing, in order to take security precautions to protect their information.”

Enterprise Impact
In addition to Echo and Google-powered smart devices and assistants being present in consumers’ homes around the world, both are making their way into business environments, with usage taking place from the boardroom to the copy room. Armis data shows that 82% of its customers have the Amazon Echo in their businesses. A 2016 survey from Spiceworks revealed that almost half of IT professionals polled are either using intelligent assistants or will be within three years at their organizations. With the increased adoption of the devices, it become all the more critical that they are secured in their interactions.   

“Rising airborne threats such as BlueBorne and KRACK are a wakeup call to the enterprise that traditional security simply cannot defend against new attack vectors that are targeting IoT and connected devices in the corporate environment,” added Dibrov. “Every organization must gain visibility over sanctioned and unsanctioned IoT devices in their environments. If they don’t,  they’ll be victimized by a breach that can lead to stolen identities for customers and employees,  impact their bottom lines, and even cost top executives their jobs.”

Coordinated Disclosure
Armis coordinated the disclosed these latest BlueBorne vulnerabilities directly with Google and Amazon ahead of making the discovery publicly known. This allowed them to to release appropriate security patches and updates ahead of hackers gaining knowledge of the vulnerabilities. Google has already released patches to its partners to address the BlueBorne vulnerabilities. Both Amazon and Google have released security updates to the Echo and Home respectively. Updates are automatic and users do not have to do anything to get them.


Ken Briodagh is a writer and editor with more than a decade of experience under his belt. He is in love with technology and if he had his druthers would beta test everything from shoe phones to flying cars.

Edited by Ken Briodagh

Editorial Director

SHARE THIS ARTICLE
Related Articles

How to Secure Smart Home Devices in 5 Steps

By: Special Guest    6/20/2018

Are you among the millions of consumers across the world who have an Amazon Echo or a Google Home? A Cisco survey in December 2017 found that only 9 p…

Read More

Cognitive Systems and Qualcomm Partner for Smart Home Awareness

By: Chrissie Cluney    6/12/2018

Cognitive Systems Corporation announced that its Aura WiFi Motion technology has been made an option for customers developing products on Qualcomm Mes…

Read More

Building Smarter Connected Homes with Machine Learning

By: Special Guest    6/7/2018

What makes connected homes smart? First and foremost, it's intelligent processing. Second, it's automation of previously complex manual configuration.

Read More

Coalition to Offer Cyber Insurance for Smart Buildings

By: Ken Briodagh    5/31/2018

Customized Cyber Insurance and Risk Mitigation Tools for Real Estate Developers And Property Managers to Address the Explosion in IoT devices

Read More

Keeping Your Things in Your Orbit: Connecting Even the Littlest Things Using IoT

By: Special Guest    5/29/2018

With all the talk about Industrial IoT, and connected factories, farms and entire cities, we sometimes lose site of the plethora of little things we h…

Read More