Hacking into the rest of our technology

Hacking into the rest of our technology June 6, 2012

One of those darn kids invented a monster.  It is called Shodan.  And it threatens everything connected to the internet, which is now pretty much everything:

It began as a hobby for a ­teenage computer programmer named John Matherly, who wondered how much he could learn about devices linked to the Internet.

After tinkering with code for nearly a decade, Matherly eventually developed a way to map and capture the specifications of everything from desktop computers to network printers to Web servers.

He called his fledgling search engine Shodan, and in late 2009 he began asking friends to try it out. He had no inkling it was about to alter the balance of security in cyberspace.

“I just thought it was cool,” said Matherly, now 28.

Matherly and other Shodan users quickly realized they were revealing an astonishing fact: Uncounted numbers of industrial control computers, the systems that automate such things as water plants and power grids, were linked in, and in some cases they were wide open to exploitation by even moderately talented hackers.

Control computers were built to run behind the safety of brick walls. But such security is rapidly eroded by links to the Internet. Recently, an unknown hacker broke into a water plant south of Houston using a default password he found in a user manual. A Shodan user found and accessed the cyclotron at the Lawrence Berkeley National Laboratory. Yet another user found thousands of unsecured Cisco routers, the computer systems that direct data on the networks.

“There’s no reason these systems should be exposed that way,” Matherly said. “It just seems ludicrous.”

The rise of Shodan illuminates the rapid convergence of the real world and cyberspace, and the degree to which machines that millions of people depend on every day are becoming vulnerable to intrusion and digital sabotage. It also shows that the online world is more interconnected and complex than anyone fully understands, leaving us more exposed than we previously imagined.

via Cyber search engine exposes vulnerabilities – The Washington Post.

"They do indeed demonstrably have it harder, yes, at least economically. The cost ratio for ..."

The Prodigal Generation
"On an instinctual level people feel scarcity. It's an innate sense that drives people to ..."

The Prodigal Generation
"I finally got around to reading Uri Berliner's article about NPR. (I had actually flagged ..."

Beliefs as Status Symbols
"I know that after college I did odd jobs for a year before going to ..."

The Prodigal Generation

Browse Our Archives