usually included names , emails , and physical addresses , and even personal bank details , ethnicity data , and phone numbers . And the hacks aren ’ t stopping anytime soon . 2017 has already been dominated by numerous data breachesAttack.Databreachand the most recent affects the Association of British Travel Agents , commonly known as ABTA . To keep you in the loop on data breachesAttack.Databreachthis year , WIRED will keep a running tally of successful hacks . The abta.com web server for the Association of British Travel Agents ( ABTA ) was recently hackedAttack.Databreachby “ an external infiltrator ” who exposedAttack.Databreachthe details of 43,000 individuals . Around 1,000 of these included files that could include personal identity information of customers of ABTA members uploaded since 11 January 2017 , while around 650 may also include personal identity information of ABTA members . As the UK ’ s largest travel association , ABTA ’ s members include travel agents and tour operators . The unauthorised accessAttack.Databreachwas said to be possible due to a system vulnerability “ that the infiltrator exploited ” to accessAttack.Databreachsome data provided by some customers of ABTA Members and by ABTA Members themselves . On immediate investigation , ABTA saidVulnerability-related.DiscoverVulnerabilityit identifiedVulnerability-related.DiscoverVulnerabilitythat although ABTA ’ s own IT systems remained secure , there was a vulnerability to the web server managed for ABTA through a third-party web developer and hosting company . “ This , unfortunately , means some documentation uploaded to the website , as well as some information provided by customers , may have been accessedAttack.Databreach, ” ABTA ’ s CEO , Mark Tanzer said . As a precautionary measure , it has taken steps to warn its members and customers of ABTA members who have the potential to be affected . The group has also alerted the relevant authorities , including the Information Commissioner ( ICO ) and the police .
We recently became aware of unauthorised access to the web server supporting abta.com by an external infiltrator exploiting a vulnerability . Specialist technical consultants subsequently confirmed that the web server had been accessed . We are not aware of any information being sharedAttack.Databreachbeyond the infiltrator . We are actively monitoring the situation , but as a precautionary measure we are taking steps to warn both customers of ABTA Members and ABTA Members who have the potential to be affected . We are today contacting these people and providing them with information and guidance to help keep them safe from identity theft or online fraud . We have also alerted the relevant authorities , including the Information Commissioner and the Police . I would personally like to apologise for the anxiety and concern that this incident may cause to any customer of ABTA or ABTA Member who may be affected . It is extremely disappointing that our web server , managed for ABTA through a third party web developer and hosting company , was compromised , and we are taking every step we can to help those affected . I will personally be working with the team to look at what we can learn from this situation . Outlined below , we have answered further questions , which include some guidance for customers of ABTA and ABTA Members . We recently became aware of unauthorised access to the abta.com web server by an external infiltrator . This was possible due to a system vulnerability that the infiltrator exploited to accessAttack.Databreachsome data provided by some customers of ABTA Members and by ABTA Members themselves . On immediate investigation , we identifiedVulnerability-related.DiscoverVulnerabilitythat although ABTA ’ s own IT systems remained secure , there was a vulnerability to the web server for abta.com , which is managed for ABTA through a third-party web developer and hosting company . As a precautionary measure we have taken steps to warn Members and customers of ABTA Members who have the potential to be affected . We have contacted those people and provided them with information and guidance to help keep them safe from identity theft or online fraud . These steps include two dedicated helplines , for customers of ABTA Members and for ABTA Members , and free access to an identity theft protection service offered by Experian . We have also alerted the relevant authorities , including the Information Commissioner and the Police . The unauthorised access may have affected approximately 43,000 individuals . Around 1,000 of these are files that may include personal identity information of customers of ABTA Members ( in support of their complaint about an ABTA Member ) , uploaded since 11 January 2017 ; around 650 may include personal identity information of ABTA Members . The vast majority of the 43,000 relate to people who have registered on abta.com , with email addresses and encrypted passwords , or have filled in an online form with basic contact details which are types of data at a very low exposure risk to identity theft or online fraud . We have provided specific guidance information , including contact details for a dedicated helpline to assist with any further questions . If you think you have been a victim of fraud , report it to Action Fraud online at www.actionfraud.police.uk or call 0300 123 2040 .
Over a quarter of a million devices used with DVRs around the globe are susceptible to a new botnet its discoverers have dubbed Amnesia . Unit 42 researchers at Palo Alto Networks announced on Thursday their detection of a new variant of the IoT/Linux botnet Tsunami , which they are referring to as Amnesia . The Amnesia botnet looks for an unpatched remote code execution vulnerability affectingVulnerability-related.DiscoverVulnerabilityDVR ( digital video recorder ) appliances manufactured by China-based TVT Digital and identifiedVulnerability-related.DiscoverVulnerabilityin nearly identical products from more than 70 global vendors . Unit 42 is claimingVulnerability-related.DiscoverVulnerabilitythat the flaw is impactingVulnerability-related.DiscoverVulnerabilityabout 227,000 devices all over the planet , with Taiwan , the United States , Israel , Turkey , and India being the most susceptible . Further , the researchers believe this is the first Linux malware to adopt virtual machine evasion techniques to defeat malware analysis sandboxes . Not only that , should the code recognize it has reached into VirtualBox , VMware or a QEMU-based virtual machine , it will wipe the virtualized Linux system by deleting all the files in file system , the post stated . `` This affects not only Linux malware analysis sandboxes but also some QEMU based Linux servers on VPS or on public cloud , '' the researchers said . The power is in how the malware can exploit the remote code execution vulnerability to scan for , locate and attack vulnerable systems . Once connected , the malware enables the remote attackers to gain full control of the affected device . The researchers speculate that bad actors could potentially use the Amnesia botnet to launch wide-scale DDoS attacks on a scale previously seen in the fall 2016 with the Mirai botnet . Apparently , no patches have yet been issued to addressVulnerability-related.PatchVulnerabilitythe flaw , the researchers said . As to why a patch has yet to be issued to fixVulnerability-related.PatchVulnerabilitythis year-old flaw , Ryan Olson , intelligence director of Unit 42 at Palo Alto Networks , told SC Media on Thursday that it 's up to the manufacturer to createVulnerability-related.PatchVulnerabilitya patch . His team has n't found any evidence they have released one . The vulnerable DVRs are typically connected to closed circuit TV ( CCTV ) equipment , which are often installed in offices and stores , Olson said . `` The people operating these should limit access to those devices from the internet so they are not exposed to potential malicious actors . '' This , he added , is typically accomplished using a firewall that stops the traffic before it reaches the vulnerable device . The fact that the actors behind this malware are using VM-detection mechanisms in a Linux malware family indicates that they likely have prior experience creating malware , Olson explained . The good news is that no large-scale attacks have yet been launched using the Amnesia botnet , though judging by the harm from Mirai , the researchers at Palo Alto warned the damage large-scale IoT-based botnets could do is substantial . They recommended users have `` the latest protections '' installed and to block traffic to Amnesia 's command-and-control server ( listed in their post )
Developers are once again being blamedVulnerability-related.DiscoverVulnerabilityfor cloud back-end security vulnerabilities , this time in a new reportVulnerability-related.DiscoverVulnerabilityfrom Appthority . The company published investigation results that found nearly 43 TB of enterprise data was exposedAttack.Databreachon cloud back-ends , including personally identifiable information ( PII ) . This comes just shortly after a similar report from a different security company . In the new `` 2017 Q2 Enterprise Mobile Threat Report '' report ( free upon providing registration info ) , Appthority found `` data leakageAttack.Databreach`` from mobile apps that send data to unsecured cloud back-ends . While security concerns typically focus on a triad of other factors -- apps , device threats and network threats -- this data leakageAttack.Databreachon the back-end was dubbed the `` HospitalGown '' threat because of that garment 's open back-end . `` In total , we foundVulnerability-related.DiscoverVulnerabilityalmost 43 TB of data exposedAttack.Databreachand 1,000 apps affectedVulnerability-related.DiscoverVulnerabilityby the HospitalGown vulnerability , '' Appthority saidVulnerability-related.DiscoverVulnerabilityin a blog post last week . `` Looking at a subset of 39 apps , we still found 280 million records exposedAttack.Databreach, a total of about 163 GB of data . This is a staggering amount of leaked information , and in some cases represents the entirety of customer or operational data for an enterprise . '' The reportVulnerability-related.DiscoverVulnerabilityechoes the findings of an earlier reportVulnerability-related.DiscoverVulnerabilityby RedLock Inc. , which revealedVulnerability-related.DiscoverVulnerabilitymany security issues primarily caused by user misconfigurations on public cloud platforms . RedLock claimed it found 82 percent of hosted databases remain unencrypted , among many other problems . As with the RedLock reportVulnerability-related.DiscoverVulnerability, developers were blamedVulnerability-related.DiscoverVulnerabilityfor the HospitalGown vulnerabilities. `` HospitalGown is a vulnerability to data exposure caused , not by any code in the app , but by the app developers ' failure to properly secure the back-end ( hence its name ) servers with which the app communicates and where sensitive data is stored , '' Appthority said . Unsecured Elasticsearch servers and MongoDB databases were prime targets of a series of ransomware attacksAttack.Ransomearlier this year that generated widespread publicity in the security field . However , that publicity apparently was n't enough to significantly alleviate the issue . `` As our findings show , weakly secured back-ends in apps used by employees , partners and customers create a range of security risks including extensive data leaksAttack.Databreachof personally identifiable information ( PII ) and other sensitive data , '' the report states . `` They also significantly increase the risk of spear phishingAttack.Phishing, brute force login , social engineering , data ransomAttack.Ransom, and other attacks . And , HospitalGown makes data accessAttack.Databreachand exfiltrationAttack.Databreachfar easier than other types of attacks . '' Key findings of the report as listed by the company include : Affected apps are connecting to unsecured data stores on popular enterprise services , such as Elasticsearch and MySQL , which are leakingAttack.Databreachlarge amounts of sensitive data . Apps using just one of these services revealed almost 43TB of exposed data . Multiple affected apps leakedAttack.Databreachsome form of PII , including passwords , location , travel and payment details , corporate profile data ( including employees ' VPN PINs , emails , phone numbers ) , and retail customer data . Enterprise security teams do not have visibility into the risk due to the risk 's location in the mobile app vendor 's architecture stack . In multiple cases , data has already been accessedAttack.Databreachby unauthorized individuals and ransomedAttack.Ransom. Even apps that have been removed from devices and the app stores still pose an exposureAttack.Databreachrisk due to the sensitive data that remains stored on unsecured servers . The company saidVulnerability-related.DiscoverVulnerabilityits Mobile Threat Team identifiedVulnerability-related.DiscoverVulnerabilitythe HospitalGown vulnerabilities with a combination of its dynamic app analysis tool and a new back-end scanning method , looking at the network traffic on more than 1 million enterprise mobile apps , both iOS and Android . As with the misconfiguration problems identifiedVulnerability-related.DiscoverVulnerabilityin the RedLock reportVulnerability-related.DiscoverVulnerability, Appthority emphasizedVulnerability-related.DiscoverVulnerabilitythat all cases of HospitalGown vulnerabilities were caused by human errors , not malicious intent or inherent infrastructure problems . That human error was especially prevalent in two app implementations investigated by Appthority : Pulse Workspace ( for accessing enterprise network and Web applications ) and Jacto apps ( from an agricultural machinery company ) .
Developers are once again being blamedVulnerability-related.DiscoverVulnerabilityfor cloud back-end security vulnerabilities , this time in a new reportVulnerability-related.DiscoverVulnerabilityfrom Appthority . The company published investigation results that found nearly 43 TB of enterprise data was exposedAttack.Databreachon cloud back-ends , including personally identifiable information ( PII ) . This comes just shortly after a similar report from a different security company . In the new `` 2017 Q2 Enterprise Mobile Threat Report '' report ( free upon providing registration info ) , Appthority found `` data leakageAttack.Databreach`` from mobile apps that send data to unsecured cloud back-ends . While security concerns typically focus on a triad of other factors -- apps , device threats and network threats -- this data leakageAttack.Databreachon the back-end was dubbed the `` HospitalGown '' threat because of that garment 's open back-end . `` In total , we foundVulnerability-related.DiscoverVulnerabilityalmost 43 TB of data exposedAttack.Databreachand 1,000 apps affectedVulnerability-related.DiscoverVulnerabilityby the HospitalGown vulnerability , '' Appthority saidVulnerability-related.DiscoverVulnerabilityin a blog post last week . `` Looking at a subset of 39 apps , we still found 280 million records exposedAttack.Databreach, a total of about 163 GB of data . This is a staggering amount of leaked information , and in some cases represents the entirety of customer or operational data for an enterprise . '' The reportVulnerability-related.DiscoverVulnerabilityechoes the findings of an earlier reportVulnerability-related.DiscoverVulnerabilityby RedLock Inc. , which revealedVulnerability-related.DiscoverVulnerabilitymany security issues primarily caused by user misconfigurations on public cloud platforms . RedLock claimed it found 82 percent of hosted databases remain unencrypted , among many other problems . As with the RedLock reportVulnerability-related.DiscoverVulnerability, developers were blamedVulnerability-related.DiscoverVulnerabilityfor the HospitalGown vulnerabilities. `` HospitalGown is a vulnerability to data exposure caused , not by any code in the app , but by the app developers ' failure to properly secure the back-end ( hence its name ) servers with which the app communicates and where sensitive data is stored , '' Appthority said . Unsecured Elasticsearch servers and MongoDB databases were prime targets of a series of ransomware attacksAttack.Ransomearlier this year that generated widespread publicity in the security field . However , that publicity apparently was n't enough to significantly alleviate the issue . `` As our findings show , weakly secured back-ends in apps used by employees , partners and customers create a range of security risks including extensive data leaksAttack.Databreachof personally identifiable information ( PII ) and other sensitive data , '' the report states . `` They also significantly increase the risk of spear phishingAttack.Phishing, brute force login , social engineering , data ransomAttack.Ransom, and other attacks . And , HospitalGown makes data accessAttack.Databreachand exfiltrationAttack.Databreachfar easier than other types of attacks . '' Key findings of the report as listed by the company include : Affected apps are connecting to unsecured data stores on popular enterprise services , such as Elasticsearch and MySQL , which are leakingAttack.Databreachlarge amounts of sensitive data . Apps using just one of these services revealed almost 43TB of exposed data . Multiple affected apps leakedAttack.Databreachsome form of PII , including passwords , location , travel and payment details , corporate profile data ( including employees ' VPN PINs , emails , phone numbers ) , and retail customer data . Enterprise security teams do not have visibility into the risk due to the risk 's location in the mobile app vendor 's architecture stack . In multiple cases , data has already been accessedAttack.Databreachby unauthorized individuals and ransomedAttack.Ransom. Even apps that have been removed from devices and the app stores still pose an exposureAttack.Databreachrisk due to the sensitive data that remains stored on unsecured servers . The company saidVulnerability-related.DiscoverVulnerabilityits Mobile Threat Team identifiedVulnerability-related.DiscoverVulnerabilitythe HospitalGown vulnerabilities with a combination of its dynamic app analysis tool and a new back-end scanning method , looking at the network traffic on more than 1 million enterprise mobile apps , both iOS and Android . As with the misconfiguration problems identifiedVulnerability-related.DiscoverVulnerabilityin the RedLock reportVulnerability-related.DiscoverVulnerability, Appthority emphasizedVulnerability-related.DiscoverVulnerabilitythat all cases of HospitalGown vulnerabilities were caused by human errors , not malicious intent or inherent infrastructure problems . That human error was especially prevalent in two app implementations investigated by Appthority : Pulse Workspace ( for accessing enterprise network and Web applications ) and Jacto apps ( from an agricultural machinery company ) .
An alarming number of Android VPNs are providing a decidedly false sense of security to users , especially those living in areas where communication is censored or technology is crucial to the privacy and physical security . A study published recently identified a number of shortcomings common to high percentages of 238 mobile VPN apps analyzed by a handful of researchers . Users downloading and installing these apps expecting secure communication and connections to private networks are instead using apps that lack encryption , are infected with malware , intercept TLS traffic , track user activity , and manipulate HTTP traffic . “ Our experiments revealVulnerability-related.DiscoverVulnerabilityseveral instances of VPN apps that expose users to serious privacy and security vulnerabilities , such as use of insecure VPN tunneling protocols , as well as IPv6 and DNS traffic leakage , ” said researchers Muhammad Ikram , Narseo Vallina-Rodriguez , Suranga Seneviratne , Mohamed Ali Kaafar and Vern Paxson , representing Australia ’ s Commonwealth Scientific and Industrial Research Organization ( AU-CSIRO ) , the University of South Wales , and the International Computer Science Institute at the University of California at Berkeley . Their findings and methodology can be found in a paper : “ An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps ” . “ We also report on a number of apps actively performing TLS interception . Of particular concern are instances of apps that inject JavaScript programs for tracking , advertising , and for redirecting e-commerce traffic to external partners , ” they said . The researchers identifiedVulnerability-related.DiscoverVulnerabilitya core weakness commonly abused in many of the apps called the BIND_VPN_SERVICE , native platform support for VPN clients introduced by Google in 2011 in Android 4.0 . BIND_VPN_SERVICE is used by developers in the creation of clients to intercept , manipulate and forward traffic to a remote proxy or VPN server , or to implement proxies in localhost , the researchers said . It ’ s a powerful Android service that can be easily abused , depending on intent . The paper describes how the Android VPN API exposes a network interface to a requesting app and routes traffic from a phone or tablet to the requesting app . Developers must declare access to the BIND_VPN_SERVICE in the AndroidManifest file , but to only one app at a time . The potential for abuse is high any time traffic is re-routed ; Android counters this with two warnings informing the user that a virtual network interface has been created and remains active .
A series of remotely exploitable vulnerabilities exist inVulnerability-related.DiscoverVulnerabilitya popular web-based SCADA system made by Honeywell that make it easy to expose passwords and in turn , give attackers a foothold into the vulnerable network . The flaws exist inVulnerability-related.DiscoverVulnerabilitysome versions of Honeywell ’ s XL Web II controllers , systems deployed across the critical infrastructure sector , including wastewater , energy , and manufacturing companies . An advisory from the Department of Homeland Security ’ s Industrial Control Systems Cyber Emergency Response Team ( ICS-CERT ) warned aboutVulnerability-related.DiscoverVulnerabilitythe vulnerabilities Thursday . The company has developed a fix , version 3.04.05.05 , to addressVulnerability-related.PatchVulnerabilitythe issues but users have to call their local Honeywell Building Solutions branch to receiveVulnerability-related.PatchVulnerabilitythe update , according to the company . The controllers suffer from five vulnerabilities in total but the scariest one might be the fact that passwords for the controllers are stored in clear text . Furthermore , if attackers wanted to , they could discloseAttack.Databreachthat password simply by accessing a particular URL . An attacker could also carry out a path traversal attack by accessing a specific URL , open and change some parameters by accessing a particular URL , or establish a new user session . The problem with starting a new user session is that the controllers didn ’ t invalidate any existing session identifier , something that could have made it easier for an attacker to steal any active authenticated sessions . Maxim Rupp , an independent security researcher based in Germany , dug upVulnerability-related.DiscoverVulnerabilitythe bugs and teased them on Twitter at the beginning of January . Rupp has identifiedVulnerability-related.DiscoverVulnerabilitybugs in Honeywell equipment before . Two years ago he discoveredVulnerability-related.DiscoverVulnerabilitya pair of vulnerabilities in Tuxedo Touch , a home automation controller made by the company , that could have let an attacker unlock a house ’ s doors or modify its climate controls . It ’ s unclear how widespread the usage of Honeywell ’ s XL Web II controllers is . While Honeywell is a US-based company , according to ICS-CERT ’ s advisory the majority of the affected products are used in Europe and the Middle East . When reached on Friday , a spokesperson for Honeywell confirmed that the affected controllers are used in Europe and the Middle East . The company also stressed that the vulnerabilities were patchedVulnerability-related.PatchVulnerabilityin September 2016 after they were reportedVulnerability-related.DiscoverVulnerabilityin August .
The Internet Systems Consortium patchedVulnerability-related.PatchVulnerabilitythe BIND domain name system this week , addressingVulnerability-related.PatchVulnerabilitya remotely exploitable vulnerability it considers high severity and said could lead to a crash . The issue affectsVulnerability-related.DiscoverVulnerabilityservers that use both the DNS64 and RPZ function simultaneously . DNS64 is a mechanism for synthesizing AAAA records from A records . It ’ s traditionally used to allow IPv6-only clients to receive IPv6 addresses proxied to IPv4 addresses . The RPZ mechanism is used by Domain Name System recursive resolvers to allow for the customized handling of the resolution of collections of domain name information . Versions 9.8.8 , 9.9.3-S1 , 9.9.3 , 9.9.10b1 , 9.10.0 , and 9.10.5b1 , 9.11.0 are all considered vulnerableVulnerability-related.DiscoverVulnerability, according to the ISC . When servers use both mechanisms simultaneously , a vulnerability ( CVE-2017-3135 ) that stems from query processing could result in an inconsistent state , triggering either an INSIST assertion failure or an attempt to read through a NULL pointer , according to a security advisory publishedVulnerability-related.DiscoverVulnerabilityWednesday . The INSIST assertion failure could lead to a subsequent abort , ISC said , while the NULL pointer in some instances can lead to a segmentation fault , which causes the process to be terminated . Ramesh Damodaran and Aliaksandr Shubnik , engineers at Infoblox , a Silicon Valley firm that does DNS , DHCP and IP management , uncoveredVulnerability-related.DiscoverVulnerabilitythe vulnerability and reportedVulnerability-related.DiscoverVulnerabilityit to the ISC . Damodaran previously helped identifiedVulnerability-related.DiscoverVulnerabilityan unspecified packet processing remote denial of service vulnerability in BIND 9 . The Internet Systems Consortium patchedVulnerability-related.PatchVulnerabilitythe BIND domain name system this week , addressingVulnerability-related.PatchVulnerabilitywhat it calls a critical error condition in the software . Researchers find industrial control system malware similar to BlackEnergy , Havex , and Stuxnet going undetected on Google VirusTotal for years . The Internet Systems Consortium ( ISC ) announced it is planning to patchVulnerability-related.PatchVulnerabilityversions of its DHCP to mitigateVulnerability-related.PatchVulnerabilitya denial of service vulnerability .
Avast revealedVulnerability-related.DiscoverVulnerabilitythe findings of its research experiment into smart devices , including public and private webcam vulnerabilities in Spain , and , specifically , in Barcelona . Avast identifiedVulnerability-related.DiscoverVulnerabilitymore than 22,000 webcams and baby monitors in the city that are vulnerableVulnerability-related.DiscoverVulnerabilityto attack , which means that cybercriminals could livestream the videos directly to the Internet . The findings identifiedVulnerability-related.DiscoverVulnerabilitymore than 493,000 smart devices in Barcelona and 5.3 million in Spain overall – including smart kettles , coffee machines , garage doors , fridges , thermostats and other IP-connected devices – that are connected to the internet and vulnerable to attacksVulnerability-related.DiscoverVulnerability. In the experiment , Avast found : Conducted in partnership with IoT search engine Shodan.io , the experiment proves just how easy it is for anyone – including cybercriminals – to scan IP addresses and ports over the Internet and classify what device is on each IP address . And , with a little extra effort and know-how , hackers can also find out the type of device ( webcam , printer , smart kettle , fridge and so on ) , brand , model and the version of software it is running . As webcams and other devices are vulnerableVulnerability-related.DiscoverVulnerability, there are a range of security , legal and privacy concerns to be addressedVulnerability-related.PatchVulnerability. Snoopers could easily access and watchAttack.DatabreachMobile World Congress visitors and Barcelona residents in private and public spaces , and stream the video directly to the internet , or turn the device into a bot . Smart device manufacturers also collect and store private user data , including behavioral data , contact information , and credit card details , which poses an additional risk if interceptedAttack.Databreachby cybercriminals . And while the problem is in no way confined to Barcelona , Spain , or indeed to webcams , it is particularly challenging for the city as it is hosting thousands of mobile and technology industry executives at Mobile World Congress 2017 this week . When a device is infected , it can also be used to infect other devices , to add them to a botnet , or to take control over them and do harm to their owner . This includes kitchen and other household devices , to which cybercriminals can give remote orders , for example , to heat up water in a kettle .
Half a million smart devices including webcams and baby monitors in the city are currently vulnerableVulnerability-related.DiscoverVulnerabilityto cyber attack . BARCELONA , Spain -- ( BUSINESS WIRE ) -- Avast , the leader in digital security products for consumers and businesses , today reveals the findingsVulnerability-related.DiscoverVulnerabilityfrom its latest research experiment into smart devices , including public and private webcam vulnerabilities in Spain , and , specifically , in Barcelona . Avast identifiedVulnerability-related.DiscoverVulnerabilitymore than 22,000 webcams and baby monitors in the city that are vulnerableVulnerability-related.DiscoverVulnerabilityto attack , which means that cybercriminals could livestream the videos directly to the internet . The findings identifiedVulnerability-related.DiscoverVulnerabilitymore than 493,000 smart devices in Barcelona and 5.3 million in Spain overall – including smart kettles , coffee machines , garage doors , fridges , thermostats and other IP-connected devices – that are connected to the internet and vulnerableVulnerability-related.DiscoverVulnerabilityto attacks . As webcams and other devices are vulnerableVulnerability-related.DiscoverVulnerability, there are a range of security , legal and privacy concerns to be addressedVulnerability-related.PatchVulnerability. Snoopers could easily access and watchAttack.DatabreachMobile World Congress visitors and Barcelona residents in private and public spaces , and streamAttack.Databreachthe video directly to the internet , or turn the device into a bot . When a device is infected , it can also be used to infect other devices , to add them to a botnet , or to take control over them and do harm to their owner . This includes kitchen and other household devices , to which cybercriminals can give remote orders , for example , to heat up water in a kettle . Smart device manufacturers also collect and store private user data , including behavioral data , contact information , and credit card details , which poses an additional risk if interceptedAttack.Databreachby cybercriminals . And while the problem is in no way confined to Barcelona , Spain , or indeed to webcams , it is particularly challenging for the city as it is hosting thousands of mobile and technology industry executives at Mobile World Congress 2017 this week . In the experiment , Avast found : Conducted in partnership with IoT search engine specialists Shodan.io , the experiment proves just how easy it is for anyone - including cybercriminals - to scan IP addresses and ports over the Internet and classify what device is on each IP address . And , with a little extra effort and know-how , hackers can also find out the type of device ( webcam , printer , smart kettle , fridge and so on ) , brand , model and the version of software it is running . “ With databases of commonly known device vulnerabilities publicly available , it doesn ’ t take a vast amount of effort and knowledge for cybercriminals to connect the dots and find outVulnerability-related.DiscoverVulnerabilitywhich devices are vulnerableVulnerability-related.DiscoverVulnerability, ” comments Vince Steckler , CEO at Avast . “ And even if the devices are password protected , hackers often gain access by trying out the most common user names and passwords until they crack it ” . Avast ’ s latest research experiment highlights a serious and growing problem which , unless addressed , will only worsen in line with the increasing number of devices connected to the Internet . Vince Steckler , Avast , continues : “ If webcams are set to livestream for example , hackers or anyone can connect , making it easy for cybercriminals to spy on innocent Mobile World Congress trade show visitors , or oblivious school pupils , workers or citizens nearby . In the future , we could also see cases where cybercriminals harvestAttack.Databreachpersonal data , including credit card information from unsuspected IoT users ” . To be aware of vulnerabilities and secure all connected devices against unwanted attacks , users need to contribute to making the online world a safer place by keeping software updated and choosing strong , complex passwords .