• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

Hacker takes control of hundreds of rooms in hi-tech Shenzhen hotel

KingsOfTheDay

Alfrescian (Inf)
Asset
Joined
Jun 30, 2013
Messages
302
Points
0

Hacker takes control of hundreds of rooms in hi-tech Shenzhen hotel

PUBLISHED : Tuesday, 29 July, 2014, 3:28am
UPDATED : Tuesday, 29 July, 2014, 4:42am

James Griffiths [email protected]

A San Francisco-based cybersecurity expert claims he has hacked and taken control of hundreds of highly automated rooms at a five-star Shenzhen hotel.

Jesus Molina was staying at the St Regis Shenzhen, which provides guests with an iPad and digital "butler" app to control features of the room including the thermostat, lights, and television.

fba125337b4e223d620638fa0f571e49.jpg


The St Regis gives guests an iPad that controls room functions.

"Hotels are particularly bad when it comes to security," Molina said. They're "using all this new technology, which I think is great, but the problem is that the security architecture and security problems are way different than for residential buildings".

With residential automation, Molina explained, most systems will be closed and encrypted. However, in hotels and airports "or any other space where a lot of people access the network", keeping the network secure is far more difficult.

Molina said the KNX automation system the hotel used was also insecure, which made the hack easier. Joost Demarest, a spokesman for the KNX Association, said the most recent version of the standard did feature authentication and encryption and that it was "essential that separate Wi-fi networks are used" for the purposes of guest internet access and automation.

Realising how vulnerable the system was, Molina wrote some code spoofing guest iPads so he could control the room from his laptop. After some investigation, and three room changes, Molina discovered that the network addresses of each room and device within them was sequential, allowing him to write a script to potentially control every one of the hotel's more than 250 rooms.

"I'm an ethical hacker, if you can say that," Molina said, explaining why he didn't immediately plunge the entire hotel into darkness or switch every television to the same channel. Instead, he stood in the corridor and triggered the do-not-disturb lights, "so I knew I was able to control the room and everything inside".

Molina reported the problem to hotel management, which disabled the entire network while they sought a more secure automation solution. Molina said he hoped the hack, and the attention it had received, would lead to more hotels improving their security systems.

In a statement, St Regis Shenzhen said it had "temporarily suspended the control system of the in-room iPad remote controls for system upgrading". The hotel described Molina's claim that he took control of the automation system as "unsubstantiated".

Molina will present his findings at the Black Hat Briefings cybersecurity conference in Las Vegas next month.

"The hotel industry needs to wake up when it comes to security," Molina said of the risk posed to guests by open hotel Wi-fi networks. "People think that they go to these portals and put in their room number and last name and then you access the internet," but anyone connected to the Wi-fi, even non-guests "can still see you, because we're on the same network".

Security experts have long warned of the dangers of public Wi-fi. "We have seen an increase in the misuse of Wi-fi in order to steal information, identity or passwords and money from users who use public or insecure Wi-fi connections," Troels Oerting, head of pan-European police force Europol's cybercrime centre, told the BBC in March.


 
Back
Top