Swatters Hack Smart Devices

In a recent spate of swatting attacks, perpetrators have hijacked smart gadgets to watch or live stream the bad joke unfolding and engage the responding officers. Hackers have live-streamed police raids on innocent households after hijacking their victims' smart home devices and making a hoax call to the authorities, the FBI has warned.

These events are the latest escalation of a crime known as "swatting", in which offenders fool armed police or other emergency responders to go to a target's residence.

The US Federal Bureau of Investigation confirms that pranksters are hijacking weakly-secured smart devices in order to live-stream swatting incidents. It said offenders had even spoken to responding officers via the hacked kit.

Swatting has origins in prank calls to emergency services and over the years, callers used increasingly sophisticated techniques to direct response units of particular types. In particular, attempts to have SWAT (US Special Armed Police using special weapons and tactics) teams be dispatched to particular locations spawned the term swatting.

Swatting is a criminal tactic of deceiving an emergency service into sending a police and emergency service response team to another person's address. This is triggered by false reporting of a serious threat. In a statement the FBI said  "Recently, offenders have been using victims' smart devices, including video and audio capable home surveillance devices, to carry out swatting attacks"

To counteract the rising number of swat cases, FBI officials are now working with technology vendors to advise customers on how they could select better passwords for their devices. Furthermore, the FBI said it's also working to alert law enforcement first responders about this new swatting variation. 

Determining a fake emergency call is not always a simple task. Sometimes, offenders spoof the victim's phone number to increase credibility, so the dispatch officer has no reason to suspect a hoax.

Swatting is a criminal offense punishable by fines and prison time as it is considered a public safety issue. The FBI has first warned of this phenomenon since 2008, although it had started much earlier. In 2009, one swatter received more than eleven years in prison for using the tactic to harass various individuals. Another, involved in the 2017 Wichita swatting incident that ended with one individual being fatally shot.

Oodaloop:        Bleeping Computer:        ZDNet:       BBC

You Might Also Read: 

Connected Devices Must Be More Secure:

 

« UAE Creates A Cyber Security Company With Israeli Partners
Healthcare Is The Prize Target For Cyber Criminals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Hillstone Networks

Hillstone Networks

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks – whether physical, virtual, or in the cloud.

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

Crypta Labs

Crypta Labs

Crypta Labs is an Award Winning IOT Security startup that is developing a quantum-based encryption chip to secure the Internet of Things.

IGX Global

IGX Global

IGX Global is a provider of information network and security integration services and products.

Ingalls Information Security

Ingalls Information Security

Ingalls Information Security provides network security, monitoring and forensics.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

Nucleon

Nucleon

Nucleon enables cybersecurity tools, organizations and software developers to become proactive by blocking threats before they become breaches.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

Blueskytec (BST)

Blueskytec (BST)

Blueskytec has applied its experience of over three decades of working in the field of embedded systems and encryption to provide a scalable and appropriate technology for cyber-physical devices.

Invest Ottawa

Invest Ottawa

The IO Accelerator Program is designed to rapidly and systematically accelerate the development and commercial success of high growth technology firms.

CSC Digital Brand Services

CSC Digital Brand Services

Our brand protection and security expertise give our customers peace of mind that no matter how fast the digital world changes, their intellectual property and digital assets will be secure.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

DeepTempo

DeepTempo

At DeepTempo, we build AI models and related software that protect enterprises and service providers from sophisticated cyber threats.