Is Your Smart TV at Risk of a Ransomware Cyberattack? featured image

Is Your Smart TV at Risk of a Ransomware Cyberattack?

by John DiGiacomo

Partner

Cyber Security Data Breach

As the number of physical devices that are connected to the internet increases so too does the threat of cyberattacks on physical devices that are part of the Internet of Things. Practically everything that has electronics nowadays is connected online in what is known as the Internet of Things. Vehicles, dishwashing machines, refrigerators, and a number of  personal electronic devices are all part of the Internet of Things. Devices connected to the Internet of Things have a reputation for being vulnerable and insecure, and hackers try to take advantage.

Ransomware Attacks Made on Smart TVs

One type of cyber attack that is becoming more and more common involves the disbursement of ransomware to smart television sets. In many homes across the country people have purchased smart tv sets that are capable of streaming tv programming, but tv streaming comes with the risk of exposure to hackers. Hackers have been using ransomware to hold smart tv sets hostage. The hacks made against tv sets can happen in a number of ways.

  • Taking advantage of insecure network connections, hackers gain access to tv sets and install ransomware. When the set owner turns on the screen, a ransom note is displayed and the tv is rendered useless until the ransom is paid.
  • Hackers can gain access to smart tvs through applications that are downloaded on to the tv set by the user of the tv, for example, through an app for watching downloaded movies.

While tv sets are not a treasure trove of personal data, there is concern about how ransomware might be used in conjunction with smart tv sets that are always on. Voice activated smart tv sets are always monitoring what people say nearby while waiting to receive a voice command to turn on. It could be possible for hackers to gain access to this always-on feature to eavesdrop on people who do not realize that hackers are spying on them through their tv sets.

Devices on the Internet of Things Used for DoS Type Attacks

It is not uncommon for hackers to pull insecure and vulnerable devices belonging to the Internet of Things into bots for a botnet that are used to launch traffic-based attacks on targets, such as Denial of Service type attacks. While “smart” devices are marketed to consumers as physical devices that are connected to the Internet of Things, “smart” only refers to the fact that the device includes technology to connect the device to the internet – the term does not reflect how insecure and vulnerable devices connected to the Internet of Things are. Hackers see smart devices that are connected to the internet as opportunities for conducting their schemes.  

Cyber Threats are Changing and So is the Law

Cybersecurity is one of the most complicated areas of law due to its technical nature, and also due to its constant state of change. If you have been victimized by a cyber attack, you need to get in touch with an cybersecurity lawyer. Revision Legal has worked with countless clients across the country as they deal with their data security breaches. Please feel free to contact the cybersecurity breach lawyers at Revision Legal by using the online form on this page or call us at 855-473-8474.

Image credit: Samsung Newsroom

Extra, Extra!
Recent Posts

Trademarks: What is the Difference Between the Circle R and TM Symbols?

Trademarks: What is the Difference Between the Circle R and TM Symbols?

Trademark

The Circle R and the TM symbols both relate to trademarks and both can be physically placed on products, packaging, advertising materials, websites, etc. The Circle R symbol is an “R” enclosed in a circle (®). While both are trademark-related symbols, there are different eligibility requirements for use, meanings, and implications. Here is a quick […]

Read more about Trademarks: What is the Difference Between the Circle R and TM Symbols?

Is Your E-Commerce Advertising in Compliance With Existing Laws?

Is Your E-Commerce Advertising in Compliance With Existing Laws?

Internet Law

E-commerce businesses must comply with federal and State-level advertising laws and regulations. This is true of any business. But e-commerce businesses face special challenges because there is a whole array of potential methods of innocently, accidentally, or intentionally violating advertising laws. These include the potential to engage in false and deceptive advertising practices, such as […]

Read more about Is Your E-Commerce Advertising in Compliance With Existing Laws?

Put Revision Legal on your side