this post was submitted on 20 May 2024
378 points (98.0% liked)

Technology

59358 readers
5233 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] autotldr@lemmings.world 8 points 5 months ago (5 children)

This is the best summary I could come up with:


That’s because of a vulnerability that two University of California, Santa Cruz students found in internet-connected washing machines in commercial use in several countries, according to TechCrunch.

The two students, Alexander Sherbrooke and Iakov Taranenko, apparently exploited an API for the machines’ app to do things like remotely command them to work without payment and update a laundry account to show it had millions of dollars in it.

CSC never responded when Sherbrooke and Taranenko reported the vulnerability via emails and a phone call in January, TechCrunch writes.

That includes that the company has a published list of commands, which the two told TechCrunch enables connecting to all of CSC’s network-connected laundry machines.

CSC’s vulnerability is a good reminder that the security situation with the internet of things still isn’t sorted out.

For the exploit the students found, maybe CSC shoulders the risk, but in other cases, lax cybersecurity practices have made it possible for hackers or company contractors to view strangers’ security camera footage or gain access to smart plugs.


The original article contains 294 words, the summary contains 171 words. Saved 42%. I'm a bot and I'm open source!

[–] jabathekek@sopuli.xyz 7 points 5 months ago (4 children)

Sherbrooke and Taranenko reported the vulnerability

Finks >:(

[–] SnotFlickerman@lemmy.blahaj.zone 6 points 5 months ago (2 children)

Honestly, in this case, the company in question are even bigger finks because they don't actually care about fixing a vulnerability that could cost them money.

If that speaks to their security practices, well... Let's just say I wouldn't be surprised if customer data was all in an unsecured, unencrypted, plain-text Microsoft Word document.

[–] megaman@discuss.tchncs.de 5 points 5 months ago (1 children)

Im very amused at it being in word rather than .xlsx or .txt, like them going out if their way to make it worse because word is all they know.

[–] jabathekek@sopuli.xyz 5 points 5 months ago

"But word is a text file."

load more comments (1 replies)
load more comments (1 replies)