Security risks posed by smart meters

In a world of always-on connectivity, Internet of Everything and Internet of Things, where most devices now have an embedded computer, the risk posed by hackers tampering with them cannot be overlooked.

I don’t have a smart meter at home, but in the near-future, most homes, including mine, will have one. That’s why I like to read and learn as much as I can about the security risks they pose.

And that’s why I’m linking to an article titled Smart Meter Attack Scenarios, written by Rainer Link, a Senior Threat Researcher at Trend Micro, a security outfit with global operations.

Here’s an excerpt

At their heart, a smart meter is simply… a computer. Let’s look at our existing computers – whether they are PCs, smartphones, tablets, or embedded devices. Similarly, these smart meters are communicating via understood technologies: cellular connectivity, power-line networking, or the user’s own Internet connection.

With that in mind, we have to consider the possible threats – what could happen if a smart meter is compromised? Similarly, what are the problems that could result if the connectivity of a smart meter is disrupted? Let us see.

Perhaps the most obvious risk is simple: meter tampering. If a smart meter can be hacked, inaccurate information can be sent back to the utility, allowing an attacker to adjust the reading and resulting in an inflated bill. Let’s say, for example, that you have an argument with your neighbor. In revenge, if he can access your smart meter, you might see a rather large electric bill.

You may read the complete article here.

Smart Meter hacking security risk
The above screenshot was taking from The Risk of Adopting a Smarter Energy Future video.

Related Posts

Secure an Apache website with a Let’s Encrypt SSL certificate on Fedora Editor: This article was originally titled "LetsEncrypt now available in Fedora" and originally published on Fedora Magazine. For correctness, all ref...
EFF Asks Illinois Appellate Court to Block Unmasking of Anonymous Online Critic The Electronic Frontier Foundation (EFF) and the Media Freedom and Information Access Practicum (MFIA) at Yale Law School filed a friend-of-the-court ...
Hooks Hijacked? New Research Shows How To Block Stealthy Malware Attacks The spread of malicious software, also known as malware or computer viruses, is a growing problem that can lead to crashed computer systems, stolen pe...
The K Desktop Environment is 15 Editor: The title of this article is misleading, but trust me, it was not intentional. KDE is actually 16, but KDE e. V., the non-profit organization ...
Debugging a failed Ansible ad hoc command Ansible is an IT automation and configuration management tool. Of all the most popular Free Software applications of its kind, it is the only one that...
Let’s Encrypt will enter public beta on December 3 2015 Let’s Encrypt is an initiative of the Internet Security Research Group (ISRG) with the goal of providing free and automatic SSL certificate installati...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


2 Comments

  1. Lordon Giddy

    Smart meters are a real boon for burglars.

    If the usage information can be retrieved from the smart meter or the utility company’s web site by cracking into the customer’s web account, it is very easy to see a pattern when there is minimal power consumption and therefore the time period when the property is most likely vacant.

    And if the burglar alarm is internet connected as well, well it might be possible to crack that because of careless password protection.

    • Not just for burglars, but any hacker looking to have some fun.

      So I guess in the very near future, hacking a smart meter, like hacking drones, will be for fun and profit.

Leave a Comment

Your email address will not be published. Required fields are marked *

*