Homework: Security Topics #1

Research and create a writeup of a security incident, security vulnerability, or other similar probelm according to an assigned topic. The hand-in format requirements are slightly different for this assignment, so please pay close attention! Most students should expect spend in the range of 30 minutes to 2 hours on this assignment, with longer times mostly because you find the topic interesting enough to be worth exploring in depth.

The writeup except for any references/citations must cover the following items and fit onto ONE wide-format (16:9 aspect ratio) slide:

You should plan to present your topic in about 1-2 MINUTES in class. Yes, that's pretty quick, but it will let us get through all the topics in a single class meeting. This means that you should rehearse giving your presentation, which should follow the outline given above for slide contents. If you want to have written notes to work from that's perfectly fine.

If desired you can have a second slide with more detailed references and any additional notes. However, only the FIRST slide will be shown in class. Everything you want to show in class MUST fit on that one slide! All students will be presenting this homework in class, and you'll only be able to talk to your one primary slide.

The hand-in format MUST be an Adobe Acrobat (.pdf) format as a SLIDE IMAGE (not a microsoft word style document; not powerpoint). "Slide image" means 16x9 aspect ratio with large fonts legible in the classroom when projected full screen. Ideally just the one single slide. An optional second slide can be included. This means no separate name slide, no multi-slide substantive presentations, and no animations. It MUST be in Acrobat so that the instructor can put all the presentations into a single file before class to avoid wasting time opening a new file for each presentation. Make sure that the acrobat file is cropped so that the image substantially fills the entire page. (If it has large margins around the slide, nobody will be able to read it when on the screen). For example, the acrobat format of the the web version of course slides for this course is what we're after. Be sure to embed fontsso it displays properly.

Topics: Select the topic corresponding to your attendance number. If your attendance number is higher than the highest topic number, do appropriate modular arithmetic to wrap around down to a defined topic number.

  1. GPS spoofing (many years; pick an example)
  2. Point of Sale malware (many years; pick an example; often abbreviated "POS")
  3. Rivian secret diagnostic menu (2022)
  4. US Colonial Pipeline attack (2021)
  5. ADT security cameras in Texas (2021)
  6. SCRIPT SRC=HTTPS :/ / MJT . XSS . HT LTD (2021)
  7. GE radiology devices default password (2020)
  8. Intel CPU firmware update secret key (2020)
  9. Ultraloq door lock (2020)
  10. Consumer Reports video doorbells (2020) (OK to pick one or give a general summary)
  11. Temi Robots (2020)
  12. ATM Jackpotting (Diebold Nixdorf PRocash 2050xe) (2020)
  13. Dongguan Diqee 360 robotic vacuum (2020)
  14. Minuteman III Maze ransomware (2020)
  15. TCAS spoofing (2020)
  16. Philips Hue smart lightbulbs (2020)
  17. August smart lock pro (2020)
  18. Medtronic carelink (2020)
  19. Apex Legends at PDX airport (2020)
  20. Ring camera ransomware (2019,2020)
  21. Voice deepfake CEO scam (2019)
  22. 600,000 gps trackers (2019)
  23. ZipaMicro Z-Wave smart hub (2019)
  24. Blue Link remote car accessory control (2019)
  25. Medtronic insulin pumps (2019)
  26. Ford F-150 key fob (2019)
  27. iTrack/ProTrack GPS tracking (2019)
  28. Texas tornado siren (2019)
  29. Xiaomi M365 scooter (2019)
  30. Miura M010 Reader (2018)
  31. Strava fitness app/military (2018)
  32. Triton malware/Schneider Triconex attack (2018)
  33. Amazon Key technology (2018)
  34. Aldi store credit card skimmers (2018)
  35. TSMC chip fab shutdown (2018)
  36. Diqee robot vacuum (2018)
  37. Satcom passwords on commercial shipping (PTP) (2018)
  38. Tapplock (2018)
  39. VingCard electronic locks (2018)
  40. BMW Security report (Keen Secuirty) (2018)
  41. Volkswagen Harman MIB attack (2018)
  42. Pet trackers (Kaspersky) (2018)
  43. POS Terminal card hacks (Kaspersky) (2018)
  44. I-SIG traffic lights (2018)
  45. CalAmp/vehicles (2018)
  46. Fish Tank thermometer/casino hack (2018)
  47. Fender guitar amp (2018)
  48. Dell EMC VMAX (2018)
  49. Hanwha SmartCam (2018)
  50. Orangeworm/healthcare equipment (2018)
  51. Prilex ATM malware (2018)
  52. Aadhaar (2018)
  53. UK School CCTV (2018)
  54. MicroLogix PLCs (2018)
  55. Philips imaging software (2018)
  56. Gas pump fraud / Russia (2018)
  57. iPhone unlocking by FBI (2017/2018)
  58. Hospital smart pens (2017)
  59. UK school heating controls (2017)
  60. Lexmark Printer misconfigured (2017)
  61. AMAG keyless entry locks (2017)
  62. Furby (2017)
  63. Vaultek VT20i handgun safe (2017)
  64. Oneplus phones (2017)
  65. Mercedes relay box (keyless entry) (2017)
  66. LogicLocker (2017)
  67. Alex the casino hacker (2017)
  68. Romantik Seehotel ransomware (2017)
  69. LG SmartThinQ (2017)
  70. Mantistek GK2 (2017)
  71. NHS WannaCry (2017)
  72. Ethereum Parity Wallet (2017)
  73. Brickerbot (2017)
  74. Samsung TV (2017)
  75. Vizeo ACR (2017)
  76. Boeing 757 (2017)
  77. Uber breach cover-up (2017)
  78. Cloudpets Teddy Bear (2017)
  79. Circle with Disney (2017)
  80. Smiths Medical syringe infusion pump (2017)
  81. Fitbit (2017)
  82. LockState smart locks (2017)
  83. Hikvision cameras (2017)
  84. Subaru key fob (2017)
  85. Intel management engine (2017)
  86. Equifax (2017)
  87. AdUps (2016)
  88. Voting machine hack (Andrew Appel) (2016)
  89. Frantic Locker on smart TVs(2016)
  90. MUNI fare system (2016)
  91. Mirai attack (2016)
  92. Lappeenranta attack (2016)
  93. Owlet baby monitor (2016)
  94. Levin SQL injection (2016)
  95. Hello Barbie doll (2015)
  96. VTech hack (2015)
  97. Progressive Snapshot dongle (2015)
  98. Samsung smart fridge hack (2015)
  99. Martel body cams (2015)
  100. XCodeGhost (2015)
  101. Nest thermostat (2014)
  102. Trendnet Webcam (2013)
  103. Satis toilet (2013)
  104. Mifare classic (2008)
  105. Keeloq (2007)
  106. Siberian gas pipeline explosion (1982)

Hint, you should find it easy to find material if you enter the phrase for the topic and add one or more of the words: {hack, attack, vulnerability} to start your search for references. As always, Wikipedia might be an OK starting point but we'd like to see you take your material from a primary reference if at all possible. News stories and reputable on-line reporting sources are OK and often the only real source, but use the most credible source you can find with a few minutes of searching. Using multiple sources is fine if appropriately cited. If you want to use a second slide JUST for sources that's OK, but keep the presentation itself to a single slide.

RUBRIC:


Supplemental Reading:

Selected Additional items (there are plenty more not on the list, also see examples in course slides):

If you get stuck, many entries in the list are part of the IoT Hall of Shame. There are WAY too many stories there for us to hit them all. Which is a problem...https://codecurmudgeon.com/wp/iot-hall-shame/