Get 35% Off CFI Certifications - Code CFI35
AI Engineer - Learn how to integrate AI into software applications
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a critical cybersecurity vulnerability in the IoT supply chain through this 23-minute DEF CON 33 conference talk. Investigate how major retailers handle returned IoT devices and discover alarming gaps in firmware sanitization practices that could enable mass surveillance, botnet propagation, and persistent backdoors. Learn about groundbreaking research involving the purchase, modification, and return of commercial IoT devices embedded with custom firmware callbacks to test whether retailers properly reset devices before resale. Examine real-world findings that reveal inconsistent sanitization policies across major retailers, with some failing to wipe and reflash firmware completely. Understand how these firmware persistence vulnerabilities create new attack vectors that threat actors could exploit to build persistent IoT botnets, deploy data-exfiltration implants, or establish unauthorized surveillance networks. Gain insights into practical mitigation strategies for manufacturers, retailers, and consumers to address these supply chain security risks and protect against IoT-based attacks that leverage returned device vulnerabilities.
Syllabus
DEF CON 33 - Critically Neglected: Cybersecurity for buildings - Thomas Pope
Taught by
DEFCONConference