Hackers rewrite smart meter power bill

Powered by SC Magazine
 

Energy data shows what movies customers were watching.

Two German researchers have exploited security holes in a smart meter service to alter energy consumption rates, expose privacy flaws and determine what movies consumers had watched.

Dario Carluccio and Stephan Brinkhaus demonstrated the flaws with German energy company Discovergy at the Chaos Computing Congress in Berlin.

The researchers, also customers, learnt that energy consumption data was sent unencrypted because SSL was malfunctioning.

They intercepted and manipulated the data using Fritzbox! and WireShark and returned to the company a negative energy consumption rate of -106610 kWh.

Similar flaws also allowed Carluccio and Brinkhaus to demonstrate that a customer’s entire power consumption history was stored by Discovergy.

Customers could only access a three month time frame under normal circumstances.

A capability that allowed power consumption to be monitored in two-second intervals was also exploited.

The researchers said they could determine if a particular movie had been watched based on two-second relay data held by Discovergy and accessed through HTTP GET requests.

The company offered the services to allow customers to determine if they had left an electrical appliance switched on if they had left their home.

Discovergy CEO Nikolaus Starzacher said customers would have the option to disable the relay feature.

Copyright © SC Magazine, Australia


Hackers rewrite smart meter power bill
 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 313

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 118

Vote