Network security specialists reported a few months ago about the plans by the Japanese government to hack into the inhabitants’ Internet of Things (IoT) devices to test their security measures.
The Japanese government planned to integrate a list of devices that use easy-to-break passwords to, in conjunction with manufacturers and Internet service providers, implement the necessary measures to improve the security of these Devices. While the objective of this plan is understandable, even plausible, the methods thought of by the Japanese government seem too intrusive.
Since March 2019, employees of the National Institute of Communications Technology have been allowed to try to access home IoT devices in Japan. The test has already been performed on more than 200 devices, including routers, webcams and other Internet-connected devices. According to network security experts, when the test is completed, the government sends reports to manufacturers about the vulnerabilities found, as well as a number of recommendations to improve device security.
Figures published by multiple security firms claim that Japan is one of the countries with the highest number of cyberattacks against IoT devices in the world. Concern about information security within the Japanese government increased since the announcement of the Tokyo Olympics in 2020.
Network security experts believe that the Japanese government’s plan involves great risks, but in the long run very poor results will be obtained compared to the effort invested. In addition, most of these devices contain vulnerabilities that could be exploited without the use of passwords, so the Japanese authorities’ approach could be better defined, not to mention that, in the end, these tests, though carried out for a legitimate purpose, remain a cyberattack in practice.
Among other potential drawbacks, the Japanese government announced that it will create a database with all the security vulnerabilities found at the end of the program. In this way, malicious hackers could access this list and carry out a massive campaign to exploit these flaws.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.