
Dr Nick Patterson, of Deakin University in Australia, has been widely quoted in the British tabloid press warning about – as the Daily Star puts it – the risk of “ultra-realistic sex robots being used by warped hackers to attack humans”:
“Hackers can hack into a robot or a robotic device and have full control of the connections, arms, legs and other attached tools like in some cases knives or welding devices. Often these robots can be upwards of 200 pounds, and very strong. Once a robot is hacked, the hacker has full control and can issue instructions to the robot. The last thing you want is for a hacker to have control over one of these robots! Once hacked they could absolutely be used to perform physical actions for an advantageous scenario or to cause damage.”
The quote from Dr Patterson doesn’t actually mention “sex robots”, but that hasn’t stopped the press from leading with headlines like these:
- “Sex robot armies: Fears hackers could create killer cyborgs and turn technology on punters”
- “Fears sex robots could be turned into ‘killer cyborgs’ with ‘knives or wielding devices’ if twisted hackers take control”
- “Experts warn that this sex robot could kill you if it’s hacked”, and “Caught with your pants down – Cyber security expert issues bizarre warning that sex robots could be easily hacked and made to kill their owners.”
The truth is, all you need is any robot that interacts with a human in the workplace or in the home. It doesn’t need to be a sex robot.
Of course, the image of armies of murderous sex robots much for a much more exciting headline. But that shouldn’t stop us from recognising that there is a threat posed by robotic devices if they are vulnerable to hackers, and that – in some cases – a compromised robot could endanger humans.
Take, for instance, the example of the domestic UB Tech Alpha 2 robot which researchers recently demonstrated contained vulnerabilities that could allow a malicious hacker to wield a sharp screwdriver around in a rather reckless fashion:
If you’re interested in hearing more about that, be sure to listen to this recent episode of the “Smashing Security” podcast where researcher Scott Helme discussed the threat:
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Identifying, prioritizing, and managing vulnerabilities all the way through to remediation is not only possible, it can be simple right now.
Build a vulnerability management program that works for you with InsightVM by Rapid7. Get started with your free 30-day trial at www.rapid7.com.
That's www.rapid7.com, and thanks very much to Rapid7 for supporting the show. Smashing Security, Episode 39: Whoa, are we talking to a cyborg?
With Carole Theriault and Graham Cluley. Hello, hello, and welcome to Episode 39 of Smashing Security for the 24th of August 2017.
My name is Graham Cluley, and I am joined as always by my good friend and co-host Carole Theriault. Hello, Carole.
Hello, Scott. How are you?
So I spend most of my time trying to break into systems and find security flaws with them so that we can learn about them, fix them, and make everything better as a result.
And this week I thought, hey guys, I thought, Let's start off with a little game. All right?
I've got a bing and a buzz, right? So I've got a bing which means success. And I have a buzz if you get it wrong, right?
I'm going to give you some acronyms and I want you to tell me what they stand for. Okay. Are you up for it?
I think I've probably said this word talking to the press before, and I can't for the life of me remember what it stands for.
This is the new exploit which Mimecast are talking about.
And Mimecast's marketing team came up with this acronym and it stands for Remotely Originated Post-Delivery Email Manipulation Attacks: Keeping Email Risky.
But of course, there are email filters and gateway scans going on between you and your victim.
So at the corporation which you're targeting, they've got all these defenses in place at the email gateway. What can you do?
Well, wouldn't it be fantastic if you could send an email but after it's been sent, after it's actually arrived in someone's inbox, you can actually change its content.
So it's gone past all the filters and— I know it sounds fantastic.
Because if that were possible, an attacker could change a harmless link into a malicious one in an email already delivered to your inbox, remember.
Or they could change the display text in an email to whenever they want to something else. And they don't have to log into your email account to do it, right?
Well, that's what Ropemaker, and I'm not going to read out again what it stands for.
And it does it using some really sneaky CSS tricks, Cascading Style Sheets, which are commonly used in HTML websites, but also in HTML emails to make your inbox all pretty and beautiful.
And the attacker modifies that CSS file and it could, for instance, enable a bad link using the CSS display command, the HTML command, while hiding a good one.
So they can, at a later point, change the email so the good link doesn't appear, but the bad one does.
And this is why many email clients will strip out offending HTML code to prevent the external CSS from being loaded. Yeah, many email clients do that.
Not all of them do it, but many of them will do it.
So certainly on my mail account, if somebody sends me an email, it will say, I'm going to load this external thing and I have to allow that before it will load.
Because if the thing that it's loading has changed, then it would never know that it's different because you've already given permission for that particular message.
And I was reading the Mimecast blog post and what I found quite irritating, actually, a bit annoying, was that Mimecast said, if you want to find out what email clients this works for, you're going to have to download our security advisory, the PDF.
And I thought, oh, fair enough, blah, blah, blah. And of course, they've hidden that behind a lead generation form for their marketing department.
The same marketing department who was so busy coming up with that terrible acronym.
And of course I entered my details, Arnold Aardvark. What company do you work at? Mimecast, I said.
So I gave a Mimecast email and it went ahead and gave me the link, which is fantastic. But anyway, let me save you the bother if you're worried about this.
It is kind of interesting still, the report, if you want to go and download it, but, What they found out was affected clients include Microsoft Outlook, both desktop and mobile, Apple Mail, both on your desktop and on your mobile devices, and Mozilla Thunderbird as well.
In their own tests, web-based email systems like Gmail and Outlook.com, iCloud, they weren't susceptible.
They weren't getting impacted by this, which is probably a good indication that they are used to these kind of attacks or the abuse of CSS and naughty tricks like that going on.
So they put a little bit more effort into doing it.
Now Mimecast are trying to kick up a big fuss about this and get everyone really excited because of course their product has been updated to defend against this particular attack.
And they've been speaking privately to different mail firms for a few months, I think, about this, but they haven't had much success getting them to take it very seriously.
Microsoft got back and said, well, we don't really think this fits into our definition of a vulnerability.
Mimecast even went— they tried to get a CVE number for this.
So a sort of official bug number for it, but they were told, well, actually, none of the vendors are considering this to be a vulnerability, so you can't have one.
And so I think Mimecast are a little bit peeved by this, and that's why they've now gone public and rolled out their lead generation form to try and get people excited and interested.
But I think you don't really need to panic about this that much.
This CSS trick, it's a little bit cheeky, but Mimecast say they haven't seen it being used in the wild.
Some defenses are clearly in place, like the preventing remote content from loading.
Now, what a bad guy could do is they could chuck all of that cheeky CSS code inline into the actual email, which makes the email much, much bigger.
But then of course, it could be picked up by a gateway filter.
The same sort of technology which is looking for spammy tricks could say, "Wait, what's going on here with this?" I think regardless of all of this, my message to people is be careful of unsolicited, unusual email messages.
Always remember when you're hovering your mouse over a link, check out where that link is going to take you, just in case it might be taking you somewhere unexpected.
It is a kind of crafty trick, but I'm not sure it's a case of terror.
I mean, okay, in a way it's a bit like saying, oh, you know, phishing can happen.
The idea is that most of the time it's the same, but just like we update web pages, you can update other things as well.
So I think what surprises me is what we mentioned earlier, that we haven't seen this more often, you know, or we haven't come across this before now, because actually, you know, loading remote content into an email client is quite a cool trick.
So when you click on that link, your web gateway product or your endpoint Smashing Security product could pick up on the fact that that link is phishing or dangerous.
And so there's so many other ways in which you can be defended as well.
Maybe it's just simply too much effort, and maybe so many email clients are blocking remote content by default. I'm not sure.
Maybe people don't automatically click that button every time. I don't know. But yeah, be careful about unsolicited unusual emails.
I don't think Mimecast are going to get too many people excited about this, but maybe we'll see other gateway vendors who think, well, we actually have to look out for these kinds of tricks as well.
It may be a good idea to add that to our heuristics. But what I can say is, feel free to go and download the report and enter a Mimecast email address if you wish.
Scott, what have you got for us as your topic this week?
The two main people that presented this, Adrian Portafeldt from Google and April King from Mozilla, they are both kind of security gurus in their respective organizations.
And it's about how we are progressing towards a fully encrypted web. So obviously when the web first came out, everything was HTTP.
We didn't even have HTTPS or the green padlock or anything like that to look for.
And we're now kind of in this transition period where everything was HTTP and that's kind of the default still and still the thing that everybody expects.
But we're pushing towards an encrypted web. We're pushing towards having HTTPS on absolutely everything.
And they kind of, they did some research in how we're doing, how we're making progress. And from Google and Mozilla, they have access to the telemetry from the browsers.
Now Chrome and Firefox, the two browsers, they both look at how often you are on an HTTPS website and how often you're on an HTTP website.
So they can actually look at it and see over time more and more usage is shifting towards HTTPS. And they actually published the numbers for this.
And we're now actually seeing on Chrome— I have the numbers right here.
On Chrome now, it depends on your operating system, but between 60 and 70% of page loads now take place on HTTPS instead of—
Again, depending on your platform, for some reason we have the most HTTPS usage on ChromeOS. So if you're using something like a Chromebook, yeah.
Next is Mac, next is Windows, and then Android is kind of trailing behind and is reliably the lowest. But they're all well over half.
So we can now say definitively that more than half the time people are browsing on a secure page as opposed to an insecure page.
We need to come away from this standpoint that kind of like right now, HTTP is fine.
If you go to an HTTP website, you don't get any warnings in the browser even though it's completely insecure. The browser doesn't say, hey, whoa, stop.
You know, like, this is terrible. Don't put usernames and passwords and credit card information into this page.
I mean, it's— we're not far away from those alerts really beginning to appear, are we?
It's that right now, if a site goes HTTPS, you have the potential to screw it up. You can get yellow warnings, red warnings, things can break.
If you just stay on HTTP, nothing bad happens. So what they're introducing is, it's essentially what they're saying is the obvious.
If you go to an HTTP page and it asks you for a password or a credit card, the browser will pop up an error and say, whoa, this is not secure.
Because any technical measure or any security measure where we have to convey a message to the billions of people in the world and say, all of you billions of people need to do this thing.
Straight away, you're going to miss like half of them. So we've already missed like half of the planet in population terms.
We've had a report this week that we are the third most popular technology podcast in Zimbabwe.
There've been things like the initiative from Let's Encrypt, which has made certificates freely available for anyone. So you can't use the financial excuse anymore.
It can sometimes be a bit of a pain setting it up.
And I can speak from personal experience here actually, 'cause last weekend the Smashing Security website, so my personal website is HTTPS, Smashing Security website isn't HTTPS, but I thought, yes, I know, but I thought we'd better fix that, right?
And I'm using a podcast hosting service who are very cool.
And so there's some complications there in terms of certificates, but I thought, well, I'll use Cloudflare and I'll chuck that up in front of it.
And I did that and I could go there and all of my browsers and everything was smashing and wonderful. And you know, it was all HTTPS.
And I thought, yeah, we the man, we sorted this out, right? But then I got a tweet from somebody saying, is there a problem with your podcast feed?
And it turned out that Apple Podcasts was popping up a warning about the certificate because I guess the Cloudflare one wasn't matching the one on my website host or whatever it is.
And it was freaking out about it. And of course, you know, I thought, crikey, we might lose those 11 listeners in Zimbabwe. So we, I better turn off HTTPS.
So obviously I'm going to have to go and fix that. Help me, I might speak to you about this offline.
But I think the great thing is, as the browsers begin to alert more and more and warn people that sites may not be secure, there will be pressure from the sales and the marketing people inside companies to say, we've got to get this sorted on our website.
These are people who never cared before about HTTPS.
Your SEO is only small, but it is an SEO boost. Yeah, you can get better performance. And Amazon have proved that the faster your pages load, the more sales you will convert.
You know, there's so many different ways now that you can go to your organization and, you know, if SEO helps you sell it internally and get the budget for the project, there you go.
If it's performance, off we go.
You know, there's so many different things, not just security, because I often find myself not even talking about the security and privacy aspect the effects of HTTPS now, because to be honest, most of the time that's not going to sell it.
It's kind of like the analogy I use a lot is, is Tesla with sustainable transport, right? They're selling sustainable transport, they're selling green cars.
You don't ever hear them talk about that. They just made them look really pretty and go really fast and people buy them. And that's kind of what we're doing with HTTPS now.
No one cares about the security and privacy part. That's the boring bit. I want stuff to go fast and be better.
That's where we're getting to now, which is why we're seeing this surge in adoption because, you know, we're now selling it on all the benefits as well, not just the obvious security and privacy.
Now, instead of me introducing you to Alpha Two, let us watch the promo ad that they used on their Indiegogo campaign, which actually helped them raise $1.5 million to help build this Alpha Two.
$1.5 million? Yeah, dollars, yeah. So here, watch the video. Take a look so you can see what's going on.
It's basically an Amazon Echo with limbs. That's what I'm seeing. Of course, that's what we need, isn't it?
Ethical hackers from ioACTIV found a way to hijack the controls of a number of different Alpha behaviours, one of which is to move its little arm around at random in a stabbing motion.
Okay, take a look. Yeah, yeah.
So this basically allowed an app-to-server missing encryption.
This app-to-server missing encryption made it possible for a man-in-the-middle attack, which allowed it to change the APK URL and install a customized malware on the device or the robot.
So the whole point of this exercise is basically to say that critical vulnerabilities could have been prevented by implementing well-known cybersecurity practices.
And UbiTech are just one of many companies, right? We've dealt with this before, even on the podcast. Graham, you covered a teddy bear thing, didn't you?
He said, "UbiTech has been made aware of the sensationalistic video produced by IOActive featuring the Alpha 2.
The video is an exaggerated depiction of Alpha 2's open-source platform." And he goes on to say, "Alpha 2 robot was designed to be an open-source platform where developers are encouraged to program the robots with code.
UbiTech has fully addressed any concerns raised by IOActive that do not limit our developers from programming their Alpha 2." IOActive told them about this six months ago in January.
So they've had this whole time and they've waited till now to come public with this information. So they've had six months to work on this.
And I don't know why I don't see any, hey, thanks for alerting us to the flaws in our coding, you know, our product is now better than ever, we're really appreciative of that.
And that's why it's taken them so long, they've been programming the robots to tap on their keyboards in order to fix themselves.
And a message to all IoT device manufacturers out there, don't be douches. Bake security in from the get-go, you know, all us consumers will be so grateful for it.
This video though, people have really got to watch it because a worse advert for a robot butler in your house I've never seen. It's the creepiest, most spooky thing imaginable.
I wouldn't want this in my house.
So when I leave my house, it detects my phone leave and then turns off the heating and all of the lights for me.
Yeah, it is a good selling point.
I have a smartphone and a tablet and a laptop which are all kind of internet-connected microphones.
So it's one more internet-connected microphone in the mix rather than, you know, look at this brand new spy device.
I did do this to somebody who was streaming on Twitch the other day, and I asked it to buy something for her. Because you can get it to put things in your Amazon basket.
They weren't good enough for them. No, they called themselves Rapid7.
Identifying, prioritizing, and managing vulnerabilities all the way through to remediation isn't only possible, it can be simple right now.
Build a vulnerability management program that works for you with InsightVM by Rapid7. Get started with your free 30-day trial at www.rapid7.com.
And thanks again to Rapid7 for supporting the show. Welcome back, and it's time for our favorite part of the show, Pick of the Week. Pick of the Week.
We are playing a game called Overcooked, and it's not just on the Switch. You can get it for your PC and your Mac and via Steam and probably on all consoles as well.
And it is fabulous. It is a cooperative cooking game.
So you see, you've got these little guys. And they're racing around in the kitchen.
These particular ones, you're on a pirate ship and you have to get the ingredients and chop them up and clean the dishes.
Now you're playing with your mates, so you're kind of saying to them, hey, go and get the pans, go and get the tomatoes, quick, quick! Where is it? Where's the plate? Plate it up now!
Because you've got to serve it on time. Oh, it looks like a really good family game too. It's a great family game, and it gets more and more bonkers.
At one point you are playing in kitchens which are on the back of trucks going down the motorway, and you're on different trucks, and so they've got to wait for them to time up and then jump from one to the other.
And it is crazy bonkers, let me tell you. And I'm guessing a lot of fun. Hilarious. Quite hilarious. Good pick. You've seen it in a nutshell there. It is enormous fun.
And if you've ever wondered how Gordon Ramsay gets quite so fucking angry, with people in the kitchen, play Overcooked, because in no time at all you'll be saying, "Where's the salad?
Bring this, heat that. You've let it flambé for too long. Get the fire extinguisher." Because you need a fire extinguisher at some point if you leave things on the hot plate.
It is hilarious fun.
Scott, do you have a pick of the week for us?
So my pick of the week, I'm tad concerned about this after our Amazon Echo discussion just now, but my pick of the week is cyborg implants and probably more specifically my cyborg implant.
What?
And one of the things that you can do there, apart from hack everything, is hack your own body and you can get an implant.
It's essentially like all the gubbins from that inside what they call a little bioglass capsule, and they implant it into your hand.
And then, you know, the worst thing for me, so we have keycard access for the building where I hot desk, and forgetting your keycard is a real pain.
And I did it a lot, but now I can literally just wave my hand past the door on the way in and it will open for me.
So if anything, I've made it more difficult for them.
Was that a difficulty? And that's why you thought, oh no, what I need is an actual implant.
Now, I have to admit, I do have a bit of a penchant for the satisfying video. Do you know what I mean when I say that? The videos that kind of—
Okay, just go look for satisfying videos. Okay, at some point when you have time.
I mean, these guys really deserve a proper camera crew to take this because it's just so incredible.
So it's basically the beautiful destruction of 250,000 carefully placed dominoes. Across this humongous track, right?
And it's kind of celebrating games that we've all played in our childhoods. So like Mousetrap and Meccano and Mario Kart. All right, let's—
It's a nightmare setting up Mousetrap, let me tell you.
And a lot of people would say that's a waste of time, but you know, they're so joyous about this destruction, and I just think there's something really gloriously human about it all.
So watch it.
You know, it's going to crash to the Earth and break, but that was the pinnacle moment of it.
Thank you very much, Scott, for coming on the show. And where can people— where's the best place for people to go and find out more about you or follow you online?
I actually have my business card in my hand, but on scotthelme.co.uk is where you will find all of my socials and emails and all of the things I talk about all get published onto my blog.
So it's probably the best place to go.
Go to smashingsecurity.com/store and you can help support the show. Another way you can support the show of course, is by leaving a review on somewhere like iTunes.
We really appreciate it, especially those people in Zimbabwe where we're very popular at the moment.
If you like the show, tell your friends and go to smashingsecurity.com, drop us a line, or follow us on Twitter as well. Until next time, from all of us, cheerio, bye-bye, bye-bye.
Thanks for listening.
Regardless of the tabloid hype, I’m not sure a sex robot really has to be that sophisticated to kill its intended target. For instance, a “female” sex robot would only have to be fitted with a jumbo pencil sharpener to do some pretty serious damage to a male target with kinky intentions, or just give you a particularly aggressive bear-hug.
Other “news” stories that have recently appeared in the Daily Star include “STUNNING Russian TV star who splashed £30,000 on boob job reveals she wants to be a NUN”, “Crocodile turns into a ‘SPEEDBOAT’ to annihilate impala casually hopping across a river”, and “Knickerless star exposes booty in flesh-flash exposé.”
If that’s your kind of thing, hunt for them yourself on the Daily Star‘s website yourself. I don’t think I’ll link to them. Who knows what other unpleasantness lurks inside that seething hell-hole.


What about autonomous car ?