Skip to Content
Computing

Hackers could turn your garden sprinklers into a cyber weapon

August 8, 2018

Israeli researchers are warning that smart irrigation systems could take down parts of a city’s water system.

Spray and prey: The researchers from Ben-Gurion University found security weaknesses in popular commercial irrigation systems that could allow hackers to turn them on and off remotely. Bad guys could trick them into watering by feeding the web-connected gadgets fake commands directly, or by serving up bogus weather data.

Security leak: Large numbers of zombie sprinklers could be linked in a “botnet” that rapidly drains a city’s water reserves. The researchers claim a botnet of 1,350-odd sprinklers could empty an urban water tower in an hour, and around 24,000 could empty a flood water reservoir overnight.

Amateur hour: There’s plenty of evidence that nation-state hackers are targeting all kinds of critical infrastructure, from power plants to water systems. They’re also launching attacks aimed at crippling big cities, as Atlanta discovered earlier this year. And new research from security firm Cyberreason has shown that amateur hackers are also probing for flaws in the defenses of key systems like power grids.

Plugging holes: The Israeli researchers say they’ve already notified manufacturers of the flaws they’ve found in the software controlling the sprinklers, so hopefully the companies will move fast to fix them.

Deep Dive

Computing

The future of open source is still very much in flux

Free and open software have transformed the tech industry. But we still have a lot to work out to make them healthy, equitable enterprises.

What’s next for the world’s fastest supercomputers

Scientists have begun running experiments on Frontier, the world’s first official exascale machine, while facilities worldwide build other machines to join the ranks.

The beautiful complexity of the US radio spectrum

The United States Frequency Allocation Chart shows how the nation’s precious radio frequencies are carefully shared.

How ubiquitous keyboard software puts hundreds of millions of Chinese users at risk

Third-party keyboard apps make typing in Chinese more efficient, but they can also be a privacy nightmare.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.