Skip to Content
Computing

Hackers could turn your garden sprinklers into a cyber weapon

August 8, 2018

Israeli researchers are warning that smart irrigation systems could take down parts of a city’s water system.

Spray and prey: The researchers from Ben-Gurion University found security weaknesses in popular commercial irrigation systems that could allow hackers to turn them on and off remotely. Bad guys could trick them into watering by feeding the web-connected gadgets fake commands directly, or by serving up bogus weather data.

Security leak: Large numbers of zombie sprinklers could be linked in a “botnet” that rapidly drains a city’s water reserves. The researchers claim a botnet of 1,350-odd sprinklers could empty an urban water tower in an hour, and around 24,000 could empty a flood water reservoir overnight.

Amateur hour: There’s plenty of evidence that nation-state hackers are targeting all kinds of critical infrastructure, from power plants to water systems. They’re also launching attacks aimed at crippling big cities, as Atlanta discovered earlier this year. And new research from security firm Cyberreason has shown that amateur hackers are also probing for flaws in the defenses of key systems like power grids.

Plugging holes: The Israeli researchers say they’ve already notified manufacturers of the flaws they’ve found in the software controlling the sprinklers, so hopefully the companies will move fast to fix them.

Deep Dive

Computing

Inside the hunt for new physics at the world’s largest particle collider

The Large Hadron Collider hasn’t seen any new particles since the discovery of the Higgs boson in 2012. Here’s what researchers are trying to do about it.

How ASML took over the chipmaking chessboard

MIT Technology Review sat down with outgoing CTO Martin van den Brink to talk about the company’s rise to dominance and the life and death of Moore’s Law.

 

How Wi-Fi sensing became usable tech

After a decade of obscurity, the technology is being used to track people’s movements.

VR headsets can be hacked with an Inception-style attack

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.