US warns on traffic-sign hackers after 'Godzilla attack'

2014-06-09 12:20
Post a comment 2
Moscow traffic

Traffic. (Duncan Alfreds, News24)

RELATED ARTICLES

Boston - After hackers played several high-profile pranks with traffic signs, including warning San Francisco drivers of a Godzilla attack, the US government advised operators of electronic highway signs to take "defensive measures" to tighten security.

In May, signs on San Francisco's Van Ness Ave were photographed flashing "Godzilla Attack! Turn Back" and highway signs across North Carolina were tampered with last week to read "Hack by Sun Hacker".

The Department of Homeland Security's Industrial Control Systems Cyber Emergency Response Team, or ICS-Cert, this week advised cities, highway operators and other customers of digital-sign maker Daktronics to take "defensive measures" to minimise the possibility of similar attacks.

It said that information had been posted on the internet advising hackers how to access those systems using default passwords coded into the company's software.

"ICS-Cert recommends entities review sign messaging, update access credentials and harden communication paths to the signs," the agency said in an alert posted on Thursday.

Confidential report

Jody Huntimer, a representative for Daktronics, declined to say if the recent attacks involved the bug reported by ICS-Cert.

"We are working with the ICS-Cert team to clarify the current alert and will release a statement once we have assessed the situation and developed customer recommendations," Huntimer said via e-mail.

Krebs on Security, a widely read security blog, posted a confidential report from the Centre for Internet Strategy, or CIS, which was sent to state security officials. It warned that the pranks created a public safety risk because drivers often slow or stop to view the signs and take pictures.

CIS also predicted that amateur hackers might attempt to hack into other systems in the coming weeks following the 27 May release of Watch Dogs, a video game from Ubisoft focused on hacking critical infrastructure.

"CIS believes it is likely that a small percent of Watch Dog players will experiment with compromising computers and electronic systems outside of game play," the report said.
Read more about: cybercrime

Read Fin24’s Comments Policy

24.com publishes all comments posted on articles provided that they adhere to our Comments Policy. Should you wish to report a comment for editorial review, please do so by clicking the 'Report Comment' button to the right of each comment.

Comment on this story
2 comments
Add your comment
Comment 0 characters remaining