{"id":7714,"date":"2017-01-16T08:19:04","date_gmt":"2017-01-16T13:19:04","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=7714"},"modified":"2017-02-03T08:24:52","modified_gmt":"2017-02-03T13:24:52","slug":"lg-smart-tv-infected-ransomware","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/lg-smart-tv-infected-ransomware\/","title":{"rendered":"An LG Smart TV Was Infected with Ransomware"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">On Christmas Day, 2016, a software engineer reported that his family members\u2019 smart TV was hacked. Specifically, their LG smart TV was infected with ransomware. The type of ransomware that infected their TV was called Cyber.Police. This particular type is also known as Frantic Locker, Dogspectus, or FLocker. <\/span><\/p>\n<p><strong><span style=\"font-weight: 400;\">As a recap, ransomware is a type of malware that blocks access to a system or device until the victim pays the hacker a sum of money. After the money is paid, the device or system will be unlocked. In this case, the smart TV was most likely infected by ransomware when the family installed a malicious app onto their TV. Unfortunately, this is a common incident for smartphones, too. That\u2019s why it\u2019s important to regularly scan your devices for malware:<\/span><\/strong><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_quick\" rel=\"attachment wp-att-7530\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-7530\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/02\/Security-Scan.png\" alt=\"Security Scan\" width=\"300\" height=\"78\" \/><\/a><\/center><span style=\"font-weight: 400;\"><br \/>\nThe specific model was an older LG smart TV that ran Google TV. Google discontinued Google TV in 2014. In this incident, the smart TV was unable to be reset manually. The software engineer tried to contact LG to reset the TV, but they wouldn\u2019t do it without charging a high fee. Thanks to the press coverage of this incident, perhaps, LG changed their earlier position and helped him to unlock his family\u2019s TV. The engineer posted the procedure on YouTube, as he felt that the knowledge shouldn\u2019t be kept secret.<\/span><\/p>\n<p><b>Smart TVs Are Insecure<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Unfortunately, smart TVs (and other smart appliances) aren\u2019t as secure as they should be. One reason that they\u2019re more insecure than your smartphone or computer is that they don\u2019t receive frequent security and software updates. There has also been a lot of news lately about new malware that can: attack Wi-Fi routers, infect one device in order to spread malware to every device connected to the same network, and utilize insecure Internet of Things devices to attack a network. As these strains of malware improve, it only puts your smart TV more at risk of being hacked. Thus, the ability of your smart TV \u2014 which has access to your Wi-Fi, and typically has your credit card information stored on it (to purchase movies, etc.), among other sensitive data \u2014 to be hacked is now an even bigger deal.<\/span><\/p>\n<p><b>No Minimum Standard for Device Security<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Further, this could be a manufacturing issue, too. There is no minimum standard for device security in the US. If we really want to ensure that all of the smart products that we\u2019re using are secure, we would encourage regulations to be passed to hold companies accountable for selling insecure products to consumers. The Obama Administration suggested such a measure, but unfortunately, it was never passed.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smart appliances and TVs are all the rage right now. Unfortunately, they\u2019re also susceptible to hacking. Learn about the recent incident with LG now.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[],"class_list":["post-7714","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=7714"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7714\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=7714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=7714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=7714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}