According to a recent survey carried out by the security researchers of Kaspersky, in the first half of 2019 just under 40% of the smart buildings he would have suffered at least one information attack aimed at violating its systems. Italy would also be one of the countries most involved in the spread of this phenomenon.
Still in the opinion of Kaspersky it would not be too late to intervene and limit the effects of these malicious actions, in the vast majority of cases it would in fact be attempts based on techniques that are not particularly sophisticated. Since these are direct attacks on homes and offices, the risks of a possible undervaluation of the danger are however evident.
The goal of the attacks would be mainly the sensors, that is the tools used to gather information to activate consequent behaviors. They control the air conditioning systems, the operation of the elevators, the video surveillance systems, the fire alarms, as well as the management of water and electricity supplies.
Illicit activities would be aimed specifically at Internet-connected control workstations, they would be perpetrated trying to inoculate malware is spyware in order to steal login credentials. In not a few cases the presence of ransomware intended to encrypt information that can only be recovered (but not always) following the payment of a ransom.
If on the one hand the attacks conducted through the Net would represent more than a quarter of the analyzed episodes (over 26%), the malicious actions carried out locally through the connection of infected USB devices (in particular pendrive) that would weigh for about 10 would still be widespread. % of the total. Italy, in first place for terminals involved (48.5%), would be followed a short distance from Spain and Great Britain by incidence of the phenomenon.