SecTor 2025 | When Hackers Meet Burglars
Why It Matters
As physical systems become networked, cyber intrusions can cause immediate real‑world harm—disrupting safety, operations and revenue—so building owners, vendors and security teams must prioritize OT exposure reduction, patching, access controls and integrated defense. Failure to do so leaves critical infrastructure and occupants vulnerable to costly, disruptive attacks.
Summary
Amir, an offensive security specialist, warned that cyberattacks on smart buildings are rising and shifting from data theft to operational disruption—so-called “siegeware”—citing breaches ranging from Target’s HVAC-supply-chain intrusion to recent ransomware and denial-of-service incidents that shut down hotels, schools, and apartment operations. He defined smart buildings as interconnected HVAC, elevators, cameras and access systems controlled by building automation systems (BAS), and showed how many BAS and OT devices are exposed online and often unpatched or using default credentials. Red teams exploit these weaknesses through internet reconnaissance (Shodan), public documentation, misconfigured remote access, Wi‑Fi scanning and physical social engineering to map and infiltrate building networks. The talk concludes by shifting to defensive measures, arguing that security must be built into smart buildings from the start rather than retrofitted afterward.
Comments
Want to join the conversation?
Loading comments...