Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Technology
    3. >Could your smart refrigerator be giving hackers a path to corporate data?
    Technology

    Could Your Smart Refrigerator Be Giving Hackers a Path to Corporate Data?

    Published by Gbaf News

    Posted on April 25, 2019

    5 min read

    Last updated: January 21, 2026

    Add as preferred source on Google
    smart-refrigerator1
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Tags:installing rogue appsInternet of ThingsIP address signaturesecurity risksunhidden API

    By Ray Overby, Key Resources

    The Internet of Things(IoT) market is exploding, with 7 billion[i] IoT devices already in use globally, as well as 17 billion connected devices. We’re gaining the ability to peek inside our refrigerators to check whether we need more milk, turn on the AC system when we’ll be home soon and access security systems remotely.

    Ray Overby

    Ray Overby

    But along with all the excitement the IOT brings, there are also new security risks.The rise of connected devices presents a multitude of new ways that information can be shared among devices, and each device comes with its own vulnerabilities.

    Strava and T-Mobile have both recently learned this lesson the hard way. Earlier this year, it was revealed that any military personnel using Strava[ii], a fitness app, may have unwittingly shared the location of military bases, causing potential security breaches.

    T-Mobile[iii], meanwhile, discovered in August that hackers had located an unauthenticated, unhidden API on their servers, through the T-Mobile app itself. That breach allowed hackers to steal the names, billing information, phone numbers, email addresses, account information and encrypted passwords of more than two million users.

    Clearly, these new vulnerabilities are an issue, but not just when it comes to consumers and their personal information – also for businesses. With so many mobile phones and connected smart devices traveling around, in and out of offices, hackers have endless entry points to infiltrate and access all the information available on these business networks.

    Once a bad actor has gained access to the network, it easily becomes a hacker’s playground. They can make lateral moves to access various systems within the network, including the mainframe.It’s a lot easier than one might think to access a business’s mainframe by hacking an employee’s mobile phone or other connected smart device.

    From an employee’s cell phone to smart refrigerator, there are a number of new ways hackers can get into corporate networks. Here are two scenarios.

    The Corporate Scenario

    Whether employees use a personal or company-issued phone, many organizations allow them to run simple apps that provide access to data stored on the mainframe.Think of apps like email or Simple 3270. Once one of these apps is installed on an employee’s phone, the only step hackers need to take is to get you to run a bad script on your phone that allows entry of a virus.

    Once installed, a virus can monitor your use of the phone, log which apps you are using, log all keystrokes and log all IP addresses, both local and destination,you’re connected to. Then, the virus frequently phones home to the hacker, posting all the phone’s activity for the bad guys to scoop up and utilize.

    Even if there is no specific app on the phone that grants access to mainframe data, the malware on the phone can monitor your location. When you’re at work, it will then probe the network you connect to. If the mainframe is not buried behind a heavily protected firewall (isolated from the employee public-use network), the company could be compromised.

    The Three Letter Agency Scenario

    Hackers may also take the route of installing rogue apps, like a rootkit, on a cell phone. All that it takes is that your unlocked phone is out of your possession for a mere twenty seconds. The preferred app to load on the target’s phone is the rootkit.

    One of the most frightening aspects of these rootkits is that they’re able to mask their own existence. Employees with infected cell phones likely wouldn’t know that a rootkit had been installed on their phone. Instead, the rootkit hides in the background, doing its masters bidding.

    Rootkits typically install themselves with the highest level of security access to the device. They embed themselves in many apps, so that even when the malware code itself is found and removed from one location, it is alerted in many other locations. This way, the rootkit can take action to remain in control of the device.

    From this point on, the device should be considered compromised. It’s nearly impossible to cut the rootkit’s access.If you kill the Wi-Fi, it will switch to 4G. If you kill the 4G, it will wait until any other path to its master is available. All while logging all your attempts to regain control of your device, and happily reporting back to its master.

    Meanwhile,the device can monitor all networks that the phone connects to and test for a mainframe IP address signature. The mainframe IP address signature is identified by the behavior and tags returned on the responding ports. In this way, rootkits can help hackers locate the mainframe and retrieve the information kept on it.

    What’s Next?

    As incredible as it may seem, it’s even conceivable that a hacker could access the business network, or the mainframe, through an employee’s connected refrigerator.Let’s say you have an app on your refrigerator that provides you with a grocery list through the internet.A hacker can gain access to your home network through the refrigerator’s IP address. This is sophisticated, but certainly could be worth a hacker’s time, especially if they’re using your device as an entry point to gain access to an enterprise system.

    With so many IoT and mobile devices connected to corporate networks today, intruders can easily go undetected and unopposed if a business is not properly monitoring the network and effectively protecting the mainframe. That’s why it’s so important that organizations maintain Zero Trust networks and add their mainframes to their vulnerability management processes. As we extend our businesses and digitize our physical environments with IoT devices, a perimeter-based approach to security is useless.

    More from Technology

    Explore more articles in the Technology category

    Image for Innovation Through Partnership: The Role of External Tech Teams
    Innovation Through Partnership: The Role of External Tech Teams
    Image for Nominations Open for Technology Awards 2026
    Nominations Open for Technology Awards 2026
    Image for Nominations Open for Innovation Awards 2026
    Nominations Open for Innovation Awards 2026
    Image for Archie earns industry recognition across G2, Capterra, and SoftwareReviews
    Archie Earns Industry Recognition Across G2, Capterra, and SoftwareReviews
    Image for The Bankaool Transformation: How a Regional Mexican Bank Became a Fintech Disruptor
    The Bankaool Transformation: How a Regional Mexican Bank Became a FinTech Disruptor
    Image for Submit Your Entry Today for Digital Banking Awards 2026
    Submit Your Entry Today for Digital Banking Awards 2026
    Image for Behavioral AI in Financial Services: Moving Beyond Automation Toward Human Understanding
    Behavioral AI in Financial Services: Moving Beyond Automation Toward Human Understanding
    Image for Submit Your Entry for Brand of the Year Awards Technology Bahrain 2026
    Submit Your Entry for Brand of the Year Awards Technology Bahrain 2026
    Image for Entries Now Open for Best Islamic Open Banking Burkina Faso APIs 2026
    Entries Now Open for Best Islamic Open Banking Burkina Faso APIs 2026
    Image for Entrepreneurial Discipline in the AI Economy: Insights from Dmytro Lavryniuk
    Entrepreneurial Discipline in the AI Economy: Insights From Dmytro Lavryniuk
    Image for Entries Now Open for Best New Digital Wallet Innovation Award 2026
    Entries Now Open for Best New Digital Wallet Innovation Award 2026
    Image for Call for Entries: Best Digital Wallet 2026
    Call for Entries: Best Digital Wallet 2026
    View All Technology Posts
    Previous Technology PostPainting a Complete Picture With Unstructured Data
    Next Technology PostBlockchain Can Offer Solutions to Brexit Pitfalls