โŒ

Reading view

There are new articles available, click to refresh the page.

Microsoft Teams to Begin Sharing Employee Location with Employers Based on Wi-Fi Networks

By: Divya

Microsoft has confirmed a controversial new feature coming to Teams that will automatically reveal employee work locations by detecting which Wi-Fi networks they connect to raising significant concerns about workplace surveillance and hybrid work policies. The feature, documented in Microsoftโ€™s 365 Roadmap and Admin Centre (Message ID MC1081568), will automatically set usersโ€™ work location when [โ€ฆ]

The post Microsoft Teams to Begin Sharing Employee Location with Employers Based on Wi-Fi Networks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

Wi-Fi advocates get win from FCC with vote to allow higher-power devices

The Federal Communications Commission plans to authorize a new category of wireless devices in the 6 GHz Wi-Fi band that will be permitted to operate at higher power levels than currently allowed. The FCC will also consider authorizing higher power levels for certain wireless devices that are only allowed to operate indoors.

The FCC said it scheduled a vote for its January 29 meeting on an order "to create a new category of unlicensed devices... that can operate outdoors and at higher power than previously authorized devices." These so-called Geofenced variable power (GVP) devices operating on the 6 GHz band will "support high data rates suitable for AR/VR, short-range hotspots, automation, and indoor navigation," and "overcome limitations of previous device classes by allowing higher power and outdoor mobility," the FCC said. They will be required to work with geofencing systems to avoid interference withย fixed microwave links and radio astronomy observatories.

FCC Chairman Brendan Carr attributed the FCC's planned action to President Trump in a press release titled, "President Trump Unleashes American Innovation With 6 GHz Win." That's consistent with Carr's relatively new stance that the FCC takes orders from the president, despite his insisting during the Biden era that the FCC must operate independently from the White House.

Read full article

Comments

ยฉ Getty Images | mattjeacock

๊ณ ๋ฐ€๋„ ํ™˜๊ฒฝ ๋Œ€์‘์— ์ดˆ์  ๋งž์ถ˜ ์™€์ดํŒŒ์ด8, 2026๋…„ ์ถœ์‹œ ์ „๋ง

์™€์ดํŒŒ์ด7 ๋ฌด์„  ํ‘œ์ค€์€ 2025๋…„์„ ๊ธฐ์ ์œผ๋กœ ๋ณธ๊ฒฉ์ ์œผ๋กœ ํ™•์‚ฐ๋์ง€๋งŒ, ์™€์ดํŒŒ์ด8 ์—ญ์‹œ ๋น ๋ฅด๊ฒŒ ์ด๋ฅผ ๋’ค์ซ“๊ณ  ์žˆ๋‹ค.

์‹ค์ œ๋กœ ์™€์ดํŒŒ์ด7์€ 2024๋…„ 9์›” ์ตœ์ข… ์ดˆ์•ˆ์ด ํ™•์ •๋๊ณ , 2025๋…„ 7์›” IEEE 802.11be ํ‘œ์ค€์œผ๋กœ ๊ณต์‹ ๋ฐœํ‘œ๋๋‹ค. ์ดํ›„ ๊ธฐ์—…๊ณผ ๊ณต๊ณต, ์†Œ๋น„์ž ์‹œ์žฅ ์ „๋ฐ˜์—์„œ ๋„์ž…์ด ํ™œ๋ฐœํžˆ ์ด๋ค„์ง€๊ณ  ์žˆ๋‹ค.

์™€์ดํŒŒ์ด ์–ผ๋ผ์ด์–ธ์Šค์˜ ๋งˆ์ผ€ํŒ… ๋ถ€์‚ฌ์žฅ ์ œํ”„ ํ”Œ๋ž˜ํ†ค์€ IDC ๋ฆฌ์„œ์น˜ ์ž๋ฃŒ๋ฅผ ์ธ์šฉํ•ด โ€œ2025๋…„ ๋ง๊นŒ์ง€ ์ „ ์„ธ๊ณ„์ ์œผ๋กœ ์•ฝ 5์–ต 8,300๋งŒ ๋Œ€์˜ ์™€์ดํŒŒ์ด7 ๊ธฐ๊ธฐ๊ฐ€ ์ถœํ•˜๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๋ณธ๊ฒฉํ™”๋˜๋Š” ์™€์ดํŒŒ์ด7 ๋„์ž…

์ดˆ๊ธฐ์—๋Š” ๋‹ค์†Œ ๋”๋”˜ ์ถœ๋ฐœ์„ ๋ณด์˜€์ง€๋งŒ, ํ˜„์žฌ ๊ธฐ์—…์€ ์ด์ „ ์„ธ๋Œ€๋ณด๋‹ค ๋น ๋ฅธ ์†๋„๋กœ ์™€์ดํŒŒ์ด7์„ ๋„์ž…ํ•˜๊ณ  ์žˆ๋‹ค.

๋ฌด์„  ๋ธŒ๋กœ๋“œ๋ฐด๋“œ ์–ผ๋ผ์ด์–ธ์Šค์˜ ์ตœ๊ณ ๊ฒฝ์˜์ž ํ‹ฐ์•„๊ณ  ๋กœ๋“œ๋ฆฌ๊ฒŒ์Šค๊ฐ€ ๊ณต์œ ํ•œ ์ž๋ฃŒ์— ๋”ฐ๋ฅด๋ฉด, ์™€์ดํŒŒ์ด7 ์•ก์„ธ์Šค ํฌ์ธํŠธ ์ถœํ•˜๋Ÿ‰์€ 2024๋…„ 2,630๋งŒ ๋Œ€์—์„œ 2025๋…„ 6,650๋งŒ ๋Œ€์— ์ด๋ฅผ ๊ฒƒ์œผ๋กœ ์ „๋ง๋๋‹ค. ์˜ฌํ•ด๋ถ€ํ„ฐ๋Š” ์ด ํ๋ฆ„์ด ๋”์šฑ ๊ฐ€์†ํ™”๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ABI๋ฆฌ์„œ์น˜๋Š” 2026๋…„ ์™€์ดํŒŒ์ด7 ์•ก์„ธ์Šค ํฌ์ธํŠธ ์ถœํ•˜๋Ÿ‰์ด 1์–ต 1,790๋งŒ ๋Œ€์— ๋‹ฌํ•  ๊ฒƒ์œผ๋กœ ๋‚ด๋‹ค๋ดค๋‹ค.

๋ธŒ๋กœ๋“œ์ปด(Broadcom)์˜ ๋ฌด์„  ๋ธŒ๋กœ๋“œ๋ฐด๋“œ ์ปค๋ฎค๋‹ˆ์ผ€์ด์…˜ ๋ถ€๋ฌธ ์ œํ’ˆ ๋งˆ์ผ€ํŒ… ๋””๋ ‰ํ„ฐ ํฌ๋ฆฌ์Šค ์‹œ๋งŒ์Šคํ‚ค๋Š” ๊ธฐ์—… ์‹œ์žฅ์—์„œ ์™€์ดํŒŒ์ด7 ๋„์ž…์ด ์ดˆ๊ธฐ์— ๋”๋Ž ๋˜ ์ด์œ ๊ฐ€ ์ถฉ๋ถ„ํžˆ ์ดํ•ดํ•  ๋งŒํ•˜๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ์‹œ๋งŒ์Šคํ‚ค๋Š” โ€œ์™€์ดํŒŒ์ด7์€ ์™€์ดํŒŒ์ด6E ์ถœ์‹œ ์ดํ›„ ๋น„๊ต์  ์งง์€ ๊ธฐ๊ฐ„ ๋‚ด์— ๋“ฑ์žฅํ–ˆ๋‹ค. ๊ธฐ์—… ์‹œ์žฅ์€ ์žฅ๋น„ ์ถœ์‹œ ์ฃผ๊ธฐ๊ฐ€ ์งง์•„์ง„ ์ƒํ™ฉ์— ์ ์‘ํ•ด์•ผ ํ–ˆ๊ณ , ๋™์‹œ์— ์™€์ดํŒŒ์ด6E ๋„์ž… ์ˆ˜์š”๋„ ์ปธ๋‹คโ€๋ผ๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค. ์ด์–ด โ€œ์ด๋กœ ์ธํ•ด 2024๋…„์—๋Š” ๋„์ž… ์†๋„๊ฐ€ ๋‹ค์†Œ ๋А๋ ธ์ง€๋งŒ, ํ˜„์žฌ๋Š” ๊ธฐ์—…์ด ์™€์ดํŒŒ์ด7์„ ๋น ๋ฅด๊ฒŒ ์ฑ„ํƒํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ์ „ํ–ˆ๋‹ค.

์ด๋Š” ์ˆ˜์น˜๋กœ๋„ ํ™•์ธ๋œ๋‹ค. ์™€์ดํŒŒ์ด ์–ผ๋ผ์ด์–ธ์Šค๋Š” 2026๋…„ ํ•œ ํ•ด ๋™์•ˆ ์ด 11์–ต ๋Œ€์˜ ์™€์ดํŒŒ์ด7 ๊ธฐ๊ธฐ๊ฐ€ ์ถœํ•˜๋  ๊ฒƒ์œผ๋กœ ์ „๋งํ–ˆ๋‹ค. ์ด ๊ฐ€์šด๋ฐ ์‚ฌ๋ฌผ์ธํ„ฐ๋„ท(IoT) ๊ธฐ๊ธฐ๋Š” 1์–ต 9,610๋งŒ ๋Œ€, ํ—ฌ์Šค์ผ€์–ด ๊ธฐ๊ธฐ๋Š” 2,230๋งŒ ๋Œ€, ์†Œ๋น„์ž ๊ธฐ๊ธฐ๋Š” 1์–ต 5,940๋งŒ ๋Œ€์— ์ด๋ฅผ ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค.

๋„์ž…์„ ์ฃผ๋„ํ•˜๋Š” ๋ถ„์•ผ๋Š” ๋Œ€ํ˜• ๊ณต๊ณต์‹œ์„ค๊ณผ ๊ต์œก๊ธฐ๊ด€์ด๋‹ค. ํ”Œ๋ž˜ํ†ค(Platon)์— ๋”ฐ๋ฅด๋ฉด, ํ•ด๋‹น ์˜์—ญ์€ ์™€์ดํŒŒ์ด7์„ ์ฃผํŒŒ์ˆ˜ ํ˜ผ์žก ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๋Š” ํ•ด๋ฒ•์ด์ž ์ƒˆ๋กœ์šด ์‚ฌ์šฉ๋ก€๋ฅผ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•˜๋Š” ๊ธฐ์ˆ ๋กœ ์ธ์‹ํ•˜๊ณ  ์žˆ๋‹ค.

์˜ˆ์ •๋ณด๋‹ค ์•ž๋‹น๊ฒจ์ง„ ์™€์ดํŒŒ์ด8 ์ถœ์‹œ

ํ•˜์ง€๋งŒ 2026๋…„์˜ ์ฃผ์š” ํ™”์ œ๋Š” ์™€์ดํŒŒ์ด8์ผ ๊ฐ€๋Šฅ์„ฑ์ด ํฌ๋‹ค. ์ผ๋ฐ˜์ ์ธ ๋ฌด์„  ๊ธฐ์ˆ  ์„ธ๋Œ€ ์ „ํ™˜ ์ผ์ •๊ณผ ๋‹ฌ๋ฆฌ, ์†Œ๋น„์ž์šฉ ์ œํ’ˆ์ด ์˜ˆ์ƒ๋ณด๋‹ค ํ›จ์”ฌ ์ด๋ฅธ ์‹œ์ ์— ์ถœ์‹œ๋  ์ˆ˜ ์žˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค.

๋ธŒ๋กœ๋“œ์ปด์˜ ์‹œ๋งŒ์Šคํ‚ค๋Š” โ€œ๋ธŒ๋กœ๋“œ์ปด์€ 2025๋…„ 10์›” ์™€์ดํŒŒ์ด8 ์ œํ’ˆ์œผ๋กœ ๊ตฌ์„ฑ๋œ ์ „์ฒด ์ƒํƒœ๊ณ„๋ฅผ ์ถœ์‹œํ–ˆ๋‹ค. ์†Œ๋งค ์‹œ์žฅ์ด ์ด๋Ÿฌํ•œ ์ œํ’ˆ ์ถœ์‹œ ์†Œ์‹์— ๋น ๋ฅด๊ฒŒ ๋ฐ˜์‘ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋˜๋ฉฐ, ์ด๋ฅด๋ฉด 2026๋…„ ์—ฌ๋ฆ„์—๋Š” ์™€์ดํŒŒ์ด8 ์ œํ’ˆ์ด ์‹œ์žฅ์— ๋“ฑ์žฅํ•  ์ˆ˜ ์žˆ๋‹คโ€๋ผ๊ณ  ๋ถ„์„ํ–ˆ๋‹ค.

์ด๋Š” ๊ธฐ์กด ๋ฌด์„  ๊ธฐ์ˆ  ์„ธ๋Œ€ ์ „ํ™˜ ์ฃผ๊ธฐ์™€ ๋น„๊ตํ•ด ๋ˆˆ์— ๋„๊ฒŒ ๋น ๋ฅธ ์†๋„๋‹ค. ์™€์ดํŒŒ์ด8 IEEE 802.11bn ํƒœ์Šคํฌ ๊ทธ๋ฃน์€ 2021๋…„ 5์›” ์ถœ๋ฒ”ํ–ˆ์œผ๋ฉฐ, ํ‘œ์ค€ ์ตœ์ข… ์Šน์ธ ๋ชฉํ‘œ ์‹œ์ ์€ 2028๋…„ 9์›”๋กœ ์„ค์ •๋๋‹ค. ๊ทธ๋Ÿผ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ๋ธŒ๋กœ๋“œ์ปด์˜ ์™€์ดํŒŒ์ด8 ์ƒํƒœ๊ณ„ ์ถœ์‹œ๋Š” ํ‘œ์ค€ ํ™•์ • ์ด์ „์— ์†Œ๋งค์šฉ ์ œํ’ˆ์ด ๋‚˜์˜ฌ ๊ฐ€๋Šฅ์„ฑ์„ ๋†’์ด๊ณ  ์žˆ๋‹ค. 2025๋…„ ์™€์ดํŒŒ์ด7 ์ถœ์‹œ์™€ 2026๋…„ ์ค‘๋ฐ˜์œผ๋กœ ๊ฑฐ๋ก ๋˜๋Š” ์™€์ดํŒŒ์ด8 ์ œํ’ˆ ์ถœ์‹œ ์‹œ์ ์„ ๊ธฐ์ค€์œผ๋กœ ๋ณด๋ฉด, ๋‘ ์„ธ๋Œ€ ๊ฐ„ ๊ฐ„๊ฒฉ์€ ๊ธฐ์กด ์™€์ดํŒŒ์ด ์„ธ๋Œ€ ์ „ํ™˜ ์ฃผ๊ธฐ๋ณด๋‹ค ์งง๋‹ค.

์†Œ๋น„์ž ์‹œ์žฅ์—์„œ๋Š” ๋น„๊ต์  ์ด๋ฅธ ๋„์ž…์ด ์ด๋ค„์งˆ ์ˆ˜ ์žˆ์ง€๋งŒ, ๊ธฐ์—…๊ณผ ํ†ต์‹  ์‚ฌ์—…์ž ์‹œ์žฅ์€ ๋ณด๋‹ค ์ „ํ†ต์ ์ธ ๋„์ž… ๊ฒฝ๋กœ๋ฅผ ๋”ฐ๋ฅผ ๊ฒƒ์œผ๋กœ ๋ณด์ธ๋‹ค. ์‹œ๋งŒ์Šคํ‚ค๋Š” โ€œ๊ธฐ์—…์šฉ ์ œํ’ˆ์€ 2027๋…„ ์ค‘๋ฐ˜์—์„œ ํ›„๋ฐ˜์—์•ผ ์ถœ์‹œ๋  ๊ฐ€๋Šฅ์„ฑ์ด ํฌ๋‹คโ€๋ผ๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค. ๊ทธ๋Š” ๊ธฐ์—…๊ณผ ํ†ต์‹  ์‚ฌ์—…์ž ์‹œ์žฅ์€ ์žฅ๋น„ ๊ต์ฒด ์ฃผ๊ธฐ์™€ ์กฐ๋‹ฌ ์ ˆ์ฐจ๊ฐ€ ๊ธธ์–ด ๋ณด๋‹ค ์‹ ์ค‘ํ•˜๊ฒŒ ์›€์ง์ด๋Š” ๊ฒฝํ–ฅ์ด ์žˆ๋‹ค๊ณ  ์ง„๋‹จํ–ˆ๋‹ค.

์™€์ดํŒŒ์ด8 ๊ฐœ๋ฐœ์„ ์ด๋„๋Š” ๋ฐฐ๊ฒฝ

์™€์ดํŒŒ์ด8์˜ IEEE 802.11bn ํ‘œ์ค€์€ ๊ธฐ์ˆ  ์ง„ํ™” ๊ณผ์ •์—์„œ ํ•˜๋‚˜์˜ ์ „ํ™˜์ ์ด ๋  ์ „๋ง์ด๋‹ค.

์ด๋Š” ์†๋„ ํ–ฅ์ƒ์— ์ดˆ์ ์„ ๋งž์ท„๋˜ ๊ธฐ์กด ์ ‘๊ทผ ๋ฐฉ์‹์—์„œ ๋ฒ—์–ด๋‚˜, ์‹ค์ œ ์‚ฌ์šฉ ํ™˜๊ฒฝ์—์„œ์˜ ์„ฑ๋Šฅ ๊ฐœ์„ ์„ ํ•ต์‹ฌ ๋ชฉํ‘œ๋กœ ์‚ผ๊ณ  ์žˆ๋‹ค. ํŠนํžˆ ์‚ฌ์šฉ์ž ๋ฐ€๋„๊ฐ€ ๋†’๊ณ  ๊ฐ„์„ญ์ด ์žฆ์€ ํ™˜๊ฒฝ์—์„œ ๋ณด๋‹ค ์•ˆ์ •์ ์ธ ์„ฑ๋Šฅ์„ ์ œ๊ณตํ•˜๋Š” ๋ฐ ์ค‘์ ์„ ๋‘”๋‹ค. ์ด ํ‘œ์ค€์€ ์ด๋ก ์ ์ธ ์ตœ๋Œ€ ์ „์†ก ์†๋„๋ฅผ ์™€์ดํŒŒ์ด7๊ณผ ๋™์ผํ•˜๊ฒŒ ์œ ์ง€ํ•˜๋ฉด์„œ๋„, ์ฒด๊ฐ ์ฒ˜๋ฆฌ๋Ÿ‰ ๊ฐœ์„ ๊ณผ ์‹œ๊ฐ„ ๋ฏผ๊ฐํ˜• ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ์œ„ํ•œ ์ง€์—ฐ ์‹œ๊ฐ„ ๊ฐ์†Œ, ํŒจํ‚ท ์†์‹ค ์ตœ์†Œํ™”๋ฅผ ๋ชฉํ‘œ๋กœ ํ•˜๊ณ  ์žˆ๋‹ค.

ํ”Œ๋ž˜ํ†ค์— ๋”ฐ๋ฅด๋ฉด, ์ฐจ์„ธ๋Œ€ ์™€์ดํŒŒ์ด์— ๋Œ€ํ•œ ์™€์ดํŒŒ์ด ์–ผ๋ผ์ด์–ธ์Šค์˜ ์šฐ์„  ๊ณผ์ œ๋Š” ์‹ ๋ขฐ์„ฑ ํ™•๋ณด, ์˜ˆ์ธก ๊ฐ€๋Šฅํ•œ ์ง€์—ฐ ์‹œ๊ฐ„, ๋” ๋น ๋ฅธ ์†๋„, ์ „๋ ฅ ์†Œ๋น„ ์ ˆ๊ฐ์ด๋‹ค. ๊ทธ๋Š” โ€œ์ฐจ์„ธ๋Œ€ ์™€์ดํŒŒ์ด์— ๋Œ€ํ•œ ๊ด€์‹ฌ์ด ์ด๋ฏธ ๋†’์•„์ง€๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋Š” ๊ธ€๋กœ๋ฒŒ ์—ฐ๊ฒฐ์—์„œ ์™€์ดํŒŒ์ด๊ฐ€ ์ฐจ์ง€ํ•˜๋Š” ํ•ต์‹ฌ์ ์ธ ์—ญํ• ์„ ๋‹ค์‹œ ํ•œ๋ฒˆ ๋ณด์—ฌ์ค€๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์™€์ดํŒŒ์ด ์˜คํ”„๋กœ๋”ฉ ํ™•์‚ฐ ๋ณธ๊ฒฉํ™”

๋ฌด์„  ๊ธฐ์ˆ  ์„ธ๋Œ€ ์ „ํ™˜๊ณผ๋Š” ๋ณ„๋„๋กœ, ๋˜ ํ•˜๋‚˜์˜ ํ๋ฆ„์ด ์ฃผ๋ชฉ์„ ๋ฐ›๊ณ  ์žˆ๋‹ค. ๋ฐ”๋กœ ์™€์ดํŒŒ์ด ์˜คํ”„๋กœ๋”ฉ(offload)์ด๋‹ค. ์™€์ดํŒŒ์ด ์˜คํ”„๋กœ๋”ฉ์€ ์ด๋™ํ†ต์‹  ํŠธ๋ž˜ํ”ฝ์˜ ์ผ๋ถ€๋ฅผ ์™€์ดํŒŒ์ด ๋„คํŠธ์›Œํฌ๋กœ ๋ถ„์‚ฐ์‹œ์ผœ ์…€๋ฃฐ๋Ÿฌ ๋„คํŠธ์›Œํฌ ๋ถ€๋‹ด์„ ์ค„์ด๋Š” ๊ธฐ์ˆ ์ด๋‹ค. ์ด๋Š” ์…€๋ฃฐ๋Ÿฌ ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ์ด ์ง€์†์ ์œผ๋กœ ์ฆ๊ฐ€ํ•˜๋Š” ์ƒํ™ฉ์—์„œ ๊ณ ๊ฐ์˜ ์—ฐ๊ฒฐ ๊ฒฝํ—˜๋„ ๊ฐœ์„ ํ•ด์•ผ ํ•˜๋Š” ์ดํ†ตํ†ต์‹ ์‚ฌ์˜ ์ด์ค‘ ๋ถ€๋‹ด์„ ํ•ด๊ฒฐํ•  ๊ธฐ์ˆ ๋กœ ์ฃผ๋ชฉ๋ฐ›๊ณ  ์žˆ๋‹ค.

๋กœ๋“œ๋ฆฌ๊ฒŒ์Šค๋Š” โ€œ2026๋…„์—๋Š” ์—ฌ๋Ÿฌ ์š”์ธ์ด ๋งž๋ฌผ๋ฆฌ๋ฉฐ ์™€์ดํŒŒ์ด ์˜คํ”„๋กœ๋”ฉ์— ๋Œ€ํ•œ ํˆฌ์ž๊ฐ€ ํ™•๋Œ€๋  ๊ฒƒโ€์ด๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์Šค๋งˆํŠธ์‹œํ‹ฐ ์˜์—ญ์—์„œ๋Š” ์ฃผ๋ฏผ๊ณผ ๊ด€๊ด‘๊ฐ์—๊ฒŒ ๋Š๊น€ ์—†๋Š” ๋ฌด๋ฃŒ ์—ฐ๊ฒฐ ํ™˜๊ฒฝ์„ ์ œ๊ณตํ•˜๊ธฐ ์œ„ํ•ด ์™€์ดํŒŒ์ด ์˜คํ”„๋กœ๋”ฉ ๋„์ž…์ด ๋Š˜๊ณ  ์žˆ๋‹ค. ์ด ๊ธฐ์ˆ ์€ ์Šค๋งˆํŠธ ๊ตํ†ต ๊ด€๋ฆฌ๋ถ€ํ„ฐ ์žฌ๋‚œ ์˜ˆ๋ฐฉ ์‹œ์Šคํ…œ์— ์ด๋ฅด๊ธฐ๊นŒ์ง€ ๋‹ค์–‘ํ•œ ๊ณณ์— ํ™œ์šฉ๋  ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ ์˜คํ”ˆ๋กœ๋ฐ ๊ธฐ์ˆ ์˜ ๋ฐœ์ „์œผ๋กœ ์ธ์ฆ๊ณผ ์ ‘์† ๊ณผ์ •์ด ๊ฐ„์†Œํ™”๋˜๋ฉด์„œ, ์ด์šฉ์ž๊ฐ€ ๋ณ„๋„ ์„ค์ • ์—†์ด๋„ ์…€๋ฃฐ๋Ÿฌ์—์„œ ์™€์ดํŒŒ์ด๋กœ ์ž๋™ ์ „ํ™˜๋˜๋Š” ํ™˜๊ฒฝ์ด ๋งˆ๋ จ๋˜๊ณ  ์žˆ๋‹ค. ์ด๋กœ ์ธํ•ด ์™€์ดํŒŒ์ด ์˜คํ”„๋กœ๋”ฉ์„ ์ ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ๋ฒ”์œ„๋„ ๋น ๋ฅด๊ฒŒ ํ™•๋Œ€๋˜๊ณ  ์žˆ๋‹ค.

๋กœ๋“œ๋ฆฌ๊ฒŒ์Šค๋Š” โ€œ์ด๋™ํ†ต์‹ ์‚ฌ๋Š” ์…€๋ฃฐ๋Ÿฌ ๋„คํŠธ์›Œํฌ์—์„œ ๊ณ„์† ์ฆ๊ฐ€ํ•˜๋Š” ํŠธ๋ž˜ํ”ฝ์„ ๊ฐ๋‹นํ•˜๋Š” ๋™์‹œ์— ๊ณ ๊ฐ์˜ ์—ฐ๊ฒฐ ๊ฒฝํ—˜์„ ๊ฐœ์„ ํ•ด์•ผ ํ•˜๋Š” ๊ณผ์ œ๋ฅผ ์•ˆ๊ณ  ์žˆ๋‹ค. ์ด๋กœ ์ธํ•ด ์™€์ดํŒŒ์ด ์˜คํ”„๋กœ๋”ฉ ์—ญ๋Ÿ‰ ํ™•๋Œ€์— ๋‚˜์„ค ์ˆ˜๋ฐ–์— ์—†์„ ๊ฒƒโ€์ด๋ผ๊ณ  ๋ถ„์„ํ–ˆ๋‹ค.
dl-ciokorea@foundryco.com

Turn me on, turn me off: Zigbee assessment in industrial environments

We all encounter IoT and home automation in some form or another, from smart speakers to automated sensors that control water pumps. These services appear simple and straightforward to us, but many devices and protocols work together under the hood to deliver them.

One of those protocols is Zigbee. Zigbee is a low-power wireless protocol (based on IEEE 802.15.4) used by many smart devices to talk to each other. Itโ€™s common in homes, but is also used in industrial environments where hundreds or thousands of sensors may coordinate to support a process.

There are many guides online about performing security assessments of Zigbee. Most focus on the Zigbee you see in home setups. They often skip the Zigbee used at industrial sites, what I call โ€˜non-publicโ€™ or โ€˜industrialโ€™ Zigbee.

In this blog, I will take you on a journey through Zigbee assessments. Iโ€™ll explain the basics of the protocol and map the attack surface likely to be found in deployments. Iโ€™ll also walk you through two realistic attack vectors that you might see in facilities, covering the technical details and common problems that show up in assessments. Finally, I will present practical ways to address these problems.

Zigbee introduction

Protocol overview

Zigbee is a wireless communication protocol designed for low-power applications in wireless sensor networks. Based on the IEEE 802.15.4 standard, it was created for short-range and low-power communication. Zigbee supports mesh networking, meaning devices can connect through each other to extend the network range. It operates on the 2.4 GHz frequency band and is widely used in smart homes, industrial automation, energy monitoring, and many other applications.

You may be wondering why thereโ€™s a need for Zigbee when Wi-Fi is everywhere? The answer depends on the application. In most home setups, Wi-Fi works well for connecting devices. But imagine you have a battery-powered sensor that isnโ€™t connected to your homeโ€™s electricity. If it used Wi-Fi, its battery would drain quickly โ€“ maybe in just a few days โ€“ because Wi-Fi consumes much more power. In contrast, the Zigbee protocol allows for months or even years of uninterrupted work.

Now imagine an even more extreme case. You need to place sensors in a radiation zone where humans canโ€™t go. You drop the sensors from a helicopter and they need to operate for months without a battery replacement. In this situation, power consumption becomes the top priority. Wi-Fi wouldnโ€™t work, but Zigbee is built exactly for this kind of scenario.

Also, Zigbee has a big advantage if the area is very large, covering thousands of square meters and requiring thousands of sensors: it supports thousands of nodes in a mesh network, while Wi-Fi is usually limited to hundreds at most.

There are lots more ins and outs, but these are the main reasons Zigbee is preferred for large-scale, low-power sensor networks.

Since both Zigbee and IEEE 802.15.4 define wireless communication, many people confuse the two. The difference between them, to put it simply, concerns the layers they support. IEEE 802.15.4 defines the physical (PHY) and media access control (MAC) layers, which basically determine how devices send and receive data over the air. Zigbee (as well as other protocols like Thread, WirelessHART, 6LoWPAN, and MiWi) builds on IEEE 802.15.4 by adding the network and application layers that define how devices form a network and communicate.

Zigbee operates in the 2.4 GHz wireless band, which it shares with Wi-Fi and Bluetooth. The Zigbee band includes 16 channels, each with a 2 MHz bandwidth and a 5 MHz gap between channels.

This shared frequency means Zigbee networks can sometimes face interference from Wi-Fi or Bluetooth devices. However, Zigbeeโ€™s low power and adaptive channel selection help minimize these conflicts.

Devices and network

There are three main types of Zigbee devices, each of which plays a different role in the network.

  1. Zigbee coordinator
    The coordinator is the brain of the Zigbee network. A Zigbee network is always started by a coordinator and can only contain one coordinator, which has the fixed address 0x0000.
    It performs several key tasks:
    • Starts and manages the Zigbee network.
    • Chooses the Zigbee channel.
    • Assigns addresses to other devices.
    • Stores network information.
    • Chooses the PAN ID: a 2-byte identifier (for example, 0x1234) that uniquely identifies the network.
    • Sets the Extended PAN ID: an 8-byte value, often an ASCII name representing the network.

    The coordinator can have child devices, which can be either Zigbee routers or Zigbee end devices.

  2. Zigbee router
    The router works just like a router in a traditional network: it forwards data between devices, extends the network range and can also accept child devices, which are usually Zigbee end devices.
    Routers are crucial for building large mesh networks because they enable communication between distant nodes by passing data through multiple hops.
  3. Zigbee end device
    The end device, also referred to as a Zigbee endpoint, is the simplest and most power-efficient type of Zigbee device. It only communicates with its parent, either a coordinator or router, and sleeps most of the time to conserve power. Common examples include sensors, remotes, and buttons.

Zigbee end devices do not accept child devices unless they are configured as both a router and an endpoint simultaneously.

Each of these device types, also known as Zigbee nodes, has two types of address:

  • Short address: two bytes long, similar to an IP address in a TCP/IP network.
  • Extended address: eight bytes long, similar to a MAC address.

Both addresses can be used in the MAC and network layers, unlike in TCP/IP, where the MAC address is used only in Layer 2 and the IP address in Layer 3.

Zigbee setup

Zigbee has many attack surfaces, such as protocol fuzzing and low-level radio attacks. In this post, however, Iโ€™ll focus on application-level attacks. Our test setup uses two attack vectors and is intentionally small to make the concepts clear.

In our setup, a Zigbee coordinator is connected to a single device that functions as both a Zigbee endpoint and a router. The coordinator also has other interfaces (Ethernet, Bluetooth, Wi-Fi, LTE), while the endpoint has a relay attached that the coordinator can switch on or off over Zigbee. This relay can be triggered by events coming from any interface, for example, a Bluetooth command or an Ethernet message.

Our goal will be to take control of the relay and toggle its state (turn it off and on) using only the Zigbee interface. Because the other interfaces (Ethernet, Bluetooth, Wi-Fi, LTE) are out of scope, the attack must work by hijacking Zigbee communication.

For the purposes of this research, we will attempt to hijack the communication between the endpoint and the coordinator. The two attack vectors we will test are:

  1. Spoofed packet injection: sending forged Zigbee commands made to look like they come from the coordinator to trigger the relay.
  2. Coordinator impersonation (rejoin attack): impersonating the legitimate coordinator to trick the endpoint into joining the attacker-controlled coordinator and controlling it directly.

Spoofed packet injection

In this scenario, we assume the Zigbee network is already up and running and that both the coordinator and endpoint nodes are working normally. The coordinator has additional interfaces, such as Ethernet, and the system uses those interfaces to trigger the relay. For instance, a command comes in over Ethernet and the coordinator sends a Zigbee command to the endpoint to toggle the relay. Our goal is to toggle the relay by injecting simulated legitimate Zigbee packets, using only the Zigbee link.

Sniffing

The first step in any radio assessment is to sniff the wireless traffic so we can learn how the devices talk. For Zigbee, a common and simple tool is the nRF52840 USB dongle by Nordic Semiconductor. With the official nRF Sniffer for 802.15.4 firmware, the dongle can run in promiscuous mode to capture all 802.15.4/Zigbee traffic. Those captures can be opened in Wireshark with the appropriate dissector to inspect the frames.

How do you find the channel thatโ€™s in use?

Zigbee runs on one of the 16 channels that we mentioned earlier, so we must set the sniffer to the same channel that the network uses. One practical way to scan the channels is to change the sniffer channel manually in Wireshark and watch for Zigbee traffic. When we see traffic, we know weโ€™ve found the right channel.

After selecting the channel, we will be able to see the communication between the endpoint and the coordinator, though it will most likely be encrypted:

In the โ€œInfoโ€ column, we can see that Wireshark only identifies packets as Data or Command without specifying their exact type, and thatโ€™s because the traffic is encrypted.

Even when Zigbee payloads are encrypted, the network and MAC headers remain visible. That means we can usually read things like source and destination addresses, PAN ID, short and extended MAC addresses, and frame control fields. The application payload (i.e., the actual command to toggle the relay) is typically encrypted at the Zigbee network/application layer, so we wonโ€™t see it in clear text without encryption keys. Nevertheless, we can still learn enough from the headers.

Decryption

Zigbee supports several key types and encryption models. In this post, weโ€™ll keep it simple and look at a case involving only two security-related devices: a Zigbee coordinator and a device that is both an endpoint and a router. That way, weโ€™ll only use a network encryption model, whereas with, say, mesh networks there can be various encryption models in use.

The network encryption model is a common concept. The traffic that we sniffed earlier is typically encrypted using the network key. This key is a symmetric AES-128 key shared by all devices in a Zigbee network. It protects network-layer packets (hop-by-hop) such as routing and broadcast packets. Because every router on the path shares the network key, this encryption method is not considered end-to-end.

Depending on the specific implementation, Zigbee can use two approaches for application payloads:

  • Network-layer encryption (hop-by-hop): the network key encrypts the Application Support Sublayer (APS) data, the sublayer of the application layer in Zigbee. In this case, each router along the route can decrypt the APS payload. This is not end-to-end encryption, so it is not recommended for transmitting sensitive data.
  • Link key (end-to-end) encryption: a link key, which is also an AES-128 key, is shared between two devices (for example, the coordinator and an endpoint).

The link key provides end-to-end protection of the APS payload between the two devices.

Because the network key could allow an attacker to read and forge many types of network traffic, it must be random and protected. Exposing the key effectively compromises the entire network.

When a new device joins, the coordinator (Trust Center) delivers the network key using a Transport Key command. That transport packet must be protected by a link key so the network key is not exposed in clear text. The link key authenticates the joining device and protects the key delivery.

The image below shows the transport packet:

There are two common ways link keys are provided:

  • Pre-installed: the device ships with an installation code or link key already set.
  • Key establishment: the device runs a key-establishment protocol.

A common historical problem is the global default Trust Center link key, โ€œZigBeeAlliance09โ€. It was included in early versions of Zigbee (pre-3.0) to facilitate testing and interoperability. However, many vendors left it enabled on consumer devices, and that has caused major security issues. If an attacker knows this key, they can join devices and read or steal the network key.

Newer versions โ€“ Zigbee 3.0 and later โ€“ introduced installation codes and procedures to derive unique link keys for each device. An installation code is usually a factory-assigned secret (often encoded on the device label) that the Trust Center uses to derive a unique link key for the device in question. This helps avoid the problems caused by a single hard-coded global key.

Unfortunately, many manufacturers still ignore these best practices. During real assessments, we often encounter devices that use default or hard-coded keys.

How can these keys be obtained?

If an endpoint has already joined the network and communicates with the coordinator using the network key, there are two main options for decrypting traffic:

  1. Guess or brute-force the network key. This is usually impractical because a properly generated network key is a random AES-128 key.
  2. Force the device to rejoin and capture the transport key. If we can make the endpoint leave the network and then rejoin, the coordinator will send the transport key. Capturing that packet can reveal the network key, but the transport key itself is protected by the link key. Therefore, we still need the link key.

To obtain the network and link keys, many approaches can be used:

  • The well-known default link key, ZigBeeAlliance09. Many legacy devices still use it.
  • Identify the device manufacturer and search for the default keys used by that vendor. We can find the manufacturer by:
    • Checking the device MAC/OUI (the first three bytes of the 64-bit extended address often map to a vendor).
    • Physically inspecting the device (label, model, chip markings).
  • Extract the firmware from the coordinator or device if we have physical access and search for hard-coded keys inside the firmware images.

Once we have the relevant keys, the decryption process is straightforward:

  1. Open the capture in Wireshark.
  2. Go to Edit -> Preferences -> Protocols -> Zigbee.
  3. Add the network key and any link keys in our possession.
  4. Wireshark will then show decrypted APS payloads and higher-level Zigbee packets.

After successful decryption, packet types and readable application commands will be visible, such as Link Status or on/off cluster commands:

Choose your gadget

Now that we can read and potentially decrypt traffic, we need hardware and software to inject packets over the Zigbee link between the coordinator and the endpoint. To keep this practical and simple, I opted for cheap, widely available tools that are easy to set up.

For the hardware, I used the nRF52840 USB dongle, the same device we used for sniffing. Itโ€™s inexpensive, easy to find, and supports IEEE 802.15.4/Zigbee, so it can sniff and transmit.

The dongle runs the firmware we can use. A good firmware platform is Zephyr RTOS. Zephyr has an IEEE 802.15.4 radio API that enables the device to receive raw frames, essentially enabling sniffer mode, as well as send raw frames as seen in the snippets below.

Using this API and other components, we created a transceiver implementation written in C, compiled it to firmware, and flashed it to the dongle. The firmware can expose a simple runtime interface, such as a USB serial port, which allows us to control the radio from a laptop.

At runtime, the dongle listens on the serial port (for example, /dev/ttyACM1). Using a script, we can send it raw bytes, which the firmware will pass to the radio API and transmit to the channel. The following is an example of a tiny Python script to open the serial port:

I used the Scapy tool with the 802.15.4/Zigbee extensions to build Zigbee packets. Scapy lets us assemble packets layer-by-layer โ€“ MAC โ†’ NWK โ†’ APS โ†’ ZCL โ€“ and then convert them to raw bytes to send to the dongle. We will talk about APS and ZCL in more detail later.

Here is an example of how we can use Scapy to craft an APS layer packet:

from scapy.layers.dot15d4 import Dot15d4, Dot15d4FCS, Dot15d4Data, Dot15d4Cmd, Dot15d4Beacon, Dot15d4CmdAssocResp
from scapy.layers.zigbee import ZigbeeNWK, ZigbeeAppDataPayload, ZigbeeSecurityHeader, ZigBeeBeacon, ZigbeeAppCommandPayload

Before sending, the packet must be properly encrypted and signed so the endpoint accepts it. That means applying AES-CCM (AES-128 with MIC) using the network key (or the correct link key) and adhering to Zigbeeโ€™s rules for packet encryption and MIC calculation. This is how we implemented the encryption and MIC in Python (using a cryptographic library) after building the Scapy packet. We then sent the final bytes to the dongle.

This is how we implemented the encryption and MIC:

Crafting the packet

Now that we know how to inject packets, the next question is what to inject. To toggle the relay, we simply need to send the same type of command that the coordinator already sends. The easiest way to find that command is to sniff the traffic and read the application payload. However, when we look at captures in Wireshark, we can see many packets under ZCL marked [Malformed Packet].

A โ€œmalformedโ€ ZCL packet usually means Wireshark could not fully interpret the packet because the application layer is non-standard or lacks details Wireshark expects. To understand why this happens, letโ€™s look at the Zigbee application layer.

The Zigbee application layer consists of four parts:

  • Application Support Sublayer (APS): routes messages to the correct profile, endpoint, and cluster, and provides application-level security.
  • Application Framework (AF): contains the application objects that implement device functionality. These objects reside on endpoints (logical addresses 1โ€“240) and expose clusters (sets of attributes and commands).
  • Zigbee Cluster Library (ZCL): defines standard clusters and commands so devices can interoperate.
  • Zigbee Device Object (ZDO): handles device discovery and management (out of scope for this post).

To make sense of application traffic, we must introduce three concepts:

  • Profile: a rulebook for how devices should behave for a specific use case. Public (standard) profiles are managed by the Connectivity Standards Alliance (CSA). Vendors can also create private profiles for proprietary features.
  • Cluster: a set of attributes and commands for a particular function. For example, the On/Off cluster contains On and Off commands and an OnOff attribute that displays the current state.
  • Endpoint: a logical โ€œportโ€ on the device where a profile and clusters reside. A device can host multiple endpoints for different functions.

Putting all this together, in the standard home automation traffic we see APS pointing to the home automation profile, the On/Off cluster, and a destination endpoint (for example, endpoint 1). In ZCL, the byte 0x00 often means โ€œOffโ€.

In many industrial setups, vendors use private profiles or custom application frameworks. Thatโ€™s why Wireshark canโ€™t decode the packets; the AF payload is custom, so the dissector doesnโ€™t know the format.

So how do we find the right bytes to toggle the switch when the application is private? Our strategy has two phases.

  1. Passive phase
    Sniff traffic while the system is driven legitimately. For example, trigger the relay from another interface (Ethernet or Bluetooth) and capture the Zigbee packets used to toggle the relay. If we can decrypt the captures, we can extract the application payload that correlates with the on/off action.
  2. Active phase
  3. With the legitimate payload at hand, we can now turn to creating our own packet. There are two ways to do that. First, we need to replay or duplicate the captured application payload exactly as it is. This works if there are no freshness checks like sequence numbers. Otherwise, we have to reverse-engineer the payload and adjust any counters or fields that prevent replay. For instance, many applications include an application-level counter. If the device ignores packets with a lower application counter, we must locate and increment that counter when we craft our packet.

    Another important protective measure is the frame counter inside the Zigbee security header (in the network header security fields). The frame counter prevents replay attacks; the receiver expects the frame counter to increase with each new packet, and will reject packets with a lower or repeated counter.

So, in the active phase, we must:

  1. Sniff the traffic until the coordinator sends a valid packet to the endpoint.
  2. Decrypt the packet, extract the counters and increase them by one.
  3. Build a packet with the correct APS/AF fields (profile, endpoint, cluster).
  4. Include a valid ZCL command or the vendor-specific payload that we identified in the passive phase.
  5. Encrypt and sign the packet with the correct network or link key.
  6. Make sure both the application counter (if used) and the Zigbee frame counter are modified so the packet is accepted.

The whole strategy for this phase will look like this:

If all of the above are handled correctly, we will be able to hijack the Zigbee communication and toggle the relay (turn it off and on) using only the Zigbee link.

Coordinator impersonation (rejoin attack)

The goal of this attack vector is to force the Zigbee endpoint to leave its original coordinatorโ€™s network and join our spoofed network so that we can take control of the device. To do this, we must achieve two things:

  1. Force the endpoint to leave the original network.
  2. Spoof the original coordinator and trick the node into joining our fake coordinator.

Force leaving

To better understand how to manipulate endpoint connections, letโ€™s first describe the concept of a beacon frame. Beacon frames are periodic announcements sent by a coordinator and by routers. They advertise the presence of a network and provide join information, such as:

  • PAN ID and Extended PAN ID
  • Coordinator address
  • Stack/profile information
  • Device capacity (for example, whether the coordinator can accept child devices)

When a device wants to join, it sends a beacon request across Zigbee channels and waits for beacon replies from nearby coordinators/routers. Even if the network is not beacon-enabled for regular synchronization, beacon frames are still used during the join/discovery process, so they are mandatory when a node tries to discover networks.

Note that beacon frames exist at both the Zigbee and IEEE 802.15.4 levels. The MAC layer carries the basic beacon structure that Zigbee then extends with network-specific fields.

Now, we can force the endpoint to leave its network by abusing how Zigbee handles PAN conflicts. If a coordinator sees beacons from another coordinator using the same PAN ID and the same channel, it may trigger a PAN ID conflict resolution. When that happens, the coordinator can instruct its nodes to change PAN ID and rejoin, which causes them to leave and then attempt to join again. That rejoin window gives us an opportunity to advertise a spoofed coordinator and capture the joining node.

In the capture shown below, packet 7 is a beacon generated by our spoofed coordinator using the same PAN ID as the real network. As a result, the endpoint with the address 0xe8fa leaves the network (see packets 14โ€“16).

Choose me

After forcing the endpoint to leave its original network by sending a fake beacon, the next step is to make the endpoint choose our spoofed coordinator. At this point, we assume we already have the necessary keys (network and link keys) and understand how the application behaves.

To impersonate the original coordinator, our spoofed coordinator must reply to any beacon request the endpoint sends. The beacon response must include the same Extended PAN ID (and other fields) that the endpoint expects. If the endpoint deems our beacon acceptable, it may attempt to join us.

I can think of two ways to make the endpoint prefer our coordinator.

  1. Jam the real coordinator
    Use a device that reduces the real coordinatorโ€™s signal at the endpoint so that it appears weaker, forcing the endpoint to prefer our beacon. This requires extra hardware.
  2. Exploit undefined or vendor-specific behavior
    Zigbee stacks sometimes behave slightly differently across vendors. One useful field in a beacon is the Update ID field. It increments when a coordinator changes network configuration.

If two coordinators advertise the same Extended PAN ID but one has a higher Update ID, some stacks will prefer the beacon with the higher Update ID. This is undefined behavior across implementations; it works on some stacks but not on others. In my experience, sometimes it works and sometimes it fails. There are lots of other similar quirks we can try during an assessment.

Even if the endpoint chooses our fake coordinator, the connection may be unstable. One main reason for that is the timing. The endpoint expects ACKs for the frames it sends to the coordinator, as well as fast responses regarding connection initiation packets. If our responder is implemented in Python on a laptop that receives packets, builds responses, and forwards them to a dongle, the round trip will be too slow. The endpoint will not receive timely ACKs or packets and will drop the connection.

In short, weโ€™re not just faking a few packets; weโ€™re trying to reimplement parts of Zigbee and IEEE 802.15.4 that must run quickly and reliably. This is usually too slow for production stacks when done in high-level, interpreted code.

A practical fix is to run a real Zigbee coordinator stack directly on the dongle. For example, the nRF52840 dongle can act as a coordinator if flashed with the right Nordic SDK firmware (see Nordicโ€™s network coordinator sample). That provides the correct timing and ACK behavior needed for a stable connection.

However, that simple solution has one significant disadvantage. In industrial deployments we often run into incompatibilities. In my tests I compared beacons from the real coordinator and the Nordic coordinator firmware. Notable differences were visible in stack profile headers:

The stack profile identifies the network profile type. Common values include 0x00, which is a network-specific (private) profile, and 0x02, which is a Zigbee Pro (public) profile.

If the endpoint expects a network-specific profile (i.e., it uses a private vendor profile) and we provide Zigbee Pro, the endpoint will refuse to join. Devices that only understand private profiles will not join public-profile networks, and vice versa. In my case, I could not change the Nordic firmware to match the proprietary stack profile, so the endpoint refused to join.

Because of this discrepancy, the โ€œflash a coordinator firmware on the dongleโ€ fix was ineffective in that environment. This is why the standard off-the-shelf tools and firmware often fail in industrial cases, forcing us to continue working with and optimizing our custom setup instead.

Back to the roots

In our previous test setup we used a sniffer in promiscuous mode, which receives every frame on the air regardless of destination. Real Zigbee (IEEE 802.15.4) nodes do not work like that. At the MAC/802.15.4 layer, a node filters frames by PAN ID and destination address. A frame is only passed to upper layers if the PAN ID matches and the destination address is the nodeโ€™s address or a broadcast address.

We can mimic that real behavior on the dongle by running Zephyr RTOS and making the dongle act as a basic 802.15.4 coordinator. In that role, we set a PAN ID and short network address on the dongle so that the radio only accepts frames that match those criteria. This is important because it allows the dongle to handle auto-ACKs and MAC-level timing: the dongle will immediately send ACKs at the MAC level.

With the dongle doing MAC-level work (sending ACKs and PAN filtering), we can implement the Zigbee logic in Python. Scapy helps a lot with packet construction: we can create our own beacons with the headers matching those of the original coordinator, which solves the incompatibility problem. However, we must still implement the higher-level Zigbee state machine in our code, including connection initiation, association, network key handling, APS/AF behavior, and application payload handling. Thatโ€™s the hardest part.

There is one timing problem that we cannot solve in Python: the very first steps of initiating a connection require immediate packet responses. To handle this issue, we implemented the time-critical parts in C on the dongle firmware. For example, we can statically generate the packets for connection initiation in Python and hard-code them in the firmware. Then, using โ€œifโ€ statements, we can determine how to respond to each packet from the endpoint.

So, we let the dongle (C/Zephyr) handle MAC-level ACKs and the initial association handshake, but let Python build higher-level packets and instruct the dongle what to send next when dealing with the application level. This hybrid model reduces latency and maintains a stable connection. The final architecture looks like this:

Deliver the key

Hereโ€™s a quick recap of how joining works: a Zigbee endpoint broadcasts beacon requests across channels, waits for beacon responses, chooses a coordinator, and sends an association request, followed by a data request to identify its short address. The coordinator then sends a transport key packet containing the network key. If the endpoint has the correct link key, it can decrypt the transport key packet and obtain the network key, meaning it has now been authenticated. From that point on, network traffic is encrypted with the network key. The entire process looks like this:

The sticking point is the transport key packet. This packet is protected using the link key, a per-device key shared between the coordinator (Trust Center) and the joining endpoint. Before the link key can be used for encryption, it often needs to be processed (hashed/derived) according to Zigbeeโ€™s key derivation rules. Since there is no trivial Python implementation that implements this hashing algorithm, we may need to implement the algorithm ourselves.

I implemented the required key derivation; the code is available on our GitHub.

Now that weโ€™ve managed to obtain the hashed link key and deliver it to the endpoint, we can successfully mimic a coordinator.

The final success

If we follow the steps above, we can get the endpoint to join our spoofed coordinator. Once the endpoint joins, it will often remain associated with our coordinator, even after we power it down (until another event causes it to re-evaluate its connection). From that point on, we can interact with the device at the application layer using Python. Getting access as a coordinator allowed us to switch the relay on and off as intended, but also provided much more functionality and control over the node.

Conclusion

In conclusion, this study demonstrates why private vendor profiles in industrial environments complicate assessments: common tools and frameworks often fail, necessitating the development of custom tools and firmware. We tested a simple two-node scenario, but with multiple nodes the attack surface changes drastically and new attack vectors emerge (for example, attacks against routing protocols).

As we saw, a misconfigured Zigbee setup can lead to a complete network compromise. To improve Zigbee security, use the latest specificationโ€™s security features, such as using installation codes to derive unique link keys for each device. Also, avoid using hard-coded or default keys. Finally, it is not recommended to use the network key encryption model. Add another layer of security in addition to the network level protection by using end-to-end encryption at the application level.

6 Security Awareness Gifts for the Cybersecurity Unaware

Better personal security in everyday life isnโ€™t something everyone considers โ€” at least, not until something goes wrong. Securing home devices and personal accounts can be daunting for those who just arenโ€™t that interested in the devices or cybersecurity. Learning the basics of personal cybersecurity is not the most appealing activity to everyone, and getting lectured by tech-savvy family members isnโ€™t either.

Fortunately, there is a better way to teach cybersecurity. Giving the gift of better security can grant you an opportunity to discuss broader security topics in terms that specifically relate to your loved onesโ€™ daily lives.

Here are six security awareness gifts for the person in your life who just isnโ€™t that into security.

1. A New, More Secure Router

Home Wi-Fi security is an important part of overall personal cybersecurity thatโ€™s commonly overlooked. Default device passwords are often left unchanged after purchases, and owners arenโ€™t always on the lookout for firmware updates. Older router models may also use outdated security protocols, so a new router can be a security awareness gift that secures the home network.

Gifting a new router may also mean spending part of your visit as a family tech support representative who reconnects devices and updates software. As painful as change might seem to your family members, a more secure home network will be worth the effort.

2. A Password Manager Subscription

Password reuse remains a gateway to multiple types of account information, especially as more personal record caches are being exposed online or sold on the dark web. Building better password habits and eliminating reuse can go a long way toward better personal security, and a password manager subscription can be a step in this direction.

As we all know, more secure passwords are but one of the many habits required to secure your digital world. Learning a new login workflow may not be for everyone, and new users may not like the change initially, but they may feel compelled to keep going if they understand how it can help them protect their accounts.

While risk and security vulnerabilities still exist, password managers are still a better tool than weak or reused passwords.

3. Encrypted File Storage/Backups

Ransomware gets a lot of press for good reason. A ransomware attack can result in total data loss when no backup exists, but secure file storage held locally or in the cloud can help eliminate much of the dread associated with data loss after a ransomware attack.

Giving the gift of an external encrypted storage device or a cloud-based encrypted backup service can grant your family members peace of mind. Knowing that important data will be secured even if your machine is overtaken by ransomware can ease worries over potential data loss.

4. Computer Monitor Privacy Filters

Privacy filters for monitors and laptop screens help protect your on-screen activity from prying eyes. They make it nearly impossible for someone to make out whatโ€™s on your screen unless theyโ€™re sitting right in front of it. Commuters and other travelers can benefit from this kind of physical barrier to their private information being displayed in public. Filters can also serve as a physical reminder to employ better personal security practices.

Privacy filters can be removed and may not protect against unauthorized access in cases where devices are stolen. If theyโ€™re used as part of an overall better approach to physical security and cybersecurity, however, they can decrease the likelihood of data loss during travel.

5. Anti-Malware and Ransomware Protection

Protecting against known malware threats and ransomware attacks is a must for personal devices. Not all family members are aware there are solutions to help prevent ransomware attacks. Coupled with an external or cloud-based encrypted backup, an anti-malware and ransomware service subscription can help protect your loved onesโ€™ devices from attacks. Gifting several small security awareness gifts in this way can effectively build up defenses across a variety of otherwise vulnerable channels.

Bear in mind that false positive scan results and software bugs are possible when new definitions are installed, and this could be alarming to a user unfamiliar with anti-malware software. Teaching new users what to expect from their software (including potential bugs) may help to ease their minds.

6. A Virtual Private Network (VPN) Subscription

Virtual private networks (VPNs) can be a good way to separate and encrypt your own traffic away from everything else traveling with your data. They offer significantly more privacy and security compared to a standard internet connection.

As Iโ€™m sure you know, some security awareness gifts may require a little extra work. Finding an appropriate VPN service that is maintained by a reputable company might be a challenge. Also, VPNs can be very helpful but no device can be secured from every possible attack. Understanding a VPNโ€™s role in overall security habits could help new users as they learn a new network connection workflow.

Teaching Better Security Through Useful Tech Gifts

Each of these gifts could include discussion around their purpose, which may provide a better way to teach cybersecurity. They all reinforce better security through physical means or by encouraging new habits, and they offer the new user an opportunity to learn more about cybersecurity, a topic they might otherwise neglect.

The post 6 Security Awareness Gifts for the Cybersecurity Unaware appeared first on Security Intelligence.

โŒ