5G Technology World

  • 5G Technology and Engineering
  • FAQs
  • Apps
  • Devices
  • IoT
  • RF
  • Radar
  • Wireless Design
  • Learn
    • 5G Videos
    • Ebooks
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Handbooks
    • 2024
    • 2023
    • 2022
    • 2021
  • Resources
    • Design Guide Library
    • EE World Digital Issues
    • Engineering Diversity & Inclusion
    • Engineering Training Days
    • LEAP Awards
  • Advertise
  • Subscribe

Watch Hackers Gain Access to Huge Construction Site Cranes

By Jennifer DeLaOsa | January 17, 2019

Did you know the giant cranes at construction sites were vulnerable targets for cybercriminals? Federico Maggi and Marco Balduzzi were able to easily hack their way into various, large-scale industrial machines, putting themselves in command.

The two white hat hackers, who work for the Japanese cybersecurity company Trend Micro, made their way to 14 construction sites and asked if they could attempt to hack the machines, according to Forbes. It turns out, they were quite successful.

As described in an article by Trend Micro, the vulnerabilities were found in the machines’ radio frequency (RF) industrial remote controllers.

“The core of the problem lies in how, instead of depending on wireless, standard technologies, these industrial remote controllers rely on proprietary RF protocols, which are decades old and are primarily focused on safety at the expense of security. It wasn’t until the arrival of Industry 4.0, as well as the continuing adoption of the Industrial Internet of Things (IIoT), that industries began to acknowledge the pressing need for security,” according to the article.

They were able to execute five different attacks: replay attack, command injection, e-stop abuse, malicious re-pairing, and malicious reprogramming and remote attack vectors. The first four attacks were so straightforward, they could be carried out within minutes at a low cost, according to Forbes. The two only needed a PC, free code, and some RF equipment that cost between $100 and $500.

To handle some of the construction tech’s more unusual features, they created RFQuack—a bespoke software and hardware solution.

Although these hackers were benevolent, the consequences of these weaknesses range “from theft and extortion to sabotage and injury,” according to the researchers in a paper.

To learn more about industrial machine vulnerabilities, you can read the study, “A Security Analysis of Radio Remote Controllers for Industrial Applications.”


Filed Under: RF

 

Next Article

← Previous Article
Next Article →

Related Articles Read More >

Long-wire dipole antennas: still viable after more than a century
RemCom Wireless InSite 4.0
Software simulates RF conditions from the Earth to the Moon
FAQ on the Butler matrix for beamforming: part 2
10 GHz RF cables feature double shields

Featured Contributions

  • Overcome Open RAN test and certification challenges
  • Wireless engineers need AI to build networks
  • Why AI chips need PCIe 7.0 IP interconnects
  • circuit board timing How timing and synchronization improve 5G spectrum efficiency
  • Wi-Fi 7 and 5G for FWA need testing
More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Internet of Things
Explore practical strategies for minimizing attack surfaces, managing memory efficiently, and securing firmware. Download now to ensure your IoT implementations remain secure, efficient, and future-ready.

EE LEARNING CENTER

EE Learning Center
“5g
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Engineering Training Days

engineering
“bills
5G Technology World
  • Enews Signup
  • EE World Online
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Microcontroller Tips
  • Analogic Tips
  • Connector Tips
  • Engineer’s Garage
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • About Us
  • Contact Us
  • Advertise

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy

Search 5G Technology World