{"id":51930,"date":"2016-08-10T09:32:56","date_gmt":"2016-08-10T16:32:56","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=51930"},"modified":"2025-08-15T03:28:02","modified_gmt":"2025-08-15T10:28:02","slug":"black-hat-danger-drones-thermostat-ransomware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/","title":{"rendered":"This Year at Black Hat: Danger Drones and Thermostat Ransomware"},"content":{"rendered":"<p><em>This blog was written by Bruce Snell.<\/em><\/p>\n<p>Last week I went to one of the few places hotter than it is here in Texas: Las Vegas.\u00a0 Every year, the security industry gathers together for a week of education, demonstration and socialization at Black Hat, DefCon and BSides.\u00a0 A lot of people in the industry use these conferences as a time to reveal research they have been working on.\u00a0 I saw a really interesting talk given by <a href=\"https:\/\/www.blackhat.com\/us-16\/briefings\/schedule\/#exploiting-curiosity-and-context-how-to-make-people-click-on-a-dangerous-link-despite-their-security-awareness-3797\">Dr. Zinaida Benenson<\/a> on what gets people to click on malicious links.\u00a0 Cyberwarfare is an area of interest for me and <a href=\"https:\/\/www.blackhat.com\/us-16\/briefings\/schedule\/index.html#cyber-war-in-perspective-analysis-from-the-crisis-in-ukraine-4108\">Kenneth Geers<\/a> presented an excellent (and too short!) briefing on the ongoing conflict between Ukraine and Russia.\u00a0 However, there were a few topics that made a big enough splash in the news that the one of the flight attendants on my flight home asked me about after finding out I was leaving the conference. \u00a0\u00a0Of course some of these hacks might sound frightening, you shouldn\u2019t be too scared yet.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Ransomware for smart thermostats<\/strong><\/h2>\n<p>Coming out of the \u201cIoT Village\u201d at DefCon, two researchers <a href=\"https:\/\/motherboard.vice.com\/read\/internet-of-things-ransomware-smart-thermostat\">revealed<\/a> that it was possible to load malware on a smart thermostat.\u00a0 As I mentioned before, it\u2019s currently hot here in Texas.\u00a0 Imagine coming home looking to get out of the 101 degree weather only to find that ransomware has infected your thermostat and you now have to pay $100 or your thermostat will be stuck at 99!<\/p>\n<p>Now don\u2019t go ripping out your <a href=\"https:\/\/www.ecobee.com\/\">ecobee3<\/a> just yet.\u00a0 In order to get this to work, the malware had to be directly loaded onto the thermostat.\u00a0 The model used is basically a small Linux box with a touch screen.\u00a0 The manufacturer provided a memory card slot for their customers to upload their own photos.\u00a0 However, they do not check to make sure that only photos are being loaded.\u00a0 The researchers were able to load their malware by simply inserting an infected SD memory card into the device.<\/p>\n<p>So while your thermostat most likely isn\u2019t going to be hacked while you\u2019re reading this, it does show the potential for bad guys to continue to attack our homes via devices most people don\u2019t think twice about.<\/p>\n<h2><strong>Jeep Hack Version 2<\/strong><\/h2>\n<p>You might remember the <a href=\"https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/\">big story last year<\/a> when two researchers remotely hacked a Jeep from their couch while it was driving down the highway.\u00a0 This year, they unveiled a new batch of attacks that took control over braking, acceleration and steering at any speed.\u00a0\u00a0 They were able to bypass a number of safety controls in the vehicle by plugging directly into the car\u2019s CAN network and sending signals to that took advantage of cruise control and parking assist components of the car.<\/p>\n<p>While this could certainly be disastrous to a distracted driver (the researchers said that the driver could easily override any of the commands), we have to keep in mind that this would require someone in the car to have their laptop plugged directly into the vehicle\u2019s onboard diagnostic (OBD) port in order to execute any of these hacks.\u00a0 You\u2019d probably notice someone sitting in your passenger seat trying to plug into the port under the driver side dashboard.\u00a0 It\u2019s something that people should think about, but not freak out over.<\/p>\n<h2><strong>Automated Spear Phishing<\/strong><\/h2>\n<p>While the previous two hacks weren\u2019t necessarily something the average person has to be concerned about right away, a couple projects were revealed that you should definitely be aware of.\u00a0 Two researchers <a href=\"https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-Automated-E2E-Spear-Phishing-On-Twitter-wp.pdf\">developed a new tool<\/a> that uses an automated bot to analyze information from a person\u2019s Twitter and Facebook posts to create a phishing campaign that has a much greater chance of tricking someone into clicking on a link.\u00a0 The bot, called SNAP_R, looks at what and when someone posts, what topics they post about or respond to.\u00a0 It then creates a message that resembles something their target would read and click on.<\/p>\n<p>What does this mean for you?\u00a0 We could very well see an increase in phishing campaigns happening across Twitter and Facebook.\u00a0 Unfortunately, even if you are extremely diligent about thinking before you click a link, that doesn\u2019t mean all your friends are.\u00a0 Cybercriminals love using a compromised account to spread malware to others.\u00a0 If you get a weird instant message on Facebook from a friend, they may have had their account compromised.\u00a0 In their study, the researchers noted that up to 60% of the messages generated by their tool were clicked on.\u00a0 Keep an eye out for more phishing in the future!<\/p>\n<h2><strong>Danger Drone!<\/strong><\/h2>\n<p>If you\u2019re a fan of Top Gun or Archer, the song by <a href=\"https:\/\/www.youtube.com\/watch?v=siwpn14IE7E\">Kenny Loggins<\/a> probably popped into your head when you read \u201cDanger Drone.\u201d\u00a0 This project started because\u00a0Fran Brown was watching the movie and thought \u201cDanger Drone\u201d would be a great name.\u00a0 This turned into a $500 Raspberry Pi \/ quadcopter combo that is effectively a flying hacking laptop.\u00a0 Many \u201csmart home\u201d devices suffer from security issues.\u00a0 A device may be hackable, but since it doesn\u2019t directly connect to the internet the risk seems low.\u00a0 With something like a <a href=\"https:\/\/motherboard.vice.com\/read\/the-danger-drone-is-a-500-flying-hacker-laptop\">Danger Drone<\/a>, that risk could increase dramatically.<\/p>\n<p>Those of you at home might be asking, \u201cwhy create something like this?\u201d\u00a0 With most projects like this, the intention is not to make the bad guys\u2019 lives easier.\u00a0 It\u2019s actually to raise awareness of the issues and force the manufacturers to pay closer attention to security.\u00a0 Many times a company will be alerted to a security vulnerability but won\u2019t make any effort to fix the problem until it becomes public knowledge.\u00a0 With the case of the Danger Drone, the goal is to provide security professionals better tools to assess security of an organization and to raise awareness of the security issues around the Internet of Things (IoT).<\/p>\n<h2><strong>So What Can I Do to Stay Safe?<\/strong><\/h2>\n<p>The smart thermostat and Jeep hacks should not impact the average person at all since they both require physical access to the devices.\u00a0 Those are meant to raise awareness of the issues.\u00a0 While not something you have to deal with today, it\u2019s definitely something you need to be aware of.<\/p>\n<p>For the spear phishing bot and the Danger Drone (my new favorite term), you can use some basic security practices to help keep yourself safe.<\/p>\n<ol>\n<li><strong>Update<\/strong> \u2013 For traditional laptops, tablets, smartphones and any smart device such as smart thermostats, connected light bulbs, smart TVs, it is extremely important that you are vigilant about keeping your devices up to date with the latest software patches and updates. This will help protect against viruses and ransomware as well as against a Danger Drone flying above and looking for security holes.<\/li>\n<li><strong>Be Skeptical <\/strong>&#8211; Phishing is an extremely common way to spread malware and steal personal information.\u00a0 With the advent of tools like SNAP_R, we should expect to see phishing continue to increase.\u00a0 Always think twice before clicking on a link you were not expecting, even if it\u2019s from someone you know.<\/li>\n<li><strong>Use Security Software <\/strong>\u2013 Just in case you do accidentally click on a malicious link, having comprehensive security software installed on your device will help stop malware from infecting your system.<\/li>\n<\/ol>\n<p>I always enjoy my yearly pilgrimage to these security conferences and it\u2019s always my hope that the tools and techniques presented there can help make our digital world a safe place.<\/p>\n<p>Stay on top of the latest consumer and mobile security threats by\u00a0<a href=\"https:\/\/twitter.com\/brucesnell\">following me<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/McAfee\">@McAfee<\/a>\u00a0on Twitter, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\">Facebook<\/a>.<\/p>\n<p>Stay safe!<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it&#8230;<\/p>\n","protected":false},"author":674,"featured_media":125966,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[1814,4452,142,4131,4185],"coauthors":[3973],"class_list":["post-51930","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-computer-security","tag-cybersecurity","tag-tag-identity-theft","tag-internet-of-things","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>This Year at Black Hat: Danger Drones and Thermostat Ransomware | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it is here in Texas: Las Vegas.\u00a0 Every year, the security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Year at Black Hat: Danger Drones and Thermostat Ransomware | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it is here in Texas: Las Vegas.\u00a0 Every year, the security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-10T16:32:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T10:28:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/motherboard-images.vice.com\/content-images\/contentimage\/36385\/1470580434407450.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"This Year at Black Hat: Danger Drones and Thermostat Ransomware\",\"datePublished\":\"2016-08-10T16:32:56+00:00\",\"dateModified\":\"2025-08-15T10:28:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/\"},\"wordCount\":1265,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"keywords\":[\"computer security\",\"cybersecurity\",\"identity theft\",\"Internet of Things\",\"Phishing\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/\",\"name\":\"This Year at Black Hat: Danger Drones and Thermostat Ransomware | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"datePublished\":\"2016-08-10T16:32:56+00:00\",\"dateModified\":\"2025-08-15T10:28:02+00:00\",\"description\":\"This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it is here in Texas: Las Vegas.\u00a0 Every year, the security\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"width\":300,\"height\":200,\"caption\":\"laptop with a ransomware threat\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"This Year at Black Hat: Danger Drones and Thermostat Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Year at Black Hat: Danger Drones and Thermostat Ransomware | McAfee Blog","description":"This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it is here in Texas: Las Vegas.\u00a0 Every year, the security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"This Year at Black Hat: Danger Drones and Thermostat Ransomware | McAfee Blog","og_description":"This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it is here in Texas: Las Vegas.\u00a0 Every year, the security","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-08-10T16:32:56+00:00","article_modified_time":"2025-08-15T10:28:02+00:00","og_image":[{"url":"https:\/\/motherboard-images.vice.com\/content-images\/contentimage\/36385\/1470580434407450.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"This Year at Black Hat: Danger Drones and Thermostat Ransomware","datePublished":"2016-08-10T16:32:56+00:00","dateModified":"2025-08-15T10:28:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/"},"wordCount":1265,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","keywords":["computer security","cybersecurity","identity theft","Internet of Things","Phishing"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/","name":"This Year at Black Hat: Danger Drones and Thermostat Ransomware | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","datePublished":"2016-08-10T16:32:56+00:00","dateModified":"2025-08-15T10:28:02+00:00","description":"This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it is here in Texas: Las Vegas.\u00a0 Every year, the security","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","width":300,"height":200,"caption":"laptop with a ransomware threat"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/black-hat-danger-drones-thermostat-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"This Year at Black Hat: Danger Drones and Thermostat Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=51930"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51930\/revisions"}],"predecessor-version":[{"id":219865,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51930\/revisions\/219865"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/125966"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=51930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=51930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=51930"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=51930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}