fbpx
Search
Close this search box.

Coffee Machine Demands Ransomware

Barista steaming milk at an espresso machine.
Barista steaming milk at an espresso machine.

As if 2020 couldn’t get any stranger, an internet-connected coffee machine has been hacked by ransomware. That’s right, a coffee maker in an office was infected with ransomware.  The coffee maker acted as a Wi-Fi access point, establishing an unencrypted, unsecure connection to a companion app.  Once this connection was made, the hacker was able to proceed with a reverse-engineered firmware stored within the android app.  

The coffee machine in question was a Smarter Coffee Machine. These coffee makers come equipped with a mobile app that can be used to remotely to begin the coffee brewing process. This APP creates its own local Wi-Fi network with very simple security protocols allowing it to easily be hacked.   

The moral of the story? The Internet of things is full of insecure gadgets with hackable technology. Sure, your coffee maker is unlikely to get attacked, but what other devices is your business using that could be a gateway into your company data? To ensure your organization doesn’t fall victim to ransomware we suggest a security posture review, our cybersecurity experts are here to help.

Corsica Technologies
Corsica provides personalized service and a virtual CIO (vCIO) who serves as a strategic advisor. When it comes to the complex integration of solutions for IT and cybersecurity, the whole is greater than the sum of its parts. We offer cybersecurity solutions, managed services, digital transformation, resale services, and one-off technology projects. Corsica unifies any combination of these services into a complete, seamless solution.

Related Reads

B2B Integration Tools: 4 Dark Secrets - Corsica Technologies

Legacy B2B Integration Tools: 4 Dark Secrets

The world of B2B integration comes with complexity. Not only are you sharing data within your internal systems—you’re sharing it with the external systems of trading partners. That gets incredibly complicated. Even the best B2B integration tools may not be

Read more
Cloud migration security - What you need to know - Corsica Technologies

Cloud Migrations: 6 Steps To Reducing Security Risks

Cloud migrations allow organizations to leverage the full power of the cloud. Yet cloud migrations aren’t without security risks. As Forbes reports, 94% of cloud customers were targeted every month in 2023—while 62% of them were successfully compromised. Whether you

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.