Think about cyber security with your tank controllers!

tastyfish

Well-Known Member
View Badges
Joined
Sep 7, 2017
Messages
525
Reaction score
446
Location
Hampshire
Rating - 0%
0   0   0
Hi Folks,

Given my profession and my love of gadgets and control, securing our ever more connected tanks is something very close to my heart.

We are increasingly using monitors such as SenEye, tank controllers (including Apex and GHL) and other connected equipment to run critical aspects of our marine tanks. From controlling flow, regulating temperature, dosing additives and even performing water changes and controlling salinity.

Recently however, many people have been wanting more access to their systems whilst away from their tanks and have started to expose these devices to the internet. Many using port forwarding on their router, which allows remote access to any device configured to use it.

This often means that ANYONE can find and potentially connect to the device also. Worse still, what if it still had the default username and password!?

9EB928F7-CB79-417C-B328-E9BF8BB868B9.jpeg


The graphic above shows the distribution and number of aquarium controllers exposed to the internet in this quick search.

We need to think about security!
Imagine the damage that could be caused if someone had access to your tank controller or connected device. What would happen if the tank temperature plummeted, or rose, pumps stopped, RO dumped or alk solution over dosed? The consequences could be catastrophic.

In addition, by exposing many of these devices to the internet, you could be providing a hacker with an opportunity to hack into any network it is connected to and give access to other systems and devices connected to your home network. Such attacks are frequent and relatively easy, as these devices are NEVER intended to be exposed to the internet.

So, I wanted to share with you just a little of my findings, whilst searching for just one particular type of popular aquarium controller.

- 771 users of one type of aquarium controller have their admin pages exposed to the internet & are publicly available

- Many appear to be using the default username and password, published in the user manual

- At least One is owned by an aquarium maintenance company and exposes their client’s network

Last month, one of the keynotes at the largest cyber security conference, called RSA, was about a cyber attack launched on a Casino. The attackers gained access via an aquarium controller that had been exposed to the internet.

https://www.washingtonpost.com/news...-casino/?noredirect=on&utm_term=.4d76eaf0e3f0

So now EVERYONE is looking for these devices.

What can you do to help make sure your tank is secure?

1: ALWAYS use the cloud service (Fusion, MyGHL etc) rather than local interface when away from the tank, if at all possible.

2: NEVER expose the admin address of any such device to the internet, either directly or by using port forwarding

3: ALWAYS change the default username and password (to a different username than "Admin" and a strong password)

4: Connect SECURELY to your home network using a VPN or remote control app if you need access to the local admin address

You have been warned...

PS: The vendor of the controllers shown above has been contacted with full details, so that they can help their customers stay secure. This isn't a security flaw with any controller in particular.

206DF56F-DFC5-4DB3-A608-F900C7168596.jpeg
 

dbl

It Takes Less Energy to be Nice
View Badges
Joined
Mar 13, 2014
Messages
15,945
Reaction score
90,199
Location
SW Florida
Rating - 0%
0   0   0
Excellent points for sure and thanks for sharing. The other thing is if you have a webcam tied in to that controller or your network and a hacker gets in...well that's just scary.
 

rui.manuel.gaspar

Active Member
View Badges
Joined
Jul 27, 2015
Messages
157
Reaction score
143
Rating - 0%
0   0   0
Hi Folks,

Given my profession and my love of gadgets and control, securing our ever more connected tanks is something very close to my heart.

We are increasingly using monitors such as SenEye, tank controllers (including Apex and GHL) and other connected equipment to run critical aspects of our marine tanks. From controlling flow, regulating temperature, dosing additives and even performing water changes and controlling salinity.

Recently however, many people have been wanting more access to their systems whilst away from their tanks and have started to expose these devices to the internet. Many using port forwarding on their router, which allows remote access to any device configured to use it.

This often means that ANYONE can find and potentially connect to the device also. Worse still, what if it still had the default username and password!?

9EB928F7-CB79-417C-B328-E9BF8BB868B9.jpeg


The graphic above shows the distribution and number of aquarium controllers exposed to the internet in this quick search.

We need to think about security!
Imagine the damage that could be caused if someone had access to your tank controller or connected device. What would happen if the tank temperature plummeted, or rose, pumps stopped, RO dumped or alk solution over dosed? The consequences could be catastrophic.

In addition, by exposing many of these devices to the internet, you could be providing a hacker with an opportunity to hack into any network it is connected to and give access to other systems and devices connected to your home network. Such attacks are frequent and relatively easy, as these devices are NEVER intended to be exposed to the internet.

So, I wanted to share with you just a little of my findings, whilst searching for just one particular type of popular aquarium controller.

- 771 users of one type of aquarium controller have their admin pages exposed to the internet & are publicly available

- Many appear to be using the default username and password, published in the user manual

- At least One is owned by an aquarium maintenance company and exposes their client’s network

Last month, one of the keynotes at the largest cyber security conference, called RSA, was about a cyber attack launched on a Casino. The attackers gained access via an aquarium controller that had been exposed to the internet.

https://www.washingtonpost.com/news...-casino/?noredirect=on&utm_term=.4d76eaf0e3f0

So now EVERYONE is looking for these devices.

What can you do to help make sure your tank is secure?

1: ALWAYS use the cloud service (Fusion, MyGHL etc) rather than local interface when away from the tank, if at all possible.

2: NEVER expose the admin address of any such device to the internet, either directly or by using port forwarding

3: ALWAYS change the default username and password (to a different username than "Admin" and a strong password)

4: Connect SECURELY to your home network using a VPN or remote control app if you need access to the local admin address

You have been warned...

PS: The vendor of the controllers shown above has been contacted with full details, so that they can help their customers stay secure. This isn't a security flaw with any controller in particular.

206DF56F-DFC5-4DB3-A608-F900C7168596.jpeg

Hello. I am a Portuguese apex user and an avid promoter in Portugal! 14 systems already I helped build and implement with 2 more on the way.

As a technologist I take very serious security so I am pretty sure I am not one of the red dots.

Great job. Can I please ask you to let me translate your post to Portuguese and publish in a local reef club? I will keep all the credits to you of course!

All the best,
Rui
 
OP
OP
T

tastyfish

Well-Known Member
View Badges
Joined
Sep 7, 2017
Messages
525
Reaction score
446
Location
Hampshire
Rating - 0%
0   0   0
Excellent points for sure and thanks for sharing. The other thing is if you have a webcam tied in to that controller or your network and a hacker gets in...well that's just scary.

Thanks for your kind words. This is true for any of the increasingly connected devices on the aquarium or in the home.

The same tools can be used to find 1000’s of IP cameras, IoT devices, NAS storage and more. It’s scary what people connect up to the internet with no thought for security. :(

Hello. I am a Portuguese apex user and an avid promoter in Portugal! 14 systems already I helped build and implement with 2 more on the way.

As a technologist I take very serious security so I am pretty sure I am not one of the red dots.

Great job. Can I please ask you to let me translate your post to Portuguese and publish in a local reef club? I will keep all the credits to you of course!

All the best,
Rui

Hi Rui, of course, that would be great! The more people we can educate, the better. If we can avoid just one tank crashing because someone connected to one of these devices, then it’s worth while doing!
 

Breadman03

Valuable Member
View Badges
Joined
Jun 30, 2015
Messages
2,249
Reaction score
2,022
Location
Luzerne County, PA
Rating - 0%
0   0   0
I'm pretty sure it was your post in another thread that reminded me to shut down my port forwarding from the days of using DynDNS to access the Classic Pages. At least I'd changed my username and password.
 

tiggs

Active Member
View Badges
Joined
Apr 8, 2012
Messages
445
Reaction score
689
Location
Cherry Hill, NJ
Rating - 0%
0   0   0
Very good post! As a systems engineer by trade, the casual port forwarding scares me. This is especially true since these devices don't have any MFA option, lockout thresholds, or complex password requirements. Also, consumer routers/gateways aren't going to have IDS/IPS, so it honestly wouldn't be very hard to get in if someone really wanted to. Using the cloud component of these devices for remote management is an absolute necessity.
 

eKoProCS

Active Member
View Badges
Joined
Apr 2, 2018
Messages
127
Reaction score
161
Rating - 0%
0   0   0
Excellent point being brought up here. As a software company, we understand the importance of cyber security, and what damages can be done if one wasn't careful. When we were developing the eKoral controller, we made sure we have the user's security interest at heart. All communications between the user's mobile device to the controller are encrypted by users' own key with bank level security algorithm. On the cloud end, SSL certification is required for added security. If user still don't feel safe with all these security measures, there is always offline mode options to avoid internet exposure.
 

Looking back to your reefing roots: Did you start with Instant Ocean salt?

  • I started with Instant Ocean salt.

    Votes: 80 75.5%
  • I did not start with Instant Ocean salt, but I have used it at some point.

    Votes: 10 9.4%
  • I did not start with Instant Ocean salt and have not used it.

    Votes: 14 13.2%
  • Other.

    Votes: 2 1.9%
Back
Top