SHARE
Facebook X Pinterest WhatsApp

Drone Hack Targets Philips Hue Lights, ZigBee

Philips issued a security patch, but the hack demonstrated how smart lighting systems could be compromised, causing a blackout.

Written By
thumbnail
Sue Walsh
Sue Walsh
Nov 10, 2016

Philips Hue Lights are extremely popular IoT devices, but a new paper, “IoT Goes Nuclear: Creating a ZigBee Chain Reaction” reveals they they are also a big security risk. In the paper, researchers from the Weizmann Institute of Science in Israel and Dalhousie University in Canada described how they crafted a proof-of-concept attack targeting the smart lights. The attack, which exploits flaws in the ZigBee and Z-Wave wireless protocols, uses a worm to infect the lights and replace their firmware.

“The worm spreads by jumping directly from one lamp to its neighbors, using only their built-in ZigBee wireless connectivity and their physical proximity. The attack can start by plugging in a single infected bulb anywhere in the city, and then catastrophically spread everywhere within minutes,” explained researchers Eyal Ronen, Colin O’Flynn, Adi Shamir and Achi-Or Weingarten.

The lights were infected via wardriving and “warflying” with a drone, said the report. With the drone they were able to hack the lights from up to half a mile away. A side channel attack enabled them to extract the global AES-CCM key used to encrypt and authenticate new firmware. The researchers stated they were able to do this easily with just a few hundred dollars of readily available gear, and used the key to replace the light’s firmware with a fake, malicious version.

What can the attack do? The researchers said the worm would enable a hacker to brick an entire city’s smart lights. This is not reversible and the lights would need to be replaced. The attack could also allow a hacker to jam wireless networks. If enough lights were compromised, an entire city’s WiFi could be blocked. Even more serious, a hacker could make the lights go on and off multiple times in short amount of time. This could cause serious damage to the grid.

The researchers said they did contact Philips, who was responsive and issued a patch, but the experiment illustrated both the serious security issues that still exist with IoT devices and the catastrophic damage hacker using them could cause.

Advertisement

Why IoT device security remains abysmal

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

Open Source Talent Shortage Expected To Increase in 2022
David Curry
Jul 12, 2022
Volvo Puts IoT and AI in the Driver’s Seat for Vehicle Connectivity
Sue Walsh
Nov 6, 2020
Cybersecurity and Digital Trust Companies Team for IoT Threats Detection
Sue Walsh
Oct 12, 2020
Cornell Researchers Create the Country’s First Statewide IoT Network
Sue Walsh
Oct 9, 2020

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.