April 27, 2017 By Douglas Bonderud 2 min read

Cities are notoriously inefficient. As populations rise, everything from mass transit and road maintenance to power generation and garbage collection becomes more complex and costly. Beyond ballooning budgets, there’s also a push among residents for smarter services driven by Internet of Things (IoT)-enabled infrastructure.

Why drive around aimlessly in search of a parking spot when sensor-enabled apps could simply point users in the right direction? Why leave streetlights on when they’re not needed, or lose water to undiscovered leaks? Empowered, connected and automated smart cities offer a potential solution, but as explained by Information Age, they may come with a considerable caveat: malware.

Implementing Intelligent Infrastructure

Despite the risk of malware, countries can’t ignore the benefits of smart cities. As noted by ZDNet, China has plans to equip 50 urban areas with user-driven technologies to make life easier for residents and reduce total infrastructure complexity. One city on the forefront of smart technology, Shanghai, recently launched a “demand response” energy management tool, which notifies commercial energy consumers when demand peaks and rewards them for temporarily reducing consumption.

Similarly, in London, increased ridership on city transit prompted the development of Oyster Cards — radio-frequency identification (RFID)-enabled smart tickets. They eliminate the need to manually scan or check tickets at transit hubs. As a result, passenger journeys have increased by more than 40 percent.

Movable Malware

Unfortunately, the biggest strength of smart cities — interconnectivity — is also the greatest weakness.

In September 2016, according to CyberScoop, cybercriminals managed to compromise almost one-quarter of the networks used by the San Francisco Municipal Transportation Agency (SFMTA) and infect them with ransomware. While there’s no indication the SFMTA paid the requested bitcoin ransom, the breach forced the agency to keep entry gates open free of charge, resulting in a significant financial loss.

But it could have been worse: What if malicious actors took control of train operation systems or track signaling controls? Even more worrisome, Infosecurity Magazine reported that 40 percent of industrial control systems (ICS), which control critical physical infrastructure such as power and water operations, were hit by malware attacks in the last half of 2016.

The Information Age piece, meanwhile, presented an even larger threat model of smart vehicles operating in smart cities that carry malware infections to other urban networks. It’s a good argument based on the existing phenomenon of accidental seed spreading: Moving vehicles create a wind-tunnel effect that picks up small seeds and deposits them in a new location, in turn changing the local ecosystem.

The same is possible with malware. Let’s say, for example, that a network-enabled vehicle connects to the city transportation smart grid and is infected with malware. Unaware, the driver takes the vehicle to a new city, connects to its infrastructure and inadvertently spreads the malicious code. At best, cybercriminals gain access to low-level systems and impact total network performance. At worst, they take control of citywide services and demand huge payoffs to vacate the virtual premises.

Solving the Smart Cities Conundrum

Smart cities are inevitable, given potential gains to both citizen satisfaction and administrative efficiency. But these gains offset neither the potential security issues nor the risk of connected devices and vehicles as unwitting malware carriers.

While it’s impossible to design impenetrable infrastructure, the combination of basic security hygiene with cloud-based detection and remediation tools makes it possible for cities to get advance warning of malware threats, respond appropriately and minimize disruption to critical services.

More from

White House mandates stricter cybersecurity for R&D institutions

2 min read - Federal cyber regulation is edging further into research and development (R&D) and higher education. A recent memo from the Office of Science and Technology Policy (OSTP) states that certain covered institutions will be required to implement cybersecurity programs for R&D security. These mandates will also apply to institutions of higher education that support R&D. Beyond strengthening the overall U.S. security posture, this move is also in direct response to growing threats posed by the People's Republic of China (PRC), as…

New memo reveals Biden’s cybersecurity priorities through fiscal year 2026

2 min read - On July 10, 2024, the White House released a new memo regarding the Biden administration’s cybersecurity investment priorities, initially proposed in July 2022. This new memorandum now marks the third time the Office of the National Cyber Director (ONCD), headed by Harry Coker, has released updated priorities and outlined procedures regarding the five core pillars of the National Cybersecurity Strategy Implementation Plan (NCSIP), now relevant through fiscal year 2026. Key highlights from the FY26 memorandum In the latest annual version…

How prepared are you for your first Gen AI disruption?

5 min read - Generative artificial intelligence (Gen AI) and its use by businesses to enhance operations and profits are the focus of innovation in virtually every sector and industry. Gartner predicts that global spending on AI software will surge from $124 billion in 2022 to $297 billion by 2027. Businesses are upskilling their teams and hiring costly experts to implement new use cases, new ways to leverage data and new ways to use open-source tooling and resources. What they have failed to look…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today