The latest piece of tech that can unexpectedly be hacked: a 'nutrunner' wrench, which had over 20 vulnerabilities that'll be patched out in January
You wouldn't steal a wrench, but you could ransomware one.
I really feel like we're nudging towards the Cyberpunk: 2077-style future where netrunner hackers will basically become wizards, able to explode just about anything with a few lines of rogue code. Okay—the reality may be far more boring, but considering they put DRM in trains a while back I'm crossing my fingers for cyber sorcerers in the next few decades.
The latest in this list of surprisingly hackable tech? The Bosch Rexroth NXA015S-36V-B—also called a nutrunner, which is a type of torque wrench that came into use nearly 100 years ago and just so happens to share a lot of letters with 'netrunner'. We live in a world of beautiful coincidences.
As detailed in a report by the security firm Nozomi. A squad of security experts found a whopping 25 different vulnerabilities in the wrench, which wirelessly connects to a manufacturer's internal network. Also, it runs on Linux—or, well, the Linux-based NEXO-OS.
Unlike the superfluous anti-competitive nonsense applied to those Polish trains, the Nutrunner's always-online wrench software is actually there for a good reason. Having access to an application allows engineers to adjust the final torque levels of fastenings to a granular degree, which is important for everyone's safety.
"As an example," the report reads, "bolts, nuts and fixtures used in electrical switchboards must be torqued appropriately to ensure that connections between current carrying components, such as high voltage busbars, maintain a low resistance. A loose connection would result in higher operating temperatures and could, over time, cause a fire."
While the sentence 'there's a hackable wrench' is very funny, the potential security risks here are serious to a harrowing degree. There's the business side of things, of course—Nozomi thinks that these vulnerabilities could be used for ransomware attacks.
A more disturbing possibility is that these weak spots would "allow the threat actor to hijack tightening programs while manipulating the onboard display, causing undetectable damage to the product being assembled or making it unsafe to use."
The biggest gaming news, reviews and hardware deals
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
It's a worst-case nightmare scenario and supervillain-tier levels of evil, but the concept of a rash of invisibly-caused industrial accidents happening months after the attack is genuinely a little scary. This isn't just a theory they have, either—the security team fully pulled it off:
"We managed to stealthily alter the configuration of tightening programs, such as by increasing or decreasing the target torque value. At the same time, by patching in-memory the GUI on the onboard display, we could show a normal value to the operator, who would remain completely unaware of the change."
In an email statement highlighted by Ars Technica, Bosch Rexroth "immediately took up this advice and is working on a patch to solve the problem", which it says will be released at the end of January 2024. There's patches for wrenches, now—what a time to be alive.
Harvey's history with games started when he first begged his parents for a World of Warcraft subscription aged 12, though he's since been cursed with Final Fantasy 14-brain and a huge crush on G'raha Tia. He made his start as a freelancer, writing for websites like Techradar, The Escapist, Dicebreaker, The Gamer, Into the Spine—and of course, PC Gamer. He'll sink his teeth into anything that looks interesting, though he has a soft spot for RPGs, soulslikes, roguelikes, deckbuilders, MMOs, and weird indie titles. He also plays a shelf load of TTRPGs in his offline time. Don't ask him what his favourite system is, he has too many.