RadiumFox Logo
RADIUMFOXSecurity

Secure Every
Endpoint

From consumer electronics to industrial controllers. We dissect hardware, firmware, and radio protocols to expose vulnerabilities before they ship.

Securing Every Vertical

IoT risks vary by industry. Our testing methodologies are tailored to the specific protocols, threat models, and regulatory requirements of your sector.

ISO/SAE 21434

Automotive Security

Securing ECU communication, OTA updates, and infotainment systems against remote exploitation.

Key Risks
CAN Bus Injection
Keyless Entry Attacks
Fleet Takeover
FDA Guidance / HIPAA

Medical Devices (IoMT)

Protecting patient safety and data privacy in connected pacemakers, insulin pumps, and hospital networks.

Key Risks
Dos on Life Support
PHI Data Theft
Firmware Tampering
ETSI EN 303 645

Consumer Electronics

Ensuring privacy and preventing botnet recruitment for smart home devices, cameras, and wearables.

Key Risks
Mirai Botnet Recruitment
Camera Spying
Credential Stuffing
IEC 62443

Industrial IIoT

Bridging the gap between IT and OT to prevent production downtime and physical damage.

Key Risks
PLC Logic Manipulation
Sensor Spoofing
Ransomware
The Deliverable

Comprehensive
Device Intelligence

RadiumFox IoT Security Report

Firmware Binary Analysis

Deep dive into bootloaders and filesystems to uncover hardcoded credentials and logic flaws.

Hardware Interface Testing

Physical attacks via JTAG, UART, and SPI to extract secrets and bypass secure boot.

Wireless Protocol Fuzzing

Stress testing BLE, Zigbee, and LoRaWAN implementations for crash-inducing vulnerabilities.

Compliance Mapping

Detailed mapping to ETSI EN 303 645, NIST IR 8259, and ISO/SAE 21434 standards.

Operational Debrief

Field Reports

Real-world examples of how we've secured connected devices against determined attackers.

Healthcare

Connected Medical Device (IoMT)

The Challenge

A medical device manufacturer needed FDA 510(k) cybersecurity clearance for a new connected infusion pump.

The Vulnerability

We identified a vulnerability in the BLE pairing process that allowed an attacker to inject lethal dosage commands without authentication.

The Fix

The manufacturer patched the firmware before submission, preventing a potential recall and ensuring patient safety.

Consumer Electronics

Smart Home Hub Ecosystem

The Challenge

A smart home vendor wanted to ensure their new hub couldn't be used as a pivot point into user networks.

The Vulnerability

We extracted the firmware via JTAG and found a hardcoded root password. This allowed us to install a persistent backdoor and sniff network traffic.

The Fix

The vendor implemented secure boot and unique per-device passwords, significantly hardening the device against physical attacks.

Manufacturing

Industrial Sensor Gateway (IIoT)

The Challenge

A factory automation company needed to verify the security of their MQTT implementation for a new sensor gateway.

The Vulnerability

We discovered that the MQTT broker accepted wildcard subscriptions ('#') from unauthenticated clients, leaking sensitive production data.

The Fix

The company implemented TLS mutual authentication (mTLS) and strict ACLs, securing the critical telemetry data.

Secure Your Connected Future

From consumer gadgets to critical industrial sensors, we find the flaws before the bad guys do.

IoT Security Lab Testing
ATTACK SURFACE MAPPING

Where Devices Break

IoT security is multidimensional. We attack the device, the data it transmits, and the cloud it talks to.

Hardware Interfaces

Hardware Interfaces

Exploiting exposed UART, JTAG, and SWD ports to dump firmware or gain root shells.

Attack Scenario

Attacker connects to exposed UART pads on the PCB, interrupts the boot process, and modifies kernel arguments to boot into a root shell.

Mitigation

Physically disable debug ports in production, use epoxy potting, and implement secure boot.

Firmware Analysis

Firmware Analysis

Reverse engineering binaries to find hardcoded credentials, encryption keys, and logic flaws.

Attack Scenario

Extracting the filesystem from a flash dump reveals a hardcoded 'admin:admin' account and a private SSH key used across all devices.

Mitigation

Encrypt firmware at rest, sign updates cryptographically, and use unique per-device credentials.

Radio Protocols

Radio Protocols

Intercepting and jamming BLE, Zigbee, LoRaWAN, and proprietary RF communications.

Attack Scenario

Capturing a BLE pairing handshake and cracking the weak PIN offline to spoof a legitimate user and unlock a smart lock.

Mitigation

Implement robust encryption (AES-128/256), use rolling codes to prevent replay attacks, and enforce strong pairing methods.

Cloud APIs

Cloud APIs

Testing the backend infrastructure that controls devices for IDOR, injection, and auth bypass.

Attack Scenario

Manipulating the device ID in an API request allows an attacker to view the video feed of a stranger's security camera.

Mitigation

Enforce strict authorization checks (IDOR prevention), validate all inputs, and implement rate limiting.

Many IoT vulnerabilities originate in the cloud API layer. Ensure your backend infrastructure is as secure as your hardware.

Review Cloud Security Services
BINARY REVERSE ENGINEERING

Deconstructing
The Code

We extract and analyze firmware to identify hardcoded credentials, insecure encryption keys, and logic flaws that automated scanners miss. Our process involves unpacking filesystems, decompiling binaries, and analyzing bootloaders.

Hardcoded Secrets

Finding AWS keys, API tokens, and admin passwords embedded in the binary.

Insecure Bootloaders

Bypassing secure boot to load malicious firmware or gain persistence.

Logic Flaws

Identifying buffer overflows and command injection vulnerabilities in custom services.

Tools of the Trade

BinwalkGhidraIDA ProJTAGulatorOpenOCDSaleae Logic
binwalk -e firmware.bin

DECIMAL HEXADECIMAL DESCRIPTION

--------------------------------------------------------------------------------

0 0x0 TRX firmware header, little endian, image size: 3788800 bytes, CRC32: 0x45C2C67A

28 0x1C LZMA compressed data, properties: 0x5D, dictionary size: 65536 bytes, uncompressed size: 5498880 bytes

2112 0x840 Squashfs filesystem, little endian, version 4.0, compression:xz, size: 9823122 bytes, 1284 inodes, blocksize: 131072 bytes

> Extracting filesystem... OK

> Searching for private keys... FOUND (id_rsa)

> Analyzing /etc/shadow... FOUND (root hash)

RF & PROTOCOL ANALYSIS

Protocol Fuzzing

We don't just listen; we speak. Our custom fuzzers inject malformed packets into BLE, Zigbee, and proprietary RF streams to crash stacks and bypass authentication.

Bluetooth Low Energy (BLE)

We fuzz GATT services and characteristics to find buffer overflows in the stack or logic flaws in the pairing process.

GATT FuzzingMan-in-the-Middle (MITM)Encryption Downgrade

Zigbee / Z-Wave

Injecting malformed frames into the mesh network to cause denial of service or replay captured commands to control devices.

Replay AttacksKey ExtractionJamming

MQTT / CoAP

Testing the messaging layer for topic wildcard injection, payload manipulation, and authentication bypasses.

Topic InjectionPayload FuzzingQoS Manipulation

Proprietary RF

Reverse engineering Sub-GHz protocols (433/915 MHz) to decode signals and create custom transmitters.

Signal ReplayRolling Code PredictionProtocol Decoding

Fuzzing Methodology

We employ both Generation-based (creating packets from scratch based on spec) and Mutation-based (flipping bits in captured valid packets) fuzzing to ensure maximum code coverage of the target's network stack.

RadiumFox Fuzzer
Mutating Payloads...
TX: 900MHz
0x1F
0x2F
0x3F
NULL
Target IoT Gateway
Status: ONLINE
SEGFAULT
THE COST OF INACTION

Security is Cheaper than a Recall

In IoT, you can't just "patch it later" if the device is bricked or physically inaccessible. A security flaw discovered after shipping can destroy product margins and brand equity.

$5.2M
Avg. Cost of IoT Breach
Stock Drop
Following Major Recall

The RadiumFox Advantage

Pre-Market Validation

Identify critical flaws before mass production, avoiding costly hardware revisions.

Reduced Liability

Demonstrate due diligence with comprehensive third-party testing reports.

Faster Time-to-Market

Integrate security early to prevent last-minute blockers that delay launch.

Full Lifecycle Protection

Security isn't a feature you add at the end. We integrate with your engineering team from prototype to production.

01

Design Review

Threat modeling and architecture review before a single line of code is written.

02

Secure Coding

Static analysis (SAST) and firmware hardening during the development phase.

03

Pre-Ship Testing

Physical penetration testing and FCC compliance checks before mass production.

04

Post-Market

Vulnerability disclosure programs (VDP) and OTA update security verification.

Global Compliance Ready

Navigating the fragmented landscape of IoT regulations can be daunting. Our assessments are mapped to the specific standards that matter to your market.

ETSI EN 303 645

The global standard for consumer IoT security, covering default passwords, vulnerability disclosure, and secure updates.

NIST IR 8259

Foundational cybersecurity activities for IoT device manufacturers, required for US federal procurement.

ISO/IEC 21434

Automotive cybersecurity engineering standard, essential for connected vehicles and ECUs.

FDA Premarket

Cybersecurity guidance for medical devices (IoMT), ensuring patient safety and data privacy.

Certified
SECURE_BY_DESIGN

Why RadiumFox?

We don't just run automated scans. We desolder chips, dump flash memory, and reverse engineer proprietary protocols in our state-of-the-art hardware lab.

Hardware Lab

Equipped with logic analyzers, oscilloscopes, and BGA rework stations to attack the physical layer.

Custom Tooling

We build custom fuzzer harnesses and breakout boards for proprietary interfaces that standard tools can't touch.

Zero-Day Research

Our team regularly publishes CVEs and presents at conferences like DEF CON and Black Hat.

Common Questions

IoT Security FAQ

Answers to your questions about hardware hacking, firmware analysis, and compliance.

Join Us. Cut Costs.
Focus on What Matters.

Unlock high-impact penetration testing that drives real security gains. Led by experts, tailored for results, and designed to stay budget-friendly.

1

Submit Info

Share your environment, scope, or compliance needs via our quick form.

2

Senior Review

A lead RadiumFox engineer reviews and tailors your assessment—no junior handoffs.

3

Optional Scoping Call

We'll clarify priorities and technical details if needed.

4

Clear Quote

Expect a fixed-cost proposal—no hidden fees or fluff.

5

Fast Kickoff

Once approved, most projects launch within 5–7 business days with full support.