To understand how to best protect these new assets, it’s best to understand what brought them here. The adoption of IoT and BYOD has increased with the intent of streamlining technology for the user and easing adoption in the marketplace.. Apps in IoT can become seamless, removing the barrier that a user used to have in determining if they were sharing information with a co-worker or with the Internet. The more covert we make these transactions, the more risk we are accepting (think tap to pay, passwords transferred through nfc, and magic links as Slack likes to call them).
Without a clear understanding of standards and services, it’s a challenge to determine how to best approach securing them. In fact, it’s such a challenge that Gartner has claimed that nearly all security vendors will fail at this task.
Personally, I agree.
Security budgets are rarely earmarked for efforts around IoT and business scenarios require a delivery mechanism that can also grow and keep pace with security requirements in monitoring, detection, and access control. Despite this, users continually add more devices to the enterprise network, due to ease of doing so.
Fortunately, PacketSled has been thinking about IoT for quite some time. Our team has spent many years of focused research on the most common IoT attacks.
One of the most common attacks we witness is authentication bypass. This could be due to poor session handling with predictable IDs or backdoors using hardcoded credentials. Regardless of the means, the outcome is the same – unauthorized access to sensitive information.
A quick search of Shodan will likely provide access to nearly any device, including devices in your infrastructure, an attacker would be interested in. In fact, we need not look further than a recent IoT attack which was seen with Mirai. It worked by scanning the Internet for devices with default credentials and enrolling them into the command and control platform. Once done, all of these devices can be remotely controlled and used to perform nearly any action conceivable. These attacks occurred across a wide spectrum of devices from smart TV’s to routers to really anything with the “smart” monicker attached.
Packetsled is here to help protect by proactively building detections in our platform to look for these behaviors, but our recommendation is to make sure your organization is covering the basics.
Where should you begin?
Start with the CIS Critical Security Controls with emphasis on the 1st six.
- Inventory of Authorized and Unauthorized devices
- Inventory of Authorized and Unauthorized software
- Security configurations for hardware and software on mobile and IoT devices
- Continuous Vulnerability Assessment and Remediation
- Controlled user of administrative or root privileges
- Maintenance, Monitoring, and Analysis of Audit Logs
With these basics addressed, you will have a more clear understanding of what devices and accounts are in use on your network and how you should expect them to behave.
Among the many detections that PacketSled provides, you should look for unencrypted credentials present on the network, by issuing the following query in the investigator:
last 24 hours cluster password on [password]
This simple query will provide you with every password observed on the network in the last day. This list is exportable and can be used to aid in the mitigation of these vulnerabilities.
We also provide extensive support for newer IoT protocols, along with our raw TCP and UDP analyzers, which will allow you to see inside network flows, even when a specific protocol analyzer isn’t available.
Along with our security platform and the recommendations outlined above, we suggest signing up with each vendor for updates related to security patches, firmware updates and any available alerts provided from the devices, themselves.
Written by Patrick Kelley and Chris Mitzlaff
Posted on February 15, 2017