Conf42 Incident Management 2022 - Online

Cameras, CACs & Clocks: Enterprise IoT Security Sucks - A Story of Two Million Interrogated Devices

Video size:

Abstract

Enterprise Internet of Things (IoT) security today is analogous to IT security in the mid 1990s. It was a time when security awareness was limited, countermeasures and best practices weren’t broadly applied, and attackers explored, compromised, controlled, and exfiltrated data from systems with minimal resistance. In short, enterprise IoT security sucks as bad today as that unpatched Windows NT 3.51 server with an RS-232 connected modem that IT forgot about.

Working globally with Fortune 500 enterprises and government agencies we’ve interrogated over two million production IoT devices. Across these two million devices we’ve identified threats and trends, compiled statistics, summarized compelling cases, and evaluated common offenders. We’ve also assembled tactics that organizations can employ to recognize value from their IoT devices while minimizing risk and ensuring that devices that are secure today will stay secure tomorrow.

Security issues are compounded by the quantity of IoT devices. Our analysis indicates that most organizations have about five IoT devices per employee. The global IoT market has grown from $100 billion in 2017 to over $1 trillion in 2022. There are over 46 billion connected devices today and 30 billion (65%) of those devices are IoT. We are increasingly dependent on consumer, enterprise, industrial, and military IoT devices for cost reduction, supply chain logistics, productivity gains, security, and everything in between. Despite the criticality of IoT, our security hasn’t kept pace. In the enterprise, we’ve identified that we simply don’t know:

● What IoT devices we have - guesses based on legacy asset discovery solutions are consistently off by at least 50% ● When our firmware was last updated - in many cases the firmware is end of life and the average IoT firmware age is six years ● If our credentials follow organizational policies - passwords that are default, low-quality, don’t have scheduled rotations, and lack centralized management are the norm ● How vulnerable our IoT devices are - at least half of the IoT devices we’ve interrogated have known, high to critical level CVEs

While enterprise IoT security currently sucks, it doesn’t have to be that way. By evaluating the security risks and the inherent limitations of IoT, you can leverage tactics that will have a rapid and positive impact on security.

Attendee takeaways: ● Discover your IoT devices, diagnose their security, and define their limitations ● Employ tactics to improve your IoT security and communicate their status to stakeholders ● Restate key findings derived from the interrogation of two million production IoT devices

Summary

  • Brian Contos: XioT security sucks, a story of 2 million interrogated devices. IoT is a combination of three disk but overlapping areas. The first is what we might consider enterprise IoT, or Internet of things. The second is the OT or industrial control system side SCADA devices.
  • We have about 5 million cameras. We have over a quarter million voiceover IP phones, printers, about 83,000. Over 13,000 ups systems connected. IoT devices don't need to be Internet accessible to be attacked and manipulated.
  • The easiest way to get into a lot of these devices are, number one, is it Internet accessible. And number two, does it run the default creds? That's all the hacking is involved. Nation states are taking interest in these types of tools. In the United States, weve actually passed a law that prohibits the use of many of the devices.
  • The Marai botnet was kind of the Godfather, or the grandfather, if you will, of Xiot attacks. Even though they started with cameras, this expanded was past cameras and started including printers and phones and other devices as well. We still see devices today that are still vulnerable to these.
  • US, UK, Germany, Netherlands, and other countries working together took down a botnet. Primarily targeted in the IoT realm, the OT devices, those PLC skated devices. Could they have been used for more nefarious things like blowing up a pipeline?
  • A lot of these devices operate with no authentication. Siemens came out with some suggestions to fix this attack. Patch your firmware, set a username and password, and get rid of services that you don't need. Security today is kind of like iT security was like back in 1995.
  • About half of Xiot devices operate with default passwords. 26% of the devices operating with end of life firmware. The remaining 74% of devices on average is six years old. This is really making things easy for the bad guys.
  • These devices are super vulnerable and they're being exploited at a very, very high rate. KVM switches, server cabinets and racks are among the worst offenders. Physical access controllers suck. These are simple areas to attack.
  • Another one are printers. Everyone's got them. They're super promiscuous. If they're all or possibly a great majority of them can be compromised and used to attack you. That's a huge attack surface.
  • Security cameras often run operating systems like busybox and other forms of Linux. There's exploits to take advantage of them, like we saw with the Hikvision camera. Most people don't have in the enterprise a handful, they have thousands. Nobody wants to take responsibility.
  • Beyond the enterprise, things actually has a global impact, right, on cities and counties and states and countries and regions. Everything everywhere always is going to be connected with these devices, and hopefully we can get them beyond 1995 security.
  • In hardening, you might say, you know what, I only want to run wired. Now I get into credentials and certs. These enterprise XioT security platforms can talk to all these devices. You can be very fine grained in how you push it out.
  • Brian Contos: Organizations don't know what they have, so discovery is so important. The XioT problem is growing exponentially. It's a much larger footprint than traditional endpoint devices or cloud combined. There are solutions now. Take a look at your IoT environment.

Transcript

This transcript was autogenerated. To make changes, submit a PR.
Hi, I'm Brian Contos. I'm the chief security officer with phosphorus cybersecurity. And this presentation is cameras, caCs, and clocks. XioT security sucks, a story of 2 million interrogated devices. So let's go ahead and just jump right in. So, first off, what is XioT? So fundamentally, IoT is a combination of three disk but overlapping areas. The first is what we might consider enterprise IoT, or Internet of things. Those are things such as printers, voiceover, IP phones, KVM switches, ups, any kind of sort of enterprise dumb, if you will, device that's operating on the network. In addition, two that those are network devices such as network attached storage, wireless access points, load balancers, switches, so on and so forth. And then finally, it's the OT or industrial control system side SCADA devices. These are things like plcs or programmable logic controllers that typically operate in batch and discrete manufacturing oil and has production power and energy and many other sort of utility or critical infrastructure type organizations. Collectively, we call those IoT or attendee Internet of Things. Now, these are purpose built devices, typically with specific hardware and software. They're usually running operating systems we're all familiar with, like Linux, Android, BSD. Sometimes on the OT side, it's a real time operating system like Vxworks. They're network connected. Not all OT devices are network connected, most are these days, but certainly on the enterprise IoT and on the network device side, hence the name network, they're network connected and they can't run endpoint security, which is a big one, right? I mean, we talk about our servers, our rotations, our laptops, a critical database, whatever the case might be, even in a virtual machine, we're going to have some of endpoint security, anti malware, intrusion prevention, localized firewalls, so on and so forth. These devices, you cannot do that. So at Fosfer cybersecurity, we've been researching this space for over five years. We've looked at millions and millions of devices across public companies, private companies, healthcare, financial services, military, government, you name it. And in doing so, we found some really interesting sort of trends and statistics and use cases, as well as a group of devices that we like to call the devices that suck, not because they sucks in terms of how they operate, but their security certainly is lacking. So hence the title for this presentation. But we'll get into that in just a little bit. So I want to share just a couple kind of interesting things here. I recently went on showdown, and I think most of you are familiar with that. It's like a Google search, if you will, for devices that are connected. Two, the Internet. I just typed in words like camera, voiceover, IP, phone, printer ups, things like that. It's not a very scientific study, but I just wanted to see roughly how many of these devices weve exposed. And there's probably some percentage of honeypots and some percentage of mistakes there. But even if it's 5% or so, still we have about 5 million cameras. We have over a quarter million voiceover IP phones, printers, about 83,000. And I have no idea why, but over 13,000 ups systems connected. Now, IoT devices don't need to be Internet accessible to be attacked and manipulated and used for a number of nefarious things, but it's certainly one way in. In fact, most attacks we're seeing today, interestingly enough, like a phishing attack, they're going after someone's laptop, and then once they get in through it, they're looking for XIoT devices to IoT to. And then from there, they're attacking both XIot and it assets, and even cloud assets from those XIoT devices because they can maintain persistence and avoid detection. But we'll talk a little bit more about that in a compiled of use cases in just a moment. But a funny thing about this, maybe it's not too funny, but take upss, for example, so uninterrupted power supplies, generally speaking, if you have something plugged into that, it's because it's really important because you don't want the power to be interrupted. And one of the most popular brands is APC. It's a very common ups that we see out there. Now, if you go onto Google and you just type in default password for APC ups, you'll find very quickly it displaying, saying, hey, the password is APC and the username is APC, and they're both lowercase. I've never seen an APC UpS system where the password is changed. In fact, we have a running joke at phosphorus. That is, if we ever actually find an APC ups system where the password and username aren't APC, APC and lowercase, we'll buy everybody in the company a steak dinner. We've been eating a lot of chicken. So all this to say that one of the easiest ways to get into a lot of these devices are, number one, is it Internet accessible? And number two, does it run the default creds? That's all the hacking is involved, if you can call it hacking. Now, nation states get this, cybercriminals get this, too nefarious operators have taken notice of XioT over the last few years. And a great example of this is Russia. So Russia, the russian FSB actually hired some contractors to build an XioT tool that would actually go out and discover XioT devices, compromise those devices, and allow them to be controlled for multiple nefarious things, for spying, for distribution of malware, for ransomware attacks, to add to botnets, and again, to my point earlier, to actually use to attack it assets. In a lot of these cases, it's used to attack IoT assets to then exfiltrate sensitive data. So these Russian FSB had this XIoT hacking tool built. It's called frontin. Now, frontin is a military grade, nation state built XioT hacking tool. Unfortunately for Russia, the digital revolution hacking group got wind of this. They actually stole a copy of the tool and they released it online. So if you go to some of your favorite torrents and places where you get such tools and you can read Russian, you can have access to a nation state grade, military designed XIoT hacking tool available to the world. So again, nation states are taking interest in these types of tools. Another example, nation states, is China. So China actually kind of skips the middle ground. So instead of having a device to go out and find IoT devices or malware to compromise those devices, they actually manufacture the devices with the malware pre built. So it's already inside you. Just skip that middleman. And I'm not calling out China or all chinese companies. There's just a few companies that certainly have been identified here. In fact, in the United States, weve actually passed a law that prohibits the use of many of these devices in government organizations and with government contractors. Those are things like Hickvision, Huawei ZTE, and a few others. And some of the problems with a few of these, and I'm not going to call it the specific brands, but some of them have a little light on them that's green or red. So green means I'm recording video and I'm recording audio. Red supposed to mean I'm not recording video, I'm not recording audio. Pretty simple, right? But what we found in some of our testing is when you actually say, stop recording video and stop recording audio, it does turn the green light to red, but it still continues to record audio and video. Furthermore, it's piping that information out to some location remotely, which theoretically is making its way back to whoever designed this malware in the beginning, this organizations in China. So these are architectural capabilities that have been built into these devices specifically to spy on organizations. And a lot of the compromised that you see in Iot or a large number of them, are about spying. I can see you, I can hear you, I can use this to capture data. You see other attacks that are more physically based, like, I'm going to shut your power off, stop your elevator, modify your HVAC system, open all the doors to your building. Those are kind of physical arena attacks. And then there's the other attacks. The ransomware compromised 10,000 devices so you can do cryptojacking. So mining cryptocurrency. Actually, a Iot of organizations sadly detect that these 10,000 security cameras have been compromised and been uploaded with a crypto minor, not because of some great cybersecurity tool or some xiot security tool or some great incident responders. It's their power bill. Their power bill is a lot higher because, as most of you know here, if you're mining crypto, it takes a lot of power and energy. So certainly attackers like that. But again, the biggest ones are using these devices to attack it assets and hide, maintain persistence and evading detection. These allowing me to attack other tools. So this is just one example. China is not the only country that has devices like this that are doing nefarious things, but it was interesting that Russia built a tool specifically to attack these tools, and China ships the tools already with nefarious capabilities built in. Now, going back, one of the cameras here that's been banned is hickvision. So we already know hickvision kind of makes a malicious camera. Well, in addition to that just announced, and this was on August 23 of 2022, over 80,000 hickvision cameras were found to be exposed online. So just like we saw in that search that we did for cameras a little bit earlier, using showdown 80,000 cameras that were hickvision specifically that were vulnerable to a critical command injection flaw. CSO, not only do they ship with kind of malicious design, but they also have vulnerabilities on them, too, that can be exploited by other attackers. In this case, it was discovered that over 2000 organizations across about 100 countries had not applied the security firmware patch that had been available all the way as far back as September 2021. This doesn't surprise me at all, and I'm going to share some statistics with you in a little while. But a lot of the firmware that we come across is like six, seven years old, and a lot of it has actually been end of life beyond six or seven years. So the fact that this patch was around for over a year, we think of that for maybe a mobile phone or laptop. Oh, why would you wait a year for a lot of these devices, they're simply not being managed. So I'd be remiss if I didn't talk about the Marai botnet. If I'm talking about Xiot security, this was kind of the Godfather, or the grandfather, if you will, of Xiot attacks. IoT started back in 2016. So that's why I call it these grandfather of these attacks. So what was it essentially? So people were using Shodan or other tools to find Internet connected cameras. At least that's where it started. So once they found the cameras, they said, furthermore, I want to see if they're running the Cleartext protocol Telnet. Okay, so I found the cameras. Now they're Internet connected, they're running Telnet. Furthermore, I want to see are they running default passwords or maybe one of know, eight or so pretty common passwords that we run across. And sure enough, they were able to find these cameras. Well, just with those basic searching. And remember, we're not hacking anything. We're looking for a camera that's connected to the Internet, that's running Telnet with a default or a relatively common password. That's it. No hacking involved, nothing was exploited. Just creating a botnet predicated on that set of cameras. They're able to, nefarious users were able to use the Marai botnet to control these cameras, to conduct DDoS attackers that were very impactful on big companies with big networks, right, Reddit, Netflix, Sony, PayPal, Twitter, GitHub and a few others, especially some big telecoms as well. Internationally, these, it took them down just a few little cameras, right? But the cameras collectively had massac process and network capability. But this is what's even more interesting about Mariah Botnet, because there's a lot of white labeling and shared libraries in the Xiot world. That means the build that went into things camera might be very similar to what was used in this printer or this voiceover IP phone or this audio video equipment. So they're being explored running Telnet with the same default passwords, maybe the same vulnerabilities and things like that. So even though I'm sharing your library, that's allowing me to do ABC, that library also has vulnerabilities, XYZ. And I'm sharing that and sharing that and sharing that. So what we found is even though they started with cameras, this expanded was past cameras and started including printers and phones and other devices as well. What's also interesting about this is it was way back in 2016. We still see devices today when we're out at customer sites and we're all over the world. So this isn't just specific two, one country or another that are still vulnerable to these. Marai botnet back from 2016, they're still vulnerable. And we're even finding devices that have Mariah Botnet still on them because they've never been fixed. Hey, as long as the printer is printing or the camera is recording, we don't really know how to manage it or who's managing it or what to do, so just let it do its thing. They're not being monitored, they're not being managed. So again, maintaining persistence, evading detection is a big deal. This is back in 2016, and things really haven't gotten any better. So this is a little bit more werent. So this is can attack. That was announced by Mandian called quiet exit, and this was May 2 of 2022, so pretty recent. And this is all about achieving that persistence from this apt. So what these attackers did is we feel they got in through phishing attacks, again through a laptop, social media, whatever the email or whatever it was, they got in through some type of attack that got into someone's laptop. We all know there's a gazillion ways to do that. So once they're on the laptop, they started looking to pivot to XioT devices. Why? Because no one's looking at them. Also, they generally have default passwords. If they don't have a default password, they're probably running in an old firmware with lots of vulnerabilities that could be easily exploited. A lot of these guys, we see levels, eight, nine, and ten level cves on a score of one to 1010 being the worst. So in this particular case, once they got into the environment, they started looking for these IoT devices, and they found some, and they were looking for some network devices, wireless access points, load balancers, NAS switches. A lot of these systems run BSD, and they're also looking for traditional IoT devices. Voiceover, IP, phone, security cameras, printers. Most of those run Linux, some of those run Android, but very popular operating systems. So they recompiled, reconfigured their solution. And their solution, the attacker solution, was dropbear. Ssh. Nothing too crazy about dropbear, but they installed it on these particular devices, which allowed them to have a reverse SSH tunnel, CSO client, server, communicate and control these devices remotely. So typical command and control, c two tunnel back and forth over SSh. But they were communicating with these XIoT devices, which made it a little bit more novel, right? Once they got onto these devices, they used those devices not to hack really, but to make API calls to the local exchange server and the Microsoft 365 in the cloud. So both on Prem and in cloud, API calls were made to extract sensitive information. And what was the sensitive information? Email between corporate executives, corporate development folks think m a think BD people, and even security staff. So they Iot in through it, pivoted to XIoT, used that to attack both cloud and on Prem. It exfiltrate the data. And the worst part of this, in most cases, these guys maintain persistence and evaded detection for over a year and a half. Again, because no one's looking at these devices, no one's paying attention. The bad guys know it, the nation states know it, the cybercriminals know it. So they're really taking advantage of these. And I can almost guarantee, as we all know, there's probably plenty of organizations out there that have been compromised with this, where data is still being exfiltrated as we watch this video. So another one I wanted to share with you was a russian xiot botnet. And this was a takedown. So this was a success case. The US, the UK, Germany, Netherlands, and actually a couple other companies or countries working together took down a botnet. And as we all know, botnets are kind of like DNS, right? Or a Christmas tree. It's very scalable. So you take out a piece here, a piece here, maybe it pops up someplace else, but if you get to the top of it, you take that down, maybe you've taken it down now for a few weeks or a few months, you're not going to take it down forever. People can rebuild someplace else, but it does cost time, money and resources for the bad guys. So it is a success case. But the reason I wanted to call this specific one out, it's called Rsox, was pretty interesting. Primarily it targeted in the IoT realm, the OT devices, those PLC skated devices that we talked about. There was some network gear, and there was some IoT gear, just to be fair, truth in advertising. But the majority of it were industrial control systems, programmable logic controllers, these types of things that are digital equipment that operates physics, flow, pressure, voltage mixtures, robotics, arms, things of this nature. And again, these are usually real time operating systems, Vxworks and things of that nature. And there's some other more esoteric ones that are out there. And what they were doing was, it was so successful, they were saying, hey, we're going to rent this out. We're going to rent this out to people for about $30 a day. I actually think if you pay, I think, $100 a day, they give you access to the broader network, and they also provided technical support, which was, they operate these things like a real business. Right. Obviously, they're money makers. But I thought, again, what was interesting about this, the reason why I wanted to share it, was primarily based on those OT devices. So they're not safe from this either. And again, it wasn't attacking the OT device to break manufacturing of a vehicle or screw up batch manufacturing of some chemical or some pharmaceutical or blow something up on an oil pipeline. It was simply adding this device to a network of botnets to use it to attack other organizations. Now, could they have been used for what I would consider much more nefarious things like blowing up a pipeline or screwing up a medical batch that's being produced? Absolutely. They had control of these devices, but in the cases we saw, they were Iot being used for that. Another example on the ot side, and again, ot makes up one of the these pillars. Of course, for XioT, this was an attack on Siemens. And how we think of attackers on the it cyber side today is a little bit different than these because they're really, really based. So basically, if you sent packets to this specific device, and this was called the s seven plus crash, that was the name of the attack. You send packets over TCP port 102 to a remote device. It's unauthenticated. Not most, but a lot of these devices operate with no authentication. CSo, you use any kind of tool you want, Netcat, whatever it might be, to send packets port 102 to that device, it causes a DOS attack. Now, some of these devices have what are called set points. Like my temperature can go up to 75 degrees and down to 65 degrees, and it has to stay between those two. If it drops too low or goes too high, it means it passes that set point, an alarm goes off, tells my ScadA system, hey, something's happened. Take a look. Well, if you increase the temperature of something and you're dosing it IoT doesn't have any time to respond, it can't send out the packets because it's basically sucks. So maybe now the temperature is at 100 degrees instead of 75, but it can't do anything about it because it's stuck. It can't communicate that an issue has happened. The reason I want to bring this attack up, yes. It's extremely simple. Right. And it can have a big impact as well on the organization. But Siemens came out and said, hey, here are some suggestions to fix this. I like to show this because in the XioT world, XioT security today is kind of like iT security was like back in 1995, we didn't really know where all our devices are. We had kind of poor discovery, we had poor patch management and software update. Management just wasn't as broad as we would have liked or as well adopted when it came to credentials and password, rotation, complexity, things like that. It was all pretty early stage, but this is what Siemens came out and said, look, for this attack. This is what you should do. Number one, update your firmware. You should be running more recent firmware. Number two, enable access controlled. Consider using a username and password. Number three, set a password. So don't just enable it, but actually set one. And I would say set a good one and make sure it's rotated. And all the things we all know also disable unneeded protocols. A lot of these devices speak, a lot of extra protocols they don't need. Certainly on some of these devices, they probably speak TCP, IP, maybe serial over Ethernet, some more proprietary stuff like Modbus or DNP. Three, they've got wired, they've got wireless Bluetooth, Bluetooth, low energy. So some of them are actually very much what I would call hyper connected. But I just thought it was very interesting. Hey, patch your firmware, set a username and password, and get rid of services that you don't need. Again, it security kind of 1995 CSO. In our research, again, we've been doing this for a little over five years. What we found on average is there's about three, two, five XioT devices per employee in the organization. So a 10,000 person organization probably has somewhere between 30 to 50,000 XioT devices. Now, when we go into an organization, at the beginning of a proof of value, a POV, and we say, hey, take a guess, what do you think you have? Almost consistently, they're off by 40% to 60%. These say, hey, Brian, we think we have 20,000. In the back of my head, I'm thinking, okay, so they got about 40,000 devices, and that's about what it turns out to be. Now, there's a bit of a curve on this. So, for example, a law firm, they're going to have a little bit fewer. A retailer or somebody that's working with industrial control systems, they're probably going to have a lot more. So there are some differences, but on average, what we see healthcare, financial services on and on about three, two, five, devices per employee, and it's always a lot more than people think they have. So what percentage of Xiot devices operate with default passwords? So think about that. What do you think it might be? It's actually about half. About half the devices operate with default passwords. As I just said. Go Google. Default passwords, APC, UPs, it's no super secret. And it's like that for a ton of these devices. So you don't need to hack anything, you just need to log in. So whether it's Internet accessible or you're already within the internal network, it's default password. Now. Forget rotation frequency every 30, 60, 90 days, forget complexity, even when the passwords are changed, and sometimes they're changed at the point of deployment. For some newer devices, it's usually changed to something pretty weak and usually not very long. When we say uppercase, lowercase numbers, special characters, at least 20 characters, passwords, not password. All these things that we talk about in good practices, they're not happening here, right? And there's a bit of a curve to this one has, well, we say 50% on average, but upS systems, as I mentioned before, that's closer to like 100%. When we talk about audio, video equipment, we find that's actually in the high are some devices, again, where the password is changed. Two implementation. We don't see that as much actually on the enterprise side as the consumer side. We focus mostly on the enterprise side. But in those cases, when they're changed, sometimes they're just changed to what the product is, security camera or the name of the company. They're pretty basic things. It's certainly things that could be added to a brute force attack pretty easily. But default passwords half the time. So think about this one. What percentage of xiot devices operate with end of life firmware? Again, these are devices where the firmware has been dead. It's like running windows nt three, five one, or Windows Nt 4.0, which actually, I bring those up because we do see those on the critical infrastructure side, because they depreciate the servers that operate the turbine at these same rate. They depreciate the turbine, which is over decades, Iot over like five years. So the answer to this is 26, werent. 26% of the firmware is actually end of life. And the remaining 74%, the average age is about six years. Could you imagine your smartphone? I'm sure all of you watching this have some kind of smart device. If you didn't upgrade the underlying operating system for six years, or even the apps that are running on top of it. Honestly, it probably wouldn't even work. You probably couldn't even connect to the environment you wanted to connect to. Everything would just be broken. But these devices on average is six years old, which means it comes with a lot of vulnerabilities. So think about this. What percentage of IoT operates with Endeli firmware? We said that was 26%. Look what comes along with this. We're seeing that about 50% of the devices have CVSS scores. Again, one to 1010 being the greatest. CVS scores of 850 percent of these have level eight. That means they're very hackable. Can additional 18% have nine and ten? That means very hackable with almost zero skill remotely done. And to give me full administrative access to that device, that's 68%. That's almost 70% of all the devices have level eight, nine and ten. That's crazy. If I just told you your it assets had that, you jump off this video right now and go fix them. And again, I've got in a company of 10,000 people, I've got 32 50,000 of these things, half of them with default passwords, old end of life firmware, and 78% or 68% of them have level eight, nine and ten CVSS scores. What? That's insane. It's not even fair, right? This is really making things easy for the bad guys. So let's talk about the biggest offenders. Now, I dont have them all listed here. I'm not calling out a specific brand or model number or anything like that, that wouldn't be fair at all. But I did want to share some of the devices that we find time and time again that are just, they're super vulnerable and they're being exploited at a very, very high rate. So the first one, KVM switches, suck. Now I love KVM switches, stands for keyboard, video and mouse, as most of you know. And the idea is I've got one of these switches with one keyboard, one monitor and one mouse connected to 510, 50 different devices, whatever the number might be, and you find them a lot of racks and data centers and things like that, and they allow us to be extensible. The problem is, and these run Linux like most of these devices do. Linux is by far the most popular operating system we see out there for these XioT devices. These run Ubuntu. They run Ubuntu version ten quite often. We're on version 21 now, right? So it's a little dated. It's about a decade old and they're shipping and they're shipping with tons of vulnerabilities because it's a decade old version of Ubuntu, right? And you can go find out all the vulnerabilities that are on bunto version ten that come by default on these devices. Now the problem is this is a device that manages devices. So if you can get access to the KVM switch, you can cause a lot of problems on the devices. Managing network changes, power down the device, make other configuration adjustments, et cetera. Next one, lights out management. Controlled suck things is kind of like KVM on steroids, but for a point device. Now that little arrow there is pointing to what looks like an Ethernet port, but it's actually a lights out management port. What this allows you to do is access that device. By the way, that's a Linux. It's running Linux, right? It's nothing crazy. You might have heard terms like iDrac, ipmi, Ilo. It depends if it's HP, Dell or supermicro. Those are the big ones that you see in this. But it allows me to get access to the device. What's interesting about this is I can actually open up a shell. I can spawn a virtual terminal. I can actually even upload software or malware. These are very simple areas to attack. These get plugged in, nobody updates them. A lot of times there's no password, they're vulnerable. It's just giving me full access to actually do malicious things. And people don't think about it. When I say, how many devices do you think you have? Nobody's thinking about KVM switches or lights out management. And this is why. Server cabinets and racks. Here's another thing. A lot of these are smart cabinets and racks. They've got tamper detection and temperature controls and cable management power, a whole bunch of other capabilities. Again, these devices have all the same problems with the other devices we talked about. Old firmware, default passwords, extraneous protocols. These problems with this particular group of devices is, generally speaking, if you want to update the firmware on a rack, you have to do a power cycle, which means everything that's connected, two, the power supply there has two, then be cycled. So when people are scheduling downtime to update servers and databases, web servers, critical assets like that, not really taking into consideration the racks that kind of manage these devices and that they operate in, so they never get updated, which means they're highly vulnerable. You get access to a rack now, and you can do nefarious things to all the devices within that rack. Physical access controllers suck. This is a big one. We actually did a pov with a very large financial services company where weve able to, with no hacking, we were able to access and say we can open and close 6400 doors at our discretion, including things like the front door. Right, and the back door doors that are probably pretty important for them. But 6400, forget all the cybersecurity you have in place. If I can just access this system and make some changes. There's a very popular version of physical access controlled called nortech security control. I don't want to pick on them, but it's pretty well known that they were shipping with CVSS scores of 9.8 out of ten and ten out of ten on their devices. So has you unpackaged it? You took out of the box? You took it out of the wrapping paper. Oh, it looks so great. You're all excited. You plug it in, it's got level ten vulnerabilities on there, just right out of the box. So craziness. And this is allowing people to do really malicious things, because we talked before about shutting down power, stealing intellectual property, doing cryptojacking. Well, this is actually physically unlocking, or maybe during our emergency, locking doors that shouldn't be locked. So there's a lot of crazy things that could happen there with physical access controls. Another one are printers. Everyone's got them. They're super promiscuous. So printers really suck. And why do they suck so bad? When I say promiscuous, what I mean is they want to be connected. Two, so they're running wired and wireless and Bluetooth and other communication protocols. And you can connect to me via HTTP or HTTPs or SSH, or Telnet or FTP or whatever it is. They've got all these ways because these want to make it easy. And that makes sense because at the end of the day, I want to use my printer to print. The issue that we found of these guys is a lot of them are running like, they're mostly running Linux operating systems, but they've got like 60 to 80 gig hard drives, not huge, not small at today's measure, but it's a pretty big hard drive. When they're being compromised, they're being compromised because of all the problems we talked about before, default passwords, vulnerabilities, old firmware, but they're a great place to hide. And because of that big fat hard drive on there, they're extracting sensitive data. We actually saw one customer where they were pivoting from hundreds and hundreds of printers that have been compromised, attacking it assets, downloading the data compressing it, exfiltrating IoT over ICMP because no one's watching that. Some of these cases longer than a year, right? We work with hotel chains that have 20, 30, 40,000 printers, so it's not uncommon to just have an astronomical number of printers out there. And if they're all or possibly a great majority of them can be compromised and used to attack you. That's a huge attack surface, right? That no one's looking at, no one's managing, no one's monitoring. Black has, back in 2019, they announced the discovery of critical level vulnerabilities on over 10,000 different types of printer brands. Again, it's not surprising at all, but it's actually one of the most targeted. Not the most, but one of the most targeted XioT assets out there. Voiceover IP phones, video conferencing systems, I kind of put those in the same group. Those are usually Android OSS. But what's interesting about these guys is we saw some commonality between some video conferencing systems and some voiceover IP phones because of that whole white labeling and shared libraries we talked about before. So one of these phones, it's a very major vendor. If I said the brand, you'd go, oh my God, they shipped with their phone running SSH undocumented. It was never written that they even had it with default username and password. The problem with that was they didn't even have a security development lifecycle mature enough to say, hey, let's figure out what ports are running on this thing before we ship it out. And oh, lo and behold, it's running Ssh. What kind of password set on that thing? So that's pretty grievous. And I don't want to call these out and say they're doing a bad job, but when it comes to security, it's not their primary goal. They want to get to market, they want blinky lights, they want it to do cool things for the end user. And I get that. But if it's in an enterprise and opens up these vulnerabilities in the back end, of course, that's a huge risk, right? That's something that we need to concern ourselves with. I bring up the video conferencing cameras as well. Again, because of the white labeling, these shared libraries, that exact same build was existing on these video conferencing systems, which again, we talked about spying before with the cameras. These devices can be used for that as well. We've actually seen instances in production customers where those devices, in fact, were being used for that purpose. So again, these devices aren't really being built with security development lifecycle in mind. So I've covered a lot of devices here, but I haven't covered the number one. So think about what do you think is the number one biggest offender? It's security cameras. Security cameras suck. The know, security cameras are great doing their security camera thing, but we talked about some of the ones out of China that have actually been based. Certainly they're bad. They often run operating systems like busybox and other forms of Linux out there. Sometimes, again, they ship with the malware. There's exploits to take advantage of them, like we saw with the Hikvision camera and all those Internet accessible devices where you could run remote commands on these devices. But the biggest problem with security cameras is actually this. You have to understand that. Are they a dumb device? Yeah, they're a dumb device, but they have the same storage and processing capability and memory and input output capabilities as a laptop. Some of them actually even more. Some of these are really quite heavy duty. Consider them like workstation level security cameras. They're very powerful, so don't think of them like as a weak device. They're actually a very powerful device. These just happen to be an insecure, very powerful device running an operating system that allows you to do all the same things you could do on a laptop. So just think of it. That was these other thing with security cameras is most people don't have in the enterprise a handful. They have thousands. In some cases. We've seen tens and tens of thousands. We're working with a major casino that actually has over 50,000. 50,000 security cameras. Right? So the worst part of it is this, when we're talking to these organizations, two say, hey, here's the problem, we can come in here and help you. Who manages these? Oh, it's corporate security thinking. They're like, oh, no, it's network operations. Not us, it's the Iot sec. No, no, it's a third party vendor. So it's kind of like the end of Spider man. Everyone's point, who is it? Is this guy? Is this that guy? So nobody wants to take responsibility. And I get it because historically there was no way to really fix these devices at scale safely. These, you're going to have somebody, a football team of people with a paperclip to go do a physical reset to update these firmware. That would be nuts, right? You'd never do it. So if you can, what happens? It's just not done. And that's what the bad guys are counting on, that you're just not going to do anything. Now, weve mostly been talking about Enterprise Xiot a little bit on the industrial side with OT, but I want to call it just a few other areas before I go deeper. There's also Internet of battlefield things. These are tied to all the military devices out there. There are certainly things that are specific to the industrial side. We kind of got these tip of the iceberg there, but there's a lot of very specific purpose built devices for batch and discrete manufacturing. Oil and gas, power and energy, water, traffic, sanitation, agriculture, you name it. That's a really big realm of the OT devices, right? Healthcare also has a lot of specific things. Another big one is things like smart buildings, smart cities, smart ships. Difference between smart ships and smart buildings is one floats. They're all the same devices, to be quite frank. But if you look at this all collectively, it kind of gives you. Okay, wow. Beyond the enterprise, things actually has a global impact, right, on cities and counties and states and countries and regions. Everything is ultra connected. And if you think about these first official, the first unofficial IoT device was back in the 1980s. It was a coke machine. That was an arpanet. Okay. But then we fast forward to the. We had a TCP IP toaster that was connected. That was the first official IoT device. Well, Dublin, Ireland, is the first official smart city. So within 25 years, plus or minus, we went from a toaster to an entire city. So everything I've talked about here and everything I'm showing on this slide, this is only going to expand exponentially. Everything everywhere always is going to be connected with these devices, and hopefully we can get them beyond 1995 security. So I've talked a little bit about, or a lot of it, about sort of the bad side of this, right. The use cases, the things that suck the most. But let's talk about getting rid of that suck. Let's talk about making it so it's not easy for the nation state hackers, the cybercriminals, malicious insiders, so on and so forth. So what can we do? Well, the first thing is discovering, as we talked about before, three to five XIoT devices per employee is a lot. And the fact that if you don't know where even half of those devices are, that's a big problem. Now, old school discovery solutions, and I say old school because they're really based on it and it centric adaptations. You look at like a vulnerability scanner for discovery. They're going to send malform packets and kind of see what the device is going to come back as. That could be a tenable, a qualis rapid seven, great for it, not really fantastic for IoT. They can actually crash systems. You don't want to scan in an OT environment, for example, sending malformed packets to a PLC device from the 1990s, you got about a 99% chance you're going to crash that thing. In a world where availability is everything, right? So the traditional scanners don't really kind of work. Then you say, okay, well, what about packet sniffing? Well, sniffing is okay. You Iot, a lot of span ports, a lot of taps, there's a big network out there, but also a lot of the communication is encrypted, so you're not really able to glean a lot of metadata. You might be able to say, I think it's a printer, maybe even it's a HP printer, but I can't really get deep into it from sniffing to really give granular detail. So that's kind of lacking. And then there's traditional asset management solutions, again geared for it environments. A lot of them look at Mac addresses. So the OUI, the organizationally unique identifier. Oh, you're a jet direct. You must be a printer. Well, could be. Could also be a phone. Right? So those are great again for it. Not so great in this world. They have a lot of lacking. So there's a new kind of based of solution. I'm going to share some of the vendors at the end of the presentation, but it's called enterprise Xiot security platforms. And the way these usually work is they actually communicate with these devices. They interrogate these. Think of like c three po from Star wars. He could speak like a million languages and even water evaporators and things like that. Very cool. So being able to not can the device, not sniff the device, but communicate with that device in the way it was designed to be communicated with, being able to scale that for obtain million types of devices, that's really key because now that you can communicate with it, you can extract much more data, firmware model number, serial number, ports and protocols that are operating credentials. All the little isms within that product can be pulled out through that interrogation. So that gives you a very robust sort of starting point. Now I know what I've got, and it's not based on some packet scanner that was developed or based on technology in the 1990s with malformed packets or sniffing. It's actually communicating, interrogated these devices. Right. So that's step one. The other part of this is upgrading firmware and hardening. So now we found the devices, now I want to remediate it. I actually want to fix it. So back in the day, a lot of people said, well, there was really no way to fix it, so we're going to hide it behind a Vlan. Nothing against VLans. I think Vlans do add an added level of security. But, man, if you're a 10,000 person company again, 32, 50,000 xiot devices, you're going to vlan all that stuff off. And Vlans aren't the end all, be all of security. Plus, what are you evaluating? Off. You're vlanning off devices that have bad passwords, old firmware full of vulnerabilities, kind of covering your ears and your eyes and just hoping nothing's going to happen. I mean, think of it this way. Like I'm typing and, oh, I cut my hand, my left hand's bleeding and I really need to go to the doctor and get this looked at, but instead I'm going to put a sandwich bag on it and wrap it up with duct tape. Okay, well, now I'm not getting blood in my right hand or my keyboard, so that's good, I guess, but I still got a bloody hand in a bag, which is really not the best thing to do in a VlaN situation. Your seal is saying, I got all these vulnerable, broken, defaulted password devices, but they're behind a vLan, so it's okay. Not a great approach. It's great to use in addition to fixing your devices, but who wants to do that? You would never do that with your it assets. Why would you do it with Xiot? Now with enterprise XioT security platforms, part of what they do is say, okay, I know what my device is, I can communicate with it, I can also upgrade the firmware. And because of these interrogated process, there's a lot of minutiae that can be extracted. Like, hey, I'm on version seven. The latest version is version ten. Can I go right from seven to ten or do I have to go seven 8910 or let's say I'm on version five and there's a log for j vulnerability. On version five we tell the vendor, the vendor goes, look, we're not going to have a fix for this version six for like another seven months. I can't wait that long. Everybody and their brother is hacking everything with log for j right now. But version four didn't have that. So maybe I want to downgrade my devices until that new version is actually available. So when you do that interrogation, as part of the discovery phase, you actually have that type of knowledge, which is really, really cool now. So now I can actually upgrade the firmware and downgrade the firmware if I need to as well, and do pre flight checks. Two, make sure that, hey, I'm not basing this on a Mac address. I actually know this is an MRI machine, or I know this is a printer, because the last thing I want to do is I don't want to turn my MRI machine that's $2 million into a printer. That's $500 with the wrong firmware. People tend Iot to like that, right? So you have to have very high levels of accuracy. In fact, you have to be 100% accurate. There's no room for 99%, certainly 5100 percent accuracy during discovery, so you can do the upgrading of the firmware. And while you're doing that, we talked about the Siemens stuff earlier with the OT hack by sending TCP packets to port 102. Siemens said, hey, turn off some of the protocols you don't need. Well, in hardening, you might say, you know what, I only want to run wired. I don't want to run wireless on all my printers, for example. And no more bluetooth, low energy, and no more clear text protocols. In fact, I just want to run SSH and HTTPs, period. Port 22 and four, four, three. That's it. Anything else for this particular set of devices, I want to change it. I want to do that for just devices in North America or just HP printers, or just HP printers. Model ABC. One, two, three. CSO. You can be very fine grained in how you push it out, and you can push those out manually, one at a time, or say, I'm going to batch those up into a large group. Right? So again, that's another value add that you get from these enterprise XIoT security platforms. And again, this is a relatively new thing. These haven't been around. It's not like a firewall or IPS or a scanner. It's been around forever. So I found my device, I've fixed the firmware, I've hardened the device. Now I get into credentials and certs. So Pam solutions, things like Cyberark, Thicotic, Hashicorp, some of these others that you see are great. They're fantastic tools and been used forever, and they add a lot of value. They store your passwords, they have rotation policies, frequency, complexity, all that. But they don't speak to Xiot. They can't, and they don't want to have to build that. So these enterprise XioT security platforms that are again, like C three Po. They can talk to all these devices and say, hey, there's 50,000 devices on this network. I'm going to automatically enroll them in Cyberark, for example. And in doing so, I'm actually going to also tell Cyberark, just like I knew the firmware upgrade paths. I'm going to tell you for my credentials. Hey, this guy can only take a four digit pin. This guy can take ten characters, but he can't use a backslash escape sequence. Stuff for like, SQL injection, whatever. Or this guy can go up to 20 characters, but IoT can't use the number nine. We see all sorts of crazy things. I don't know who designed some of these, but there are some crazy isms that are related to that. Well, all that intelligence is put in when you create that policy, automatically enroll that device. So I've just enrolled 30,000 devices. This group falls into this category. This group that, this group that. Then you can apply your whole 30, 60, 90 day rotation, complexity, length, all those variables that you would in the IT environment. But now you're doing it with your Pam solution, which talks to an enterprise XioT security platform, which then talks to all these devices. Very clean, very simple, very scalable, and takes advantage of some of your existing controls. The same thing applies to the certs. You might find out that, especially on the network side, about a wireless access point. That's like TLS version 1.1 or 1.2, go, oh, it's too old, or it's a self signed cert, or it's an explored cert. We see this all the time, not just on network devices, but other XioT devices, too. But wireless access points are a big offender in things world. So by talking to those devices that manage the certs, just like Pam, for managing the credentials, you can go ahead and make those changes and make those updates. So I found my device, I'm managing the firmware. I'm harding, the device, I'm managing credentials, I'm managing the certs. Now you're getting your xiot devices to the level of your IT security, which is pretty incredible, because your solution before was do nothing, cover your eyes, cover your ears, and hope that nothing happens. Maybe Vlan, a couple of your devices, if you can get at it, but probably not. So we found our devices, we fixed our devices, and you'd be remiss if you said, okay, that's it. What you want to do is you want to have those devices automatically reinterrogated, probably on a daily basis. That's kind of the gold standard, right? And by reinterrogation, what I mean is let's reconfirm that years you were on version seven and you're still on version seven of the firmware, and that's the latest version. You did have a great password through Cyberark, and that password is still being managed. But what if someone walks up with a paperclip and does a hard reset? I was on seven, but now I'm on version five. I did have a great password, but now I'm back to the default password, ABC, one, two, three. Well, now you can say across my 50,000 devices, these are the five devices I have to take a look at right now because they've drifted, either because somebody did a paperclip attack, paperclip hack where they've reset the device with the little black button on the back of these XIoT devices, or maybe there was some kind of fault in the system that made it revert back to default. We all know there's reasons why these things can happen, some nefarious, some benign, but in any case, you know that something's changed. And these are the devices that now you can look at and you can manage them by exception. And this is important because it means now the enterprise IoT security platform provides scale because you can manage by exception. You can have a team manage tens of thousands or hundreds of thousands of more of devices, because now you're going to be notified when one of those devices has a material change in addition to being able to productivity push, credential changes, new hardening gold standards, if you will, firmware updates, patches, so on and so forth. So I really like the value they add in terms of monitoring for that environmental drift. To me, that's how automation equals scalability right there, plain and simple. The last thing is reporting these enterprise X Iot security platforms can actually report on what you've got. How great would it be to know that, yes, I've got 50,000 devices, and by the way, I've got 300 that have end of life firmware. I've Iot 3000 that have default passwords still. I've got 4000 that I've enrolled through my Pam, I've got these vulnerabilities, I've got 1200 that have level ten cves. These are the types of things I know, and now I can trends things over time. We were this bad last month, now we're only this bad, and hopefully next month we're going to be that bad, right? And it's this continuous process of reporting on this and having APIs that tie into your existing reporting structures, being able to talk to splunk, being able to talk to ServiceNow Demisto other tools like that is really important. And these enterprise X Iot security platforms provide that. So last slide here. I just want to touch on a few things. In general, organizations don't know what they have, so discovery is so important, so they don't know what to fix. So if you don't know what you have, forget remediation. But remediation is so key. What's the point of finding your devices if you're not going to fix them? Okay, I didn't know what I have, and now I do know what I have, and everything's broken. What do I do? Okay, what's the next step? But if you don't know what you have, you don't know what to fix, then you're not able to fix these, even if you did know what you had to fix. Are you going to be able to fix 20,000 cameras or 40,000 printers manually without some type of automated solution? And then once they stay fixed, you want to be able to monitor those devices, and people aren't able to monitor them because they don't have tools to inspect them. You can't monitor by sniffing traffic or doing a scan. You have to be able to interact with that device at scale across, again, hundreds of thousands of devices. And this isn't just putting your XioT devices at risk, your printers, your cameras, your ot devices, your network gear, but the IT and the cloud based assets as well. Like we talked about in quiet exit. Right? It's putting that infrastructure and all the sensitive data that lives in that infrastructure at risk. And this results in everything from data theft and ransomware, so on and so forth, spying, physical attacks, et cetera. Right. So the results of attacks on xit are very wide and can be extremely painful for organizations. IoT doesn't have to be that way. This new generation of solutions, these XioT security platforms, again, phosphorus, we offer one as well. But there's other vendors out there that do things. We all do things a little bit differently. Some of these companies, Armist, Nizomi, they're really focused on just discovery. Other companies like phosphorus, we look at discovery and we integrate with them as partners as well. And we also primarily focus on remediation. And some of these others do something in between. But there are solutions now. So I implore you, take a look at your IoT environment. Try to determine what it is you've got and what the problems might be. And if you think you might be in a situation where hey, what Brian just covered in this presentation makes some sense, I think I'd like to kick the tires, reach out to phosphorus or some of these companies and say hey, I'd like to do a proof of value. I'd like to find out what I've got and what problems I've got in my environment and what I can do to fix it. Because I'm telling you right now, the XioT problem is growing exponentially. It's a much larger footprint than traditional endpoint devices or cloud combined by several orders of magnitude. And again, they're all traditional servers, Linux, Android based. They're just unmanaged and insecure and access points to attack your rest of your environment. And the bad guys are hoping you're not paying attention because things is a window of opportunity for these. They know it's there, but do you know it's there? And are you going to take steps to remediate IoT? So with that, thanks everybody for listening to my presentation. Again, I'm Brian Contos, I'm the chief security officer with phosphorus. If you'd like to reach out to me, here's my email and you can hit me up on LinkedIn and Twitter. I'd love to chat more about about XioT security platforms and certainly what phosphorus and some of these other players can provide. You have a great rest of the event.
...

Brian Contos

CSO @ Phosphorus Cybersecurity

Brian Contos's LinkedIn account Brian Contos's twitter account



Awesome tech events for

Priority access to all content

Video hallway track

Community chat

Exclusive promotions and giveaways