26
Transforming IoT Security Through Visibility Liran Chen , CISSP Director System Engineering , ForeScout 5/10/17

Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Transforming IoT Security Through Visibility

Liran Chen , CISSPDirector – System Engineering , ForeScout

5/10/17

Page 2: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

1

2

3

IoT Landscape

Threat Landscape

Gartner IoT Security Market Guide

4 IoT Attacks- Observations

Page 3: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

IoT: Internet of Threats – A Message You Can Hug

http://www.computerworlduk.com/security/mongodb-ransomware-attacks-what-your-business-needs-know-3652793/

3

One by one,

these are

becoming a

reality.

Time to secure

them is now.

common passwords like “qwerty”,

“password”, and “123456”

Page 4: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Exponential IoT Growth

Source: Gartner IoT, PC and Mobile device forecast 2015

4

PC’s & Mobile Devices

IoT Devices

Took 25 years to get to

10 Billion devices* Will take only 5 years to get

to 30 Billion devices*Reference acronym glossary at the end of presentation

Page 5: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

IoT Device Landscape is Fragmented

Source: Harbor Research, 2014; McKinsey Global Institute, 2015

5

IoT Device / Solution Vendors by Physical Environments

Personal Home CityFactory LogisticsRetailVehiclesOffice WorksiteMedical

Device landscape is going from few devices and OS types to innumerable devices and OS types

Reference acronym glossary at the end of presentation

Page 6: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Challenges and Lessons Learned

IoT Adoption Driven by Business Needs

6

Nothing is more powerful than an idea whose time has

come – Victor Hugo

IoTResistance is futile – Shadow IoT Devices

Businesses need IoT to improve their business

Non-IT provisioned devices

IT can’t manage the devices via agents

BYOD

Resistance was futile – Shadow IT

Users needed it to do their jobs

Non-IT provisioned devices

IT couldn't manage the devices via agents

Reference acronym glossary at the end of presentation

Page 7: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

1

2

3

IoT Landscape

Threat Landscape

Gartner IoT Security Market Guide

4 ForeScout Solution

Page 8: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

IoT Opens Much Bigger Attack Surface

Less than 10% of new devices connecting to the corporate environment will be manageable through traditional methods

8

Source: Gartner, BI Intelligence, Verizon, ForeScout

Managed

Devices

Unmanaged

Devices

2010 2012 2014 2016 2018 2020

By 2020: 20+ BillionUnmanagedConnected Devices66%

of all networks will have an

IoT security breach by 2018

Reference acronym glossary at the end of presentation

Page 9: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Visibility is a Top Security Concern

9

Source: 2016 ForeScout IoT survey

Only 14.6% quite

confident about visibility

into their IoT devices

Reference acronym glossary at the end of presentation

Page 10: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

A Perfect Storm of Threats Creating New Security Needs

10

Attacks targeting devices that corporations can’t see

5 out of 6 large

companies is hit

with targeted

attacks today

Reference acronym glossary at the end of presentation

Page 11: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Insecurity of Things: Danger Rankings

11

DISASTROUS

Cause irreversible

damage

DISRUPTIVE

Disrupt corporate

and operational

processes.

DAMAGING

Enable information

stealing

Illegal remote monitoring

Tampering with temperature controls

Spying viavideo and

microphone

Accessing company

information

Obtaining user

credentials

Source: ForeScout IoT Enterprise Risk ReportReference acronym glossary at the end of presentation

Extracting Wi-Fi credentials

Snooping on calls

Page 12: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

IP-Connected Security Systems

An Example of IoT Device Risks

12

Many use proprietary radio

frequency technology that lack

authentication and encryption.

Attackers can form radio

signals to send false triggers

and access system controls.

User compute capability to ex-filtrate

large amounts of data.

Disable camera to allow

physical break in.

Hijack camera to spy on

employees usage of computers,

passwords, applications, designs.

DISASTROUS

Reference acronym glossary at the end of presentation

Use as launching point for DDoS

attacks.

Page 13: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Mirai Botnet

Mirai used in DynDNS attack on ~100K devices involved.

13

11/1/2016

Reference acronym glossary at the end of presentation

Follow Mirai Attacks on Twitter – @MiraiAttacks.

A tweet is sent each time a Mirai attack is detected, as of Feb

6th 2017, there were over 1,750 tweets with count starting in

October 2016.

Page 14: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Hajime Botnet- Destination Unknown

Hajime (meaning ‘beginning’ in Japanese) is an IoT worm that was first mentioned on 16 October 2016 . One month later we saw the first samples being uploaded from Spain to VT. This worm builds a huge P2P botnet (almost 300,000 devices but its real purpose remains unknown.

14

11/1/2016

Reference acronym glossary at the end of presentation

After a little analysis we see that most of the victims turn out to

be DVRs, followed by web cameras, routers, etc.

Page 15: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

1

2

3

IoT Landscape

Threat Landscape

Gartner IoT Security Market Guide

4 Few Examples

Page 16: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Gartner IoT Market GuideForeScout Listed As A Representative Vendor

16Reference acronym glossary at the end of presentation

Page 17: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Gartner IoT Market GuideForeScout Listed As A Representative Vendor

17Reference acronym glossary at the end of presentation

Page 18: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Many IoT Devices Are Invisible

18

Many IoT

devices lack

firewall

capability

Many IoT

devices cannot

be patched

Many IoT

devices run on

outdated or

unsupported

software

Many IoT devices

cannot host an

agent

Agentless Visibility

Reference acronym glossary at the end of presentation

Page 19: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

1

2

3

IoT Landscape

Threat Landscape

Gartner IoT Security Market Guide

4 IoT Attack Samples

Page 20: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

PDQ LaserWash

http://www.darkreading.com/vulnerabilities---threats/hackin-at-the-car-wash-yeah/d/d-id/1319156

20

Overview: Hacking At The Car Wash

Devices: Unmanned Auto Car wash

Industry: Retail

Description: The Web interface in a popular remote access car wash system was hacked allowing the attacker

to hijack the functions of a car wash. One incident included the rotary arm in the car wash to smash into a

minivan mid-wash, spraying water into the vehicle and at the family inside. The minivan driver quickly

accelerated out of the car wash, badly damaging the equipment, as well as the vehicle.

Reference acronym glossary at end of presentation

Page 21: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Various Banks

http://www.ibtimes.co.uk/billion-dollar-bank-job-how-hackers-stole-1bn-100-banks-30-countries-1488148

21

Overview: The Billion Dollar Bank Job: How hackers stole $1bn from 100 banks in 30 countries

Devices: Video surveillance camera among others

Industry: Finance

Description: Carbanak gang (named after the malware it uses), with members in Russia, Ukraine, China and other parts

of Europe, has been stealing tens of millions of dollars from banks, e-payment systems and other financial institutions

since 2013. In addition to other means the gang used the bank's own cameras against them, the gang were able to see

and record everything that was happening on the screens of bank employees. By monitoring these screens the hackers

were able to gain intimate knowledge of just how each bank's specific internal systems worked, allowing them to tailor

each attack.

Reference acronym glossary at end of presentation

Page 22: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Romantik Seehotel Jaegerwirt Hotel

https://www.siliconrepublic.com/machines/iot-hackers-austria-dc-blockchain

22

Overview: Austrian hotel shut out by hackers, quite literally

Devices: Electronic key system and entire computer system

Industry: Austrian hotel rooms

Description: According to Austrian news site The Local, the Romantik Seehotel Jaegerwirt hotel, located in the

picturesque Alps range, was hit by a cyberattack that resulted in all its guests being locked out of their rooms. Guests

could leave their rooms, however they were unable to re-enter them.

Activating the door-locking mechanism remotely, the hackers were able to send the hotel into chaos during the height

of the ski season, while also shutting down the hotel’s entire computer system. The hotel had to pay thousands in

bitcoin ransom to cybercriminals to get the rooms unlocked. The manager said it was cheaper and faster for the hotel to

just pay the Bitcoin.

Reference acronym glossary at end of presentation

Page 23: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Boeing & United Airlines

http://edition.cnn.com/2015/05/17/us/fbi-hacker-flight-computer-systems/

23

Overview: Hacker claimed United Airlines flight's engine controls

Devices: In-flight entertainment systems

Industry: Airline

Description: A cybersecurity consultant hacked into computer systems aboard airliners up to 20 times and

managed to control an aircraft engine during a flight. He hacked into in-flight entertainment systems aboard the

aircraft and then accessed the flight control system, which he then manipulated to cause one of the airplane

engines to climb resulting in a lateral or sideways movement of the plane during one of the flights.

Reference acronym glossary at end of presentation

Page 24: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

The End

Page 25: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Acronym Glossary

AAA Authentication, Authorization and Accounting

ACL Access Control List

ACS Access Control Server [Cisco]

AD Active Directory

ANSI American National Standards Institute

API Application Programming Interface

ARP Address Resolution Protocol

ATD Advanced Threat Detection

ATP Advanced Threat Prevention

AUP Acceptable Use Policy

AV Antivirus

AWS Amazon Web Services

BYOD Bring Your Own Device

C&C Command and Control

CA Certificate Authority

CAM Content Addressable Memory

CASB Cloud Access Security Broker

CCE Common Configuration Enumeration

CDP Cisco Discovery Protocol

CEF Cisco Express Forwarding

CIS Center for Internet Security, Inc.

CIUP Cumulative Infrastructure Update Pack

CLI Command Line Interface

CMDB Configuration Management Database

CoA Change of Authorization

CPPM ClearPass Policy Manager

CPU Central Processing Unit

CSC Critical Security Controls

CSV Comma Seperated Value

CUP Cumulative Update Pack

CVE Common Vulnerabilities and Exposures

DB Database

DDoS Distributed Denial of Service

DHCP Dynamic Host Configuration Protocol

DLP Data Loss Prevention

DNS Domain Name Server

EDR Endpoint Detection and Response

EM Enterprise Manager

EMM Enterprise Mobility Management

ePO ePolicy Orchestrator

EPP Endpoint Protection Platform

FERC Federal Energy Regulatory Commission

FIPS Federal Information Processing standards

FQDN Fully Qualified Domain Name

FTP File Transfer Protocol

FW Firewall

GCP Google Cloud Platform

GPO Group Policy Object

GUI Graphical User Interface

HA High Availability

HBSS Host Based Security System

HIP Host Information Policy [Palo Alto Networks]

HIPAA Health Insurance Portability & Accountability Act

HITECHHealth Information Technology for Economic and

Clinical Health

HPS Host Property Scanner

HR Human Resources

HTML Hypertext Markup Language

HTTP Hypertext Transfer Protocol

IaaS Infrastructure as a Service

ICMP Internet Control Message Protocol

ID Identification

IDaaS Identity as a Service

iDRAC Integrated Dell Remote Access Controller

IM Instant Messaging

IMAP Internet Message Access Protocol

IOC Indicator of Compromise

iOS iPhone Operating System [Apple]

IoT Internet of Things

IP Internet Protocol

IPMI Intelligent Platform Management Interface

IPS Intrusion Protection System

ISE Identity Services Engine [Cisco]

IT Information Technology

ITAM Information Technology Access Management

ITSM Information Technology Service Management

LAN Local area Network

LDAP Lightweight Directory Access Protocol

LLDP Link Layer Discovery Protocol

MAB Mac Authentication Bypass

MAC Media Access Control

MAPI Messaging Application Programming Interface

MDM Mobile Device Management

MTP Mobile Threat Prevention [FireEye]

MTTD Mean Time to Detection

MTTR Mean Time to Resolution

NA Not Applicable

NAC Network Access Control

NAT Network Address Translation

NBT NetBIOS over TCP/IP

NERC North American Electric Reliability Corp.

NetBIOS Network Basic Input/Output System

NGFW Next-Generation Firewall

NIC Network Interface Card

NIST National Institute of Standards and Technology

Nmap Network Mapper

NOC Network Operations Center

OS Operating System

OT Operational Technology

OU Organizational Unit

OVAL Open Vulnerability and Assessment Language

P2P Peer-to-Peer

PAM Privileged Access Management

PAN OS 7.x Palo Alto Networks Operating System 7.x

PC Personal Computer

PCI Payment Card Industry

PKI Public Key Infrastructure

PoE Power over Ethernet

POP3 Post Office Protocol

pxGrid Platform Exchange Grid [Cisco]

RADIUS Remote Authentication Dial-In User Service

RAP Roving Analysis Port

RDP Remote Desktop Protocol

Reauth Reauthorization

RI Remote Inspection

RM Recovery Manager

RMM Remote Monitoring and Management

RO Read Only

ROI Return on Investment

RPC Remote Procedure Call

RRP Remote Registry Protocol

RTU Remote Terminal Unit

RW Read/Write

SaaS Software as a Service

Page 26: Transforming IoT Security Through Visibility · credentials Snooping on calls. IP-Connected Security Systems An Example of IoT Device Risks 12 Many use proprietary radio frequency

Acronym Glossary

SANSSystem Administration, Networking and Security

Institute

SCADA Supervisory Control and Data Acquisition

SCAP Security Compliance Automation Protocol

SCCM System Center Configuration Manager

SDN Software Defined Network

SEL System Event Log

SGT Security Group Tags [Cisco]

SGT Security Group Tags [Cisco]

SIEM Security Information and Event Management

SMS Short Message Service

SNMP Simple Network Management Protocol

SOC Security Operations Center

SOX Sarbanes-Oxley

SPAN Switch Port Analyzer

SQL Structured Query Language

SSH Secure Shell

SSID Service Set Identifier

SSL Secure Sockets Layer

SSO Single Sign On

STIG Security Technical Implementation Guide

SYSLOG System Log

TACACS Terminal Access Controller Access Control System

TAM Threat Assessment Manager [FireEye]

TAP Threat Analytics Platform [FireEye]

TCO Total Cost of Ownership

TCP Transmission Control Protocol

TIP Threat Intelligence Platform

TLS Transport Layer Security

UBA User Behavior Analytics

UDP User Datagram Protocol

URL Universal Resource Locator

USB Universal Serial Bus

VA Vulnerability Assessment

vCT Virtual CounterACT

VDI Virtual Desktop Infrastructure

vFW Virtual Firewall

VGA Video Graphics Array

VLAN Virtual Local Area Network

VM Virtual Machine

VoIP Voice over IP

VPN Virtual Private Network

WAF Web Application Firewall

WAN Wide Area Network

WAP Wireless Application Protocol

WMI Windows Management Instrumentation

WSUS Windows System Update Services

XCCDFThe Extensible Configuration Checklist Description

Format

XML Extensible Markup Language