Modern field guide to security and privacy

The new, stealthy threats to the Internet of Things – and how to stop them

The emergence of the Internet of Things has provided unconventional ways for criminals to get inside corporate networks. No organization is immune to a breach, but there are ways they can begin safeguarding infrastructure while maintaining the convenience and power of the IoT.

|
Bastille
The Internet of Things will grow by leaps and bounds in the next half decade -- and so will the security needs, as hackers take increasingly unconventional approaches to compromising large enterprises, argues Bastille Network's Chris Rouland

For newcomers to digital security, the possibilities and risks of the Internet of Things can boggle the mind.

We may have as many as 500 connected devices in our homes by 2022, according to an estimate from research firm Gartner. For many of us with only a handful -- or no -- connected devices today, that’s a lot of possibility.

At the same time, the market for security in the IoT will hit nearly $30 billion by 2020, according to an estimate by Markets and Markets. That hints at a lot of risk.

Why is that? While the intention of IoT device makers is to increase efficiency and productivity, they are racing to market with little to no concern for cybersecurity. As a result, these devices bear significant security weaknesses, leaving organizations vulnerable to attack and raising major privacy concerns.

Connected cars, medical devices and security cameras have all been successfully exploited. These intrusions, however, have been largely “traditional” attacks, exploiting the same connections that have provided hackers an entry into everything from Target’s point-of-sale terminals to the emails of Sony executives.

But the risks to the IoT are going to come from places traditional cyberdefenses don’t even consider.

Reading through the presentations at this year’s top conferences for hackers -- DEF CON and Black Hat, which run during the same week of August in Las Vegas -- I saw stark evidence that the IoT is open to attacks that are anything but traditional.

For example, researchers at Cognosec revealed that ZigBee, an open global wireless standard used by IoT device manufacturers like Motorola and Samsung, has critical vulnerabilities that can allow a hacker to easily compromise an entire network. (In general, talks about wireless and software-defined radio as a means of digital compromise dominated the conversation at these conferences.)

Another corporate vulnerability involved hacking into space. Colby Moore exposed how easy it is to access Globalstar’s GPS satellite network, the systems used to track sensitive cargo including military supplies, nuclear materials and more. Unbelievably, Globalstar does not encrypt these communications and the only safeguard to ensure the data is shared strictly between appropriate parties was broadcasting using a spread spectrum, a kind of physical division of each transmission into hard-to-reassemble pieces that Moore was able to reassemble. Doing so would allow Moore to fake his own broadcasts. If he was to disable a Globalstar chip on a cargo shipment, he could broadcast that the shipment was on its proper route, even as he stole it and took it in the opposite direction.

A software exploit presented by Ang Cui at Black Hat called Funtenna can remotely and anonymously exfiltrate data from IoT devices without any Internet access. It intentionally comprises emanation by turning an IoT device into a radio transmitter –- allowing hackers to smuggle data without using the corporate network and, therefore, bypassing all security protocols. Funtenna can turn a simple printer into a radio frequency (RF) leak that can penetrate a 2-foot concrete bunker. In fact, Funtenna-infected IoT devices transmit data in a way that is not currently monitored in the network, revealing a significant and complicated vulnerability in the enterprise.

One highly anticipated talk at DEF CON mysteriously disappeared from the agenda but hints at further, stealthy paths to exploiting the IoT. Picture the following: you walk into your favorite coffee shop or public library and find a secluded spot to put a small transmitter. That transmitter, called ProxyHam and created by Ben Caudill, claims to use a 900-megahertz radio link to anonymously access a WiFi network from as far as two miles away. If someone were to attempt to trace the connection from the Internet to the user at her keyboard, the investigator would only find ProxyHam’s IP address and the wireless network at the coffee shop, ultimately making the user impossible to identify and track.

This low-tech device cannot cause a massive data breach, but it could easily exfiltrate passwords and encryption keys in just a minute or two. Despite being developed for the purpose of enhancing user privacy, ProxyHam created another threat vector for hackers to access corporate environments – and do so without being detected. (Caudill has reportedly since scrapped the ProxyHam).

While it would be ideal for every IoT device to come pre-installed with enhanced security, this is a pipe dream considering the exponential number of devices being developed each day and the lack of IoT security standards or regulations currently in place. ProxyHam and Funtenna are just the first of many untraditional technologies that can be used to anonymously compromise corporate environments. As such, cyberthreats are only going to increase, and hackers will continue to find easier, faster and cheaper ways to consume sensitive data and compromise environments.

How do we fight back?

The enterprise must stay up-to-date on these developments and incorporate IoT into their security strategies. A good first step would be to dust off the bring-your-own-device (BYOD) policy and revise it to include the multitude of other devices and personal clouds that could be residing in corporate environments.

Another opportunity is to increase the frequency in which asset inventory in conducted. You’d be surprised how many companies simply don’t know what’s connected, or trying to connect, to their networks. By maintaining complete situational awareness, especially over third-party devices using uncommon protocols, enterprises can better work with in-house security teams and vendors to ensure that devices are configured properly, and that they are only communicating when necessary. 

We’re in somewhat unchartered territory here, but attacks on the IoT, stealthy or not, show no signs of stopping. To speak on this subject further, and provide tips to protect your corporate airspace, I will be presenting at the Security of Things Forum in Cambridge, MA on Sept. 10, 2015.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to The new, stealthy threats to the Internet of Things – and how to stop them
Read this article in
https://www.csmonitor.com/World/Passcode/2015/0826/The-new-stealthy-threats-to-the-Internet-of-Things-and-how-to-stop-them
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe