Friday, October 27, 2017

Internet of Things, uh More appropriately Risk of Things... Vol 6 rel 12

The Internet of Things (IoT) has been called the next Industrial Revolution — it promises to impact the very fabric of communications within businesses, governments, and consumers.  As with all hype, come the counterbalance of woes.  There isn’t a Security Manufacturer, Re-seller, or Consultant that isn’t chatting about the impending doom IoT can present from a Security Perspective.
First of all, let’s delve into whether this is a real phenomenon or not.  Well, if Gartner is any indication, this is much more than marketing hype. 
  • Now their numbers lag behind Business Intelligence of 15 Million IoT devices by 2015 – however, the projected 8.4 billion this year is close enough for Government work, with the 20.4 billion devices by 2020.
  • Total spending on endpoints and services will reach 2 trillion this year.

Consumer Applications to Represent 63 Percent of Total IoT Applications in 2017
The consumer segment, with 5.2 billion units in 2017 is the largest user of connected things, which represents 63 percent of the overall number (see Table 1). 
Not to be out done, Businesses are on pace to employ 3.1 billion connected things by the end of this year, 2017.  Aside from automotive systems, the applications that will be most in use by consumers will be smart TVs and digital set-top boxes, while smart electric meters and commercial security cameras will be most in use by businesses," said Peter Middleton, research director at Gartner.
In addition to smart meters, applications tailored to specific industry verticals (including manufacturing field devices, process sensors for electrical generating plants and real-time location devices for healthcare) will drive the use of connected things among businesses through 2017, with 1.6 billion units deployed. However, from 2018 onwards, cross-industry devices, such as those targeted at smart buildings (including LED lighting, HVAC and physical security systems) will take the lead as connectivity is driven into higher-volume, lower cost devices. In 2020, cross-industry devices will reach 4.4 billion units, while vertical-specific devices will amount to 3.2 billion units.
Table 1: IoT Units Installed Base by Category (Millions of Units)
Category
2016
2017
2018
2020
Consumer
3,963.0
5,244.3
7,036.3
12,863.0
Business: Cross-Industry
1,102.1
1,501.0
2,132.6
4,381.4
Business: Vertical-Specific
1,316.6
1,635.4
2,027.7
3,171.0
Grand Total
6,381.8
8,380.6
11,196.6
20,415.4
Source: Gartner (January 2017)
Ok, so we’ve established that this isn’t going away anytime soon, so let’s see what the concerns will be with this tsunami of access.  So far, all the risk warning just post charts of the growing attack surfaces people will inherit when they purchase these new “smart” devices; however, we were more interested in actual data showing real IoT attacks thus far.

SURVEY SAYS…

According to a survey performed by Aruba, a Hewlett Packard company, a total of 3,100 global IT and business decision makers were interviewed in November and December 2016. The respondents were from organizations of at least 500 employees, and were from both public and private sectors, but with a focus on the industrial, government, retail, healthcare, education, construction, finance, and IT/technology/telecommunications sectors.
Among the wild adoption of IoT in the many sectors analyzed, i.e.,
Enterprise 72%
Industrial 62%
Healthcare 60%
Retailers 49%
Government 42%

There were several significant security flaws that were found across many IoT deployments. The study found that 84% of organizations have experienced an IoT-related security breach. More than half of respondents declared that external attacks are a key barrier to embracing and adopting an IoT strategy. This confirms that a holistic IoT security strategy, built on strong network access control and policy management, will not only protect enterprises but also simplify the security approach for IT.
To make things worse, Forrester predicts that more than 500,000 internet of things (IoT) devices will suffer a compromise in 2017, dwarfing Heartbleed. Drop the mic — enough said.
With the sheer velocity of how the distributed denial-of-service (DDoS) attacks spread through common household items such as DVR players, makes this sector scary from a security standpoint.
Corey Nachreiner, CTO at WatchGuard Technologies, predicts that IoT devices will become the de facto target for botnet zombies. He continued,
“Many IoT devices coming on the market have proprietary operating systems,  On the other hand, another class of IoT products are devices running embedded Linux. These devices look very familiar to hackers. They already have tools and malware designed to target them, so “pwning” them is as familiar as hacking any Linux computer. On top of that, the manufacturers releasing these devices seem to follow circa 2000 software development and security practices. Many IoT devices expose network services with default passwords that are simple for attackers to abuse,” Nachreiner says.
ACTUAL IoT Breach, A Fish Tank…
According to Darktrace, a security firm’s director for cyber intelligence, a hacker used the fish tank to gain access to the casino’s network, and from there was able to move ‘laterally to other places in the network’ due to other vulnerabilities. The company detailed this and other atypical threats in a report it published today.
It also allowed hackers to swipe 10 gigabytes of data from the North American casino that just installed it, according to a report from the threat intelligence experts at Darktrace.
The data had already been flowing to Finland by the time Darktrace was called in. Once the company's software was monitoring activity, the tank's unusual activity was spotted almost immediately.
The tank's communications with the casino's network appeared normal enough. The data it was pumping through to the outside was highly suspect. It was the only casino system that ever sent data to the remote server in Finland that it was communicating with. It also did so using protocols that are normally used for streaming audio or video.
"This was a clear case of data exfiltration," notes the Darktrace report, adding "but far more subtle than typical attempts at data theft."
As crazy as this hack might seem today, you can bet that things are only going to get crazier. Many of the connected devices for sale today are seriously lacking when it comes to security. They're under constant attack from the moment they're hooked up to the Internet and can fall under hacker control within minutes.

Ok So What Do We Do?

Four IoT security principles for enterprises
Volker Gerstenberger and Tomi Ronkainen of Giesecke & Devrient at the Liveworx 2016 Internet of Things event laid out the 4 IoT security Principles for the Enterprise..
1. Address IoT security explicitly by design – don’t adapt existing security. Ronkainen added that too often, companies think they can adapt their existing security for IoT, and, he says, “from our perspective, it’s falling short.” Designing for IoT security is a specialty unto itself; do not assume existing developers, designers and admins have the know-how.
2. Pay attention to all layers of IoT security to avoid a vulnerable entry point. Whether its healthcare or automotive or oil and gas, Gerstenberger acknowledged that all of them are grappling with the many layers of IoT security: the hardware layer, the software layer, as well as securing network connections, data in transit, and application data.
3. IoT security is only as strong as its weakest link, particularly on mobile devices. Gerstenberger seized upon a home sprinkler app example to show how mobile security can be compromised:
For any type of IoT service, or IoT interaction, we now demand an app for that. “Can I control that with my mobile phone, can I control it on my iPad?” All of that ultimately ends up being on this universal remote control that we are so happy using. But if we also have the digital car key on our mobile phone, if this sprinkler application is malicious or can be attacked, then it quite easily can spur into all the other domains that you are controlling with your mobile phone.
Needless to say, those mobile domains could include access to enterprise data and controls.
4. Complex machines like connected cars are the hardest to secure. G&T is heavily involved in connected car security, an issue that’s been grabbing plenty of headlines. I asked the guys for how we should be thinking about security in those settings, where the prospect of someone hacking into your vehicle remotely is very unpleasant. Ronkainen:
Now we are talking super complex environments. If you know Bruce Schneier who is one of the fathers of cryptology, and an evangelist of security things, he always said that complex systems are the most vulnerable because there is so many things in there, and things can go wrong. The connectivity is one case where we have started [with secure chips], but now we are working on more advanced security solutions including firewalls, intrusion detections, certificate management and key management systems for connected cars.
And, it goes without saying – no default passwords on purchased equipment.
___________________________________________
We would like to thank our sponsors, for without them - our fine content wouldn't be deliverable!


Source(s)

  • https://www.gartner.com/newsroom/id/3598917
  • https://diginomica.com/2016/10/05/a-massive-iot-security-breach-hits-the-web-how-should-enterprises-respond/
  • https://www.forbes.com/sites/leemathews/2017/07/27/criminals-hacked-a-fish-tank-to-steal-data-from-a-casino/#1ba3d9c732b9
  • https://www.csoonline.com/article/3153707/security/top-5-cybersecurity-facts-figures-and-statistics-for-2017.html
  • https://www.darkreading.com/endpoint/iot-security-by-the-numbers/d/d-id/1325583?

So “Once more unto the breach, dear friends, once more;”

____________________________________________________________

About Rick Ricker



An IT professional with over 23 years experience in Information Security, wireless broadband, network and Infrastructure design, development, and support.


For more information, contact Rick at (800) 399-6085 x502

No comments:

Post a Comment

Thanks for your input, your ideas, critiques, suggestions are always welcome...

- Wasabi Roll Staff