Attacking Through the Internet of Things (IoT)

The Internet of Things or IoT is the attachment of physical objects, devices, vehicles, and buldings to the Internet either though a hard-wired connection or through Wi-Fi.  A single item on the IoT is known as a “thing”.   Eventually IoT is projected to consist of billions of things.   In this chapter, we will examine some of those things as an attack path or vector for hacking.

Video Cameras

Most computers these days are equipped with a webcam which means video and audio.  Add a little malware and your own camera can spy on you at the behest of someone half a world away.  The smart hacker can even do it without the red light coming on.  You can even buy a Blackshades hacking kit for $40 (estimated sales between 2010 and 2014 of $350,000)  Why oh why don’t the manufacturer’s put a physical OFF switch on these things?

Own a home security system equipped with a webcam?  How about a video baby monitor that is Internet enabled.  Go to the site shodan.io.  You will find at least 6,940 unprotected webcams.  That means without a password or still set to the factory setting for a password.

Solutions

1) Unplug your video camera when you are not using it or cover the lens with a yellow sticky.

2) Contact your manufacturer of your webcam and learn how to reset the login/ password.

Cell phone Fingerprint Reader

On most of the newer phones a fingerprint reader has been enabled.  It makes logging in much faster and offers some protections.    However, if your fingerprint is on file in any government database, it is possible to 3D print your fingerprint and use the rubber version to fool your phone.  Another downside of using your fingerprint for ID is that when a hacker takes your credit card number, you change it.  When a hacker takes the digital version of your fingerprint, you are done using it for ID.

Solution

1) Use the fingerprint reader AND a login for access.

Medical Sensors

Many wonderful devices will be forthcoming to aid in tracking your medical condition and reporting that live to you, a monitoring facility and/or your doctor.  This data will inevitably be stored somewhere and susceptible to hacking.  Do you want your future hiring company to know you have an irregular heart beat?

Wearables

A wearable could have a medical sensor or it could be an aid to help you with your health goals or running goals.   Smart watches, smart glasses, even high tech headphones would qualify.  Remember if they can be connected to the Internet, they can be hacked.  Eight of the top 10 wearables in 2015 did not even have passwords.  Even your children could hack that.

Appliances

Won’t it be wonderful when your refrigerator can send a list of what you are out of to your store, ready for pickup?  There has already been a case where an Internet connected TV was used to gain access to the home network and thus all the home computers and hard drives.

Automobiles

Automobiles are discovering the value of being connected to the Internet.  As they use a single network throughout the car and cyber security is not the first concern, cars are vulnerable to hacking.   Hackers, in one example, were able to take over the air conditioning, the radio, windshield wipers, digital display, and transmission of a car.  They also claim the ability to kill the engine, cut the brakes, take over steering at low speeds, and track the vehicle.  This was a controlled test using a Jeep(R) but other brands have vulnerabilities as well.  Any number of these items could distract you into a wreck or outright kill you.

Jeep is a registered trademark of Chrysler and also Fiat, their owner.

Summary

Recently a casino was hacked by first hacking it’s Internet-connected aquarium.  Vending machines at a university were hacked and used to mount a denial of service against that university’s web based student services.  What to do?

This is difficult to answer as the “things” connected to the IoT can and will vary so widely.  So this will be a general answer that may not fit every IoT thing.

Think about the data collected or what the “thing” is connected to.  Think about the “thing’s” security and what the risks are if it is breached.  Stay informed by watching news for issues around the “thing” you are using.  If not already, your “thing” will soon be given a security review and a writeup/report.  Think about the potential downside of a breach.  Remember the bad guys have automated tools so the cost of going after your data is very little to them.  Make sure the “thing” you are using has the ability to update it’s software as vulnerabilities are found.

If you are a public figure, a government or military official, or a celebrity your risk is higher than the norm for an IoT breach and you may want to have a cyber security expert consult with you on your individual situation.

 

Threat Vectors – Part I – Internal

This is the first in a two part series to look at the various threat vectors.  A threat vector is a way that a hacker can get to your computer and it’s data.  This first part of the series will examine INTERNAL ways that the hacker can get in and the 2nd part will examine the EXTERNAL ways they can get into your computer.

To begin, this is an outline of the internal threats.  Each item will be explained in detail below the outline:

Insider Threat

  • Sale of credentials
  • Planted malware
  • Theft of Data, IP etc.
  • Scams

User Error

  • Click on Bad Link
  • Phishing
  • Downloading infected apps
  • Installing plug-ins/modules that have malware
  • Accidental transmission of data/msg to the wrong target

Bad Device

  • BYOD
  • USB

Physical Theft/Loss

 

Insider Threat

This is someone who works for you and has access to at least one computer and the company network.  This is not accidental.  This is malicious.

Sale of Credentials – The going rate on the market for stolen credentials varies but is mostly less than $200.  Since this is from an insider you will need at a minimum two factor authentication but keep in mind that they could temporarily change the phone to that of the person they sell the credentials to.  The insider may also choose to use the their login for their own gain.

This can be countered via a policy about the use of employee computers and the penalty if found in areas not related directly to their job.  Two factor authentication will help with stolen credentials and access control will limit where in the network the insider or their credentials will take them.

Planted Malware – This is where the insider deliberately plants malware on their computer which may propagate throughout the company.  Remember this person can temporarily disable their virus protection on their computer while they plant the malware.  This is difficult to defend against.  The best defense is to put a camera (working or not) filming each computer or software that snaps a copy of the screen at intervals.  Both these defenses will help catch the perpetrator but will not prevent their actions.

Theft of Data, IP Etc. – This is where the insider downloads copies of company information and exfiltrates (removes) it from the company via email, USB, or upload to a website.  Software that monitors downloads and alarms when over a daily limit will be helpful here.

Scams – This is where the insider uses their inside knowledge of the company to pull a scam on the company via computer, in person, or via the phone.  Training is a good defense against scams.

 

User Error

Click on Bad Link – The user clicks on a website or a link in an email that downloads malware or attacks their computer through a web page.  This can be prevented by employee training and by white listing sites that are allowed.

Phishing – A compelling email is sent to the user to trick them to click on a link which often asks for their credentials under one guise or another.  Again user training will help with them as well as white listing sites that are allowed.

Downloading Infected Apps – The user downloads and installs an app on their computer which contains malware.  The best prevention are computer policies that prevent the user from installing on their computer.

Installing Plug-ins/Modules that Have Malware – This is the case where the downloaded software is ok but a module to be downloaded to ‘enhance’ it is not.  Again the best prevention are computer policies that prevent the user from downloading and installing anything on their computer.

Accidental Transmission of Data/Msg to the Wrong Target – Even sent an email to the wrong person.  What if it contains important company data which then gets into the wrong hands.  The solution is to limit the amount of data available to a given employee and to have information graded as to level of security.  Don’t allow certain levels to be emailed or emailed out of the company.

 

Bad Device

BYOD – As a society we are addicted to our phones and tablets.  We bring our device to work and plug it into the wireless network.  The night before we installed a new app which has malware and when it sees a network begins to infect the company.  A variant of this can infect a computer that the device is plugged into just for power to recharge.  The best defense against this is a policy of no BYOD, company phones on each desk and a set of lockers outside the security entrance where an employee can lock away their device for the day.  Expect resistance and withdrawal symptoms.  Some will not want to work at your company if you do this but you have to wonder how much of the day would have been lost to use of a personal device during the company workday.

USB – A computer consultant told me that before he met with the cyber security defending team he would scatter USB devices that looked high-tech in the parking lot.  Each had malware that rang a bell on his website.  He generally got a 20% response before he even got to his meeting with the security people in the company.  The solution is to disable USB ports and to provide company training.  A variation of this ploy is to scatter brightly colored USB devices at your children’s school or the sidewalk in front or even in front of your home.

 

Physical Theft/Loss

A device is taken off premises and gets stolen.  The best prevention is to have the hard drive encrypt the data so the only loss is the device.

 

In part TWO, we will examine the various threat vectors from outside your computer.