{"id":10736,"date":"2017-12-06T10:10:20","date_gmt":"2017-12-06T18:10:20","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/12\/06\/news-4508\/"},"modified":"2017-12-06T10:10:20","modified_gmt":"2017-12-06T18:10:20","slug":"news-4508","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/12\/06\/news-4508\/","title":{"rendered":"Internet of Things (IoT) security: what is and what should never be"},"content":{"rendered":"<p><strong>Credit to Author: Wendy Zamora| Date: Wed, 06 Dec 2017 17:00:00 +0000<\/strong><\/p>\n<p>The Internet has penetrated seemingly all technological advances today, resulting in Internet for ALL THE THINGS. What was once confined to a desktop and a phone jack is now networked and connected in multiple devices, from home heating and cooling systems like the Nest to AI companions such as Alexa. The devices can pass information through the web to anywhere in the world\u2014server farmers, company databases, your own phone. (Exception: that one dead zone in the corner of my living room. If the robots revolt, I\u2019m huddling there.)<\/p>\n<p>This collection of inter-networked devices is what marketing folks refer to as the Internet of Things (IoT). You can\u2019t pass a REI vest-wearing Silicon Valley executive these days without hearing about it. Why? Because the more we send our devices online to do our bidding, the more businesses can monetize them. Why buy a regular fridge when you can spend more on one that tells you when you\u2019re running out of milk?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-20795\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Untitled-design-6-600x600.jpg\" alt=\"Internet of Things\" width=\"600\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Untitled-design-6-600x600.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Untitled-design-6-150x150.jpg 150w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/Untitled-design-6-300x300.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Unfortunately (and I\u2019m sure you saw this coming), the more devices we connect to the Internet, the more we introduce the potential for cybercrime. Analyst firm Gartner says that by 2020, there will be more than <a href=\"https:\/\/www.gartner.com\/newsroom\/id\/2636073\" target=\"_blank\" rel=\"noopener\">26 billion connected devices<\/a>\u2014<em>excluding<\/em> PCs, tablets, and smartphones. Barring an unforeseen <em>Day After Tomorrow<\/em>\u2013style global catastrophe, this technology is coming. So let\u2019s talk about the inherent risks, shall we?<\/p>\n<h3><strong>What\u2019s happening with IoT cybercrime today?<\/strong><\/h3>\n<p><strong>\u00a0<\/strong>Both individuals and companies using IoT are vulnerable to breach. But how vulnerable? Can criminals hack your toaster and get access to your entire network? Can they penetrate virtual meetings and procure a company\u2019s proprietary data? Can they spy on your kids, take control of your Jeep, or brick critical medical devices?<\/p>\n<p>So far, the reality has not been far from the hype. Two years ago, <a href=\"https:\/\/www.nbcnews.com\/tech\/internet\/smart-refrigerators-hacked-send-out-spam-report-n11946\" target=\"_blank\" rel=\"noopener\">a smart refrigerator was hacked<\/a> and began sending pornographic spam while making ice cubes. Baby monitors have been used to <a href=\"http:\/\/sfglobe.com\/2016\/01\/06\/stranger-hacks-familys-baby-monitor-and-talks-to-child-at-night\/\" target=\"_blank\" rel=\"noopener\">eavesdrop on and even speak to<\/a> sleeping (or likely not sleeping) children. In October 2016, thousands of security cameras were hacked to create the largest-ever Distributed Denial of Service (DDoS) attack against Dyn, a provider of critical Domain Name System (DNS) services to companies like Twitter, Netflix, and CNN. And in March 2017, Wikileaks <a href=\"https:\/\/www.bostonglobe.com\/business\/2017\/03\/08\/wikileaks-hits-cia-secrecy-software-spying\/EQdLVwseMu70HEYlZcowOO\/story.html\" target=\"_blank\" rel=\"noopener\">disclosed that the CIA has tools for hacking IoT devices<\/a>, such as Samsung SmartTVs, to remotely record conversations in hotel or conference rooms. How long before those are commandeered for nefarious purposes?<\/p>\n<p>Privacy is also a concern with IoT devices. How much do you want KitchenAid to know about your grocery-shopping habits? What if KitchenAid partners with Amazon and starts advertising to you about which blueberries are on sale this week? What if it automatically orders them for you?<\/p>\n<p>At present, IoT attacks have been relatively scarce in frequency, likely owing to the fact that there isn\u2019t yet huge market penetration for these devices. If just as many homes had <a href=\"https:\/\/www.microsoft.com\/en-us\/windows\/cortana\" target=\"_blank\" rel=\"noopener\">Cortanas<\/a> as have PCs, we\u2019d be seeing plenty more action. With the rapid rise of IoT device popularity, it\u2019s only a matter of time before cybercriminals focus their energy on taking advantage of the myriad of security and privacy loopholes.<\/p>\n<h3><strong>Security and privacy issues on the horizon<\/strong><\/h3>\n<p>According to <a href=\"https:\/\/www.forrester.com\/report\/Predictions+2018+IoT+Moves+From+Experimentation+To+Business+Scale\/-\/E-RES139752\" target=\"_blank\" rel=\"noopener\">Forrester\u2019s 2018 predictions<\/a>, IoT security gaps will only grow wider. Researchers believe IoT will likely integrate with the public cloud, introducing even more potential for attack through the accessing of, processing, stealing, and leaking of personal, networked data. In addition, more money-making IoT attacks are being explored, such as cryptocurrency mining or ransomware attacks on point-of-sale machines, medical equipment, or vehicles. Imagine being held up for ransom when trying to drive home from work. \u201cIf you want us to start your car, you\u2019ll have to pay us $300.\u201d<\/p>\n<p>It\u2019ll be like a real-life Monopoly game.<\/p>\n<p>Privacy and data-sharing may become even more difficult to manage. For example, how do you best protect children\u2019s data, which is highly regulated and protected according to the Children\u2019s Online Privacy Protection Rule (<a href=\"https:\/\/www.ftc.gov\/enforcement\/rules\/rulemaking-regulatory-reform-proceedings\/childrens-online-privacy-protection-rule\" target=\"_blank\" rel=\"noopener\">COPPA<\/a>), if you\u2019re a maker of <a href=\"https:\/\/www.engadget.com\/2016\/12\/06\/internet-connected-toys-accused-of-spying-on-kids\/\" target=\"_blank\" rel=\"noopener\">smart toys<\/a>? There are rules about which personally identifiable information can and cannot be captured and transmitted for a reason\u2014because that information can ultimately be intercepted.<\/p>\n<p>Privacy concerns may also broaden to include how to protect personal data from intelligence gathering by domestic and foreign state actors. According to the Director of National Intelligence, Daniel Coats, in his May 2017 testimony at a Senate Select Committee on Intelligence hearing: \u201cIn the future, state and non-state actors will likely use IoT devices to support intelligence operations or domestic security or to access or attack targeted computer networks.\u201d<\/p>\n<p>In a nutshell, this could all go far south\u2014fast.<\/p>\n<h3><strong>So why are IoT defenses so weak? <\/strong><\/h3>\n<p>Seeing as IoT technology is a runaway train, never going back, it\u2019s important to take a look at what makes these devices so vulnerable. From a technical, infrastructure standpoint:<\/p>\n<ul>\n<li>There\u2019s poor or non-existent security built into the device itself. Unlike mobile phones, tablets, and desktop computers, little-to-no protections have been created for these operating systems. Why? Building security into a device can be costly, slow down development, and sometimes stand in the way of a device functioning at its ideal speed and capacity.<\/li>\n<li>The device is directly exposed to the web because of poor network segmentation. It can act as a pivot to the internal network, opening up a backdoor to let criminals in.<\/li>\n<li>There\u2019s unneeded functionality left in based on generic, often Linux-derivative hardware and software development processes. Translation: Sometimes developers leave behind code or features developed in beta that are no longer relevant. Tsk, tsk. Even my kid picks up his mess when he\u2019s done playing. (No he doesn\u2019t. But HE SHOULD.)<\/li>\n<li>Default credentials are often hard coded. That means you can plug in your device and go, without ever creating a unique username and password. Guess how often cyber scumbags type \u201c1-2-3-4-5\u201d and get the password right? (Even <a href=\"https:\/\/www.youtube.com\/watch?v=a6iW-8xPw3k\" data-rel=\"lightbox-video-0\" target=\"_blank\" rel=\"noopener\">Dark Helmet knew<\/a> not to put this kind of password on his luggage, nevermind his digital assistant.)<\/li>\n<\/ul>\n<p>From a philosophical point of view, security has simply not been made an imperative in the development of these devices. The swift march of progress moves us along, and developers are now caught up in the tide. In order to reverse course, they\u2019ll need to walk against the current and begin implementing security features\u2014not just quickly but thoroughly\u2014in order to fight off the incoming wave of attacks.<\/p>\n<h3><strong>What are some solutions?<\/strong><\/h3>\n<p><strong>\u00a0<\/strong>Everyone agrees this tech is happening. Many feel that\u2019s a good thing. But no one seems to know enough or want enough to slow down and implement proper security measures. Seems like we should be getting somewhere with IoT security. Somehow we\u2019re neither here nor there. (Okay, enough quoting Soul Asylum.)<\/p>\n<p>Here\u2019s what we think needs to be done to tighten up IoT security.<\/p>\n<h4><strong>Government intervention<\/strong><\/h4>\n<p>In order for developers to take security more seriously, action from the government might be required. Government officials can:<\/p>\n<ul>\n<li>Work with the cybersecurity and intelligence communities to gather a series of protocols that would make IoT devices safer for consumers and businesses.<\/li>\n<li>Develop a committee to review intelligence gathered and select and prioritize protocols in order to craft regulations.<\/li>\n<li>Get it passed into law. (Easy peasy lemon squeezy)<\/li>\n<\/ul>\n<h4><strong>Developer action<\/strong><\/h4>\n<p>Developers need to bake security into the product, rather than tacking it on as an afterthought. They should:<\/p>\n<ul>\n<li>Have a red team audit the devices prior to commercial release.<\/li>\n<li>Force a credential change at the point of setup. (i.e., Devices will not work unless the default credentials are modified.)<\/li>\n<li>Require https if there\u2019s web access.<\/li>\n<li>Remove unneeded functionality.<\/li>\n<\/ul>\n<p>Thankfully, steps are already being taken, albeit slowly, in the right direction. In August 2017, <a href=\"http:\/\/www.slate.com\/blogs\/future_tense\/2017\/08\/03\/the_senate_is_considering_an_internet_of_things_security_bill.html\" target=\"_blank\" rel=\"noopener\">Congress introduced the Internet of Things Cybersecurity Improvement Act<\/a>, which seeks to require that any devices sold to the US government be patchable, not have any known security vulnerabilities, and allow users to change their default passwords.\u00a0Note: <em>sold to the US government<\/em>. They\u2019re not quite as concerned about the privacy and security of us civies.<\/p>\n<p>And perhaps in response to blowback from social and traditional media, <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2017\/10\/please-dont-buy-this-smart-locks\/\" target=\"_blank\" rel=\"noopener\">including one of our one posts on smart locks<\/a>, Amazon is <a href=\"https:\/\/techcrunch.com\/2017\/11\/29\/amazon-is-previewing-an-iot-security-service\/\" target=\"_blank\" rel=\"noopener\">now previewing<\/a> an IoT security service.<\/p>\n<p>So will cybersecurity makers pick up the slack? Vendors such as Verizon, DigiCert, and Karamba Security have started working on solutions purpose-built for securing IoT devices and networks. But there\u2019s a long way to go before standards are established. In all likelihood, a watershed breach incident (or several), will lead to more immediate action.<\/p>\n<h3><strong>How to protect your IoT devices<\/strong><\/h3>\n<p><strong>\u00a0<\/strong>What can regular consumers and businesses do to protect themselves in the meantime? Here\u2019s a start:<\/p>\n<ul>\n<li>Evaluate if the devices you are bringing into your network really need to be smart. (Do you need a web-enabled toaster?) It\u2019s better to treat IoT tech as hostile by default instead of inherently trusting it with all your personal info\u2014or allowing it access onto your network. Speaking of\u2026<\/li>\n<li>Segment your network. If you do want IoT devices in your home or business, separate them from networks that contain sensitive information.<\/li>\n<li>Change the default credentials. For the love of God, please come up with a difficult password to crack. And then store it in a <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/05\/dont-need-27-different-passwords\/\" target=\"_blank\" rel=\"noopener\">password manager<\/a> and forget about it.<\/li>\n<\/ul>\n<p>The reason why IoT devices haven\u2019t already short-circuited the world is because a lot of devices are built on different platforms, different operating systems, and use different programming languages (most of them proprietary). So developing malware attacks for every one of those devices is unrealistic. If businesses want to make IoT a profitable model, security WILL increase out of necessity. It\u2019s just a matter of when. Until then\u2026gird your loins.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/12\/internet-things-iot-security-never\/\">Internet of Things (IoT) security: what is and what should never be<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/12\/internet-things-iot-security-never\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Wendy Zamora| Date: Wed, 06 Dec 2017 17:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/2017\/12\/internet-things-iot-security-never\/' title='Internet of Things (IoT) security: what is and what should never be'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/11\/shutterstock_215120503.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Internet of Things technology may soon multiply in the billions. But security for these devices is practically non-existent. What needs to be done to secure IoT users now and in the future?<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/hacking\/\" rel=\"category tag\">Hacking<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/how-tos\/\" rel=\"category tag\">How-tos<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/internet-of-things\/\" rel=\"tag\">Internet of Things<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iot\/\" rel=\"tag\">IoT<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iot-security\/\" rel=\"tag\">IoT security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/password-manager\/\" rel=\"tag\">password manager<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/2017\/12\/internet-things-iot-security-never\/' title='Internet of Things (IoT) security: what is and what should never be'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/12\/internet-things-iot-security-never\/\">Internet of Things (IoT) security: what is and what should never be<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,3919,11171,6269,10495,16861,11347],"class_list":["post-10736","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-hacking","tag-how-tos","tag-internet-of-things","tag-iot","tag-iot-security","tag-password-manager"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10736"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10736\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10736"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}