{"id":13987,"date":"2018-12-04T07:00:19","date_gmt":"2018-12-04T15:00:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/12\/04\/news-7754\/"},"modified":"2018-12-04T07:00:19","modified_gmt":"2018-12-04T15:00:19","slug":"news-7754","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/12\/04\/news-7754\/","title":{"rendered":"Parlez-vous Machine?"},"content":{"rendered":"<p><strong>Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Tue, 04 Dec 2018 13:05:35 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"214\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-214x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-214x300.jpg 214w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-768x1074.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-732x1024.jpg 732w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-640x895.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-900x1259.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-440x615.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-380x532.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image.jpg 1284w\" sizes=\"auto, (max-width: 214px) 100vw, 214px\" \/><\/p>\n<p>Have you ever heard of the MQTT or CoAP protocols? No? Well the device on your wrist, and so many devices around you, could be using them right now. MQTT and CoAP are machine-to-machine or M2M protocols. With the rise of the internet of things (IoT) and operational technology (OT), there\u2019s increased security focused on M2M protocols.<\/p>\n<p>This is rough terrain for threat research because it takes some investment and time to investigate IoT, OT and M2M. But Trend Micro does what it takes when it comes to research, and our <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/mqtt-and-coap-security-and-privacy-issues-in-iot-and-iiot-communication-protocols\">new report<\/a> concludes that these M2M protocols are fragile and ripe for targeted attacks.<\/p>\n<p>Not only are the protocols different, but so are the architectures that support them. MQTT has a broker that receives messages between agents, making it an interesting target for the bad guys. The report summarizes the exploit opportunities against a non-concurrent communication point that serves as the broker and includes specifics of the protocol and denial-of-service implications. CoAP is a client-server protocol that is not yet standardized. Not limited to consumer and general machinery, the report also addresses medical devices that use these, such as infusion pumps.<\/p>\n<p>It\u2019s likely that your current security products don\u2019t support the analysis of MQTT and CoAP. Since simply worrying doesn\u2019t help, the report provides guidance on what weaknesses are present and can therefore be monitored.<\/p>\n<p>Most security attacks that occur today just ride on top of protocols rather than exploiting the protocols themselves. The bad news about MQTT and CoAP: Protocol weaknesses are the highest severity of attack because the hosts themselves don\u2019t have to be compromised to attack a protocol vulnerability. Protocol weaknesses have mostly been an issue with cryptography, since the most commonly used protocols, such as the TCP\/IP family, are well established and less vulnerable. And that, of course, is a core issue in OT security. These aren\u2019t widely used or understood protocols, most aren&#8217;t TCP\/IP based, and certainly only a few have had security researchers beat at them with hammer and tongs.<\/p>\n<p>So, even if you aren\u2019t responsible for SCADA and OT, M2M protocols are in consumer IoT devices and can be used as a path for lateral attacks into a corporate network.<\/p>\n<p>To paraphrase Kent Brockman, \u201cI for one welcome our new machine overlords.\u201d<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/parlez-vous-machine\/\">Parlez-vous Machine?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/parlez-vous-machine\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Tue, 04 Dec 2018 13:05:35 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"214\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-214x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-214x300.jpg 214w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-768x1074.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-732x1024.jpg 732w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-640x895.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-900x1259.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-440x615.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image-380x532.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/11\/blog-image.jpg 1284w\" sizes=\"auto, (max-width: 214px) 100vw, 214px\" \/><\/p>\n<p>Have you ever heard of the MQTT or CoAP protocols? No? Well the device on your wrist, and so many devices around you, could be using them right now. MQTT and CoAP are machine-to-machine or M2M protocols. With the rise of the internet of things (IoT) and operational technology (OT), there\u2019s increased security focused on&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/parlez-vous-machine\/\">Parlez-vous Machine?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,20347,6269,10495,20348,714],"class_list":["post-13987","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-coap","tag-internet-of-things","tag-iot","tag-mqtt","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13987","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13987"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13987\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13987"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13987"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}