{"id":16302,"date":"2019-09-12T10:45:12","date_gmt":"2019-09-12T18:45:12","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/09\/12\/news-10044\/"},"modified":"2019-09-12T10:45:12","modified_gmt":"2019-09-12T18:45:12","slug":"news-10044","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/09\/12\/news-10044\/","title":{"rendered":"It&#8217;s Time for IoT Security&#8217;s Next Big Step"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d72fb90933a7300086dc375\/master\/pass\/Security-IoT-953883020.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 12 Sep 2019 12:00:00 +0000<\/strong><\/p>\n<p class=\"content-header__row content-header__dek\">Connected devices are more secure than ever. That&#39;s still not nearly enough.<\/p>\n<p>The <a href=\"https:\/\/www.wired.com\/2014\/01\/theres-no-good-way-to-patch-the-internet-of-things-and-thats-a-huge-problem\/\">Internet of Things security crisis<\/a> has persisted for decades, producing a seemingly endless stream of under-secured consumer gadgets, corporate phones, printers, networking equipment, medical devices, and critical infrastructure sensors and controllers. By now, every industry has an IoT albatross around its neck. And though new devices are increasingly equipped with basic security protections, those minimum standards are just the beginning.<\/p>\n<p>At the DerbyCon security conference in Louisville, Kentucky, last weekend, researchers stressed the need for connected devices to step up security beyond the basics. That means more visibility and logging features, along with better techniques for manufacturers, companies, and consumers alike to spot malicious activity. Protecting a device better doesn&#x27;t mean much if you can&#x27;t see what&#x27;s happening when something does go wrong.<\/p>\n<p>\u201cIoT devices have a pervasive impact on our lives, yet very little thought has been given to how to respond if those devices are misused,\u201d says Lesley Carhart, principal threat hunter at the industrial-control security firm Dragos. \u201cWho will investigate devices that have been tampered with, and will they be <em>able<\/em> to investigate?\u201d<\/p>\n<p>These questions are not theoretical. IoT devices have been conscripted into <a href=\"https:\/\/www.wired.com\/story\/reaper-iot-botnet-infected-million-networks\/\">massive botnets<\/a>, compromised for <a href=\"https:\/\/www.wired.com\/story\/router-hacking-slingshot-spy-operation-compromised-more-than-100-targets\/\">nation-state reconnaissance<\/a>, hacked to <a href=\"https:\/\/www.wired.com\/story\/cryptojacking-took-over-internet\/\">mine cryptocurrency<\/a>, and manipulated in <a href=\"https:\/\/www.wired.com\/story\/russian-hackers-attack-ukraine\/\">assaults on power grids<\/a>. But frequently it&#x27;s far too challenging to detect these incidents as they happen or even investigate them after.<\/p>\n<p>Manufacturers have increasingly taken the admonitions to heart.<\/p>\n<p>Hardware hackers work to understand devices better and hunt for flaws by buying different IoT devices, physically connecting to them with different sensors and tools, and assessing how those systems fit together. This low-level approach works because, unlike PCs that broadly only run Windows, Linux, or macOS, IoT devices are built on a virtually infinite hodgepodge of proprietary operating systems and implementations. As a result, it&#x27;s difficult to simply develop a single antivirus program or catch-all scanner that can run on large populations of IoT devices. Some researchers have <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/gizmodo.com\/meet-the-symbiote-the-ironclad-adaptable-future-of-an-5986960&quot;}\" href=\"https:\/\/gizmodo.com\/meet-the-symbiote-the-ironclad-adaptable-future-of-an-5986960\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">developed so-called<\/a> operating-system-agnostic sentinels to patrol all different types of embedded devices, no matter what&#x27;s on them, but those tools aren&#x27;t yet widely available.<\/p>\n<p>Deral Heiland, IoT research lead at the security operations firm Rapid7, is applying the hardware-level analysis approach to develop new IoT assessment tools and techniques. Heiland mapped the circuit layouts of two different smart locks to examine &quot;inter-chip&quot; communications on the device motherboards. That means he looked at how data flowed between components like the main device processor, the Wi-Fi processing chip, and the Bluetooth Low Energy chip.<\/p>\n<p>Heiland didn&#x27;t disclose any specific vulnerabilities at DerbyCon, but he found a number of weaknesses in how those smart locks handled communication between chips, as well as with the &quot;bridge&quot; components that connect IoT devices to a larger network like the internet. For example, by capturing inter-chip communications, Heiland could determine sensitive information about the authentication keys used to secure the device, like whether they were short enough to potentially be brute-forced, whether the system always required authentication or applied it inconsistently, and whether keys change or are always the same. Heiland hopes to eventually release inter-chip communication analysis tools to help researchers and manufacturers spot bugs early.<\/p>\n<p>At DerbyCon, Heiland sought input from the security community about the specific analysis capabilities he should develop over the coming year. &quot;This is just phase one,&quot; he says. &quot;The ultimate goal of research like this\u2014if I can look at your inter-chip communication\u2014is to help manufacturers do security right.&quot;<\/p>\n<p>Those manufacturers have increasingly taken the admonitions to heart. After <a href=\"https:\/\/www.wired.com\/2008\/03\/scientists-demo\/\">more than a decade<\/a> of hectoring from the security community, for example, medical device manufacturers have recently started making <a href=\"https:\/\/www.wired.com\/story\/pacemaker-hack-malware-black-hat\">long-overdue improvements<\/a> to implantable devices like pacemakers and insulin <a href=\"https:\/\/www.wired.com\/story\/medtronic-insulin-pump-hack-app\/\">pumps<\/a>.<\/p>\n<p>&quot;With the devices from 10 years ago, it took me under a minute to get into them\u2014there was no authentication, you could simply discover the interfaces, jump on, and start doing stuff,&quot; independent security researcher Adrian Sanabria told WIRED in August ahead of the Defcon security conference in Las Vegas. &quot;Now in new devices there are no default credentials, and they&#x27;re not even sending broadcast traffic. It was a huge leap between each one.&quot;<\/p>\n<p>Those improvements have played out in the broader IoT industry as well, where every small security upgrade significantly cuts down on low-hanging fruit.<\/p>\n<p>&quot;The whole industry is taking a much better attitude toward IoT disclosure.&quot;<\/p>\n<p>James Seabree, Tenable<\/p>\n<p>Take the now patched vulnerabilities in widely popular <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.arlo.com\/en-us\/products\/arlo\/default.aspx&quot;}\" href=\"https:\/\/www.arlo.com\/en-us\/products\/arlo\/default.aspx\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Arlo webcams<\/a> and corresponding base stations, presented at DerbyCon by James Seabree, a senior researcher at the risk-analysis firm Tenable. Seabree found flaws like hardc-oded authentication credentials and network misconfigurations that could let an attacker take over the cameras. But he emphasizes that the disclosure and patch release process went smoothly, and that he was impressed by the security of the cameras overall.<\/p>\n<p>&quot;In terms of actual attack surface of the device, it\u2019s pretty well-handled and minimized as much as possible,&quot; Seabree says. &quot;In our experience here, it\u2019s been very rare that vendors actually push back. The whole industry is taking a much better attitude toward IoT disclosure.&quot;<\/p>\n<p>The challenge now, Seabree says, is the next phase of IoT security evolution to gain more insight about what&#x27;s actually happening on devices and detect compromises. For example, Seabree&#x27;s Tenable colleague Jacob Baines presented at Defcon about exploitation of MikroTik routers over the past few years and the difficulty of assessing the <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/medium.com\/tenable-techblog\/routeros-post-exploitation-784c08044790&quot;}\" href=\"https:\/\/medium.com\/tenable-techblog\/routeros-post-exploitation-784c08044790\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">scope of the exploitation<\/a>.<\/p>\n<p>With billions of insecure, old-generation IoT devices already enmeshed in digital infrastructure, it will be decades before the risks from IoT 1.0 are really contained. And as Rapid7&#x27;s Heiland points out, many manufacturers still don&#x27;t feel pressure to improve their practices, because they make generic components or whole devices for other brand names rather than selling the products themselves. &quot;White labels are always going to be behind the curve, because they don\u2019t have a brand name to protect,&quot; he says.<\/p>\n<p>In general, it seems that the hallmark of IoT security is this type of halting two-steps-forward, one-step-back progression. And the industry finally seems poised at the precipice of a next phase. But, unfortunately, it will likely be just as daunting to move through as the last one was.<\/p>\n<p>&quot;When these devices get broken into, who\u2019s going to be able to tell?&quot; Dragos\u2019 Carhart says. &quot;That scares me.&quot;<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/iot-security-next-step\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d72fb90933a7300086dc375\/master\/pass\/Security-IoT-953883020.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 12 Sep 2019 12:00:00 +0000<\/strong><\/p>\n<p>Connected devices are more secure than ever. That&#8217;s still not nearly enough.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-16302","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16302"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16302\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16302"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}