Vulnerabilities / Threats

4/19/2018
11:30 AM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

First Public Demo of Data Breach via IoT Hack Comes to RSAC

At RSA Conference, senior researchers will show how relatively unskilled attackers can steal personally identifiable information without coming into contact with endpoint security tools.

RSA CONFERENCE 2018 – San Francisco – Many security professionals acknowledge that Internet of Things (IoT) devices have the potential to be an avenue into their enterprise networks — but for most, breach-by-refrigerator or DDoS-by-coffeepot is a theoretical flight of fancy and not a genuine threat. That might change Thursday, when researchers will present here the first public demonstration of an IoT hack resulting in a breach of personally identifiable information.  

The vice president of research, M. Carlton, and chief technology officer, Stephen Ridley, of IoT security company Senrio will present "Lateral Attacks between Connected Devices in Action" on the RSA Sandbox's IoT stage Thursday. 

"'Chained attacks on IoT security' — it's only been uttered as this platitude," says Ridley, "but have you actually seen a camera get popped" and used to compromise other systems?

"We all know IoT is vulnerable," says Carlton. "We don't all know what the impact of one vulnerable IoT device in an enterprise can be. ... It is a profound impact."

This particular attack can also be a danger to organizations with good security measures in place. In the demo, the IoT device need not be directly connected to the target network device. It doesn't require sophisticated hacking skills — Metasploit tools or the Linux command line will suffice. 

And the attacker never interacts with the endpoint, where most enterprises invest most of their security protections. As the Senrio team puts it, by staying away from the endpoint, the attacker doesn't need to come up against Carbon Black or CrowdStrike.

"This could be done on a company that has spent millions on security," says Ridley. "If I was a bad guy, I'd be doing nothing but IoT. Straight up." 

The attack begins with an exploit of a surveillance camera via the Devil's Ivy vulnerability — a remote code execution vulnerability in an open source gSOAP library that was discovered by the Senrio team last summer. A patch for the vulnerability already exists but was not applied to this camera model — and that's not unusual. 

"In the IoT world, most patches do not get applied," says Ridley. That's due in part to the complexity of the IoT supply chain and the fact that most organizations do not know what IoT devices are connected to their network in the first place.

Once the camera is compromised, the attackers then have a bird's-eye view of an employee at his workstation and the items on his desk — which include a router and a network access server (NAS). The attackers can then watch the user's keystrokes when logging in to the NAS.

The attackers then send a request to the router to obtain its exact model number (so it can retrieve the proper exploit for it), which the router obligingly sends. 

The exploited router sends the attackers encrypted text containing the end user's concatenated username and password. Then, using Rainbow Tables, the attackers can reverse the hash function and determine the administrator credentials for the router. (In this case, username: admin and password: admin.) 

With those credentials in hand, the attackers have full access to the router, which allows them to, among other things, change network settings — which thereby lets them open a secure SSH communication to the NAS and enjoy privileged access to all of the files it contains. 

Owning the NAS, the attackers can thus access all manner of sensitive data, from financial records to personally identifiable information. They copy it and exfiltrate it back through the router, through the video camera, and back home to the attackers.  

How can enterprises defend against attacks like these? Carlton takes a deep breath. 

"First, find what [IoT] devices are on your network," she says. "Then we'll talk."    

 Related content:

 

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop ITX and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here. Register with Promo Code DR200 and save $200.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.