Vulnerabilities / Threats

4/19/2018
11:30 AM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

First Public Demo of Data Breach via IoT Hack Comes to RSAC

At RSA Conference, senior researchers will show how relatively unskilled attackers can steal personally identifiable information without coming into contact with endpoint security tools.

RSA CONFERENCE 2018 – San Francisco – Many security professionals acknowledge that Internet of Things (IoT) devices have the potential to be an avenue into their enterprise networks — but for most, breach-by-refrigerator or DDoS-by-coffeepot is a theoretical flight of fancy and not a genuine threat. That might change Thursday, when researchers will present here the first public demonstration of an IoT hack resulting in a breach of personally identifiable information.  

The vice president of research, M. Carlton, and chief technology officer, Stephen Ridley, of IoT security company Senrio will present "Lateral Attacks between Connected Devices in Action" on the RSA Sandbox's IoT stage Thursday. 

"'Chained attacks on IoT security' — it's only been uttered as this platitude," says Ridley, "but have you actually seen a camera get popped" and used to compromise other systems?

"We all know IoT is vulnerable," says Carlton. "We don't all know what the impact of one vulnerable IoT device in an enterprise can be. ... It is a profound impact."

This particular attack can also be a danger to organizations with good security measures in place. In the demo, the IoT device need not be directly connected to the target network device. It doesn't require sophisticated hacking skills — Metasploit tools or the Linux command line will suffice. 

And the attacker never interacts with the endpoint, where most enterprises invest most of their security protections. As the Senrio team puts it, by staying away from the endpoint, the attacker doesn't need to come up against Carbon Black or CrowdStrike.

"This could be done on a company that has spent millions on security," says Ridley. "If I was a bad guy, I'd be doing nothing but IoT. Straight up." 

The attack begins with an exploit of a surveillance camera via the Devil's Ivy vulnerability — a remote code execution vulnerability in an open source gSOAP library that was discovered by the Senrio team last summer. A patch for the vulnerability already exists but was not applied to this camera model — and that's not unusual. 

"In the IoT world, most patches do not get applied," says Ridley. That's due in part to the complexity of the IoT supply chain and the fact that most organizations do not know what IoT devices are connected to their network in the first place.

Once the camera is compromised, the attackers then have a bird's-eye view of an employee at his workstation and the items on his desk — which include a router and a network access server (NAS). The attackers can then watch the user's keystrokes when logging in to the NAS.

The attackers then send a request to the router to obtain its exact model number (so it can retrieve the proper exploit for it), which the router obligingly sends. 

The exploited router sends the attackers encrypted text containing the end user's concatenated username and password. Then, using Rainbow Tables, the attackers can reverse the hash function and determine the administrator credentials for the router. (In this case, username: admin and password: admin.) 

With those credentials in hand, the attackers have full access to the router, which allows them to, among other things, change network settings — which thereby lets them open a secure SSH communication to the NAS and enjoy privileged access to all of the files it contains. 

Owning the NAS, the attackers can thus access all manner of sensitive data, from financial records to personally identifiable information. They copy it and exfiltrate it back through the router, through the video camera, and back home to the attackers.  

How can enterprises defend against attacks like these? Carlton takes a deep breath. 

"First, find what [IoT] devices are on your network," she says. "Then we'll talk."    

 Related content:

 

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop ITX and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here. Register with Promo Code DR200 and save $200.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6507
PUBLISHED: 2019-01-22
An issue was discovered in creditease-sec insight through 2018-09-11. login_user_delete in srcpm/app/admin/views.py allows CSRF.
CVE-2019-6508
PUBLISHED: 2019-01-22
An issue was discovered in creditease-sec insight through 2018-09-11. role_perm_delete in srcpm/app/admin/views.py allows CSRF.
CVE-2019-6509
PUBLISHED: 2019-01-22
An issue was discovered in creditease-sec insight through 2018-09-11. depart_delete in srcpm/app/admin/views.py allows CSRF.
CVE-2019-6510
PUBLISHED: 2019-01-22
An issue was discovered in creditease-sec insight through 2018-09-11. user_delete in srcpm/app/admin/views.py allows CSRF.
CVE-2017-6922
PUBLISHED: 2019-01-22
In Drupal core 8.x prior to 8.3.4 and Drupal core 7.x prior to 7.56; Private files that have been uploaded by an anonymous user but not permanently attached to content on the site should only be visible to the anonymous user that uploaded them, rather than all anonymous users. Drupal core did not pr...