Vulnerabilities / Threats
9/19/2016
08:00 AM
Mike Baker
Mike Baker
Commentary
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail vvv
100%
0%

Whats The Risk? 3 Things To Know About Chatbots & Cybersecurity

Interactive message bots are useful and becoming more popular, but they raise serious security issues.

Fueled by the exponential growth in mobile messaging, chatbots — interactive messaging bots that harness recent advances in artificial intelligence and machine learning — are the hottest new technology going right now. Facebook opened up its Messenger platform to bot developers earlier this year; messaging app Telegram is offering developers up to $1 million in prizes to develop bots that are fast, useful, and work in inline mode; and over 20 million people chat with the Xiaoice bot on the Chinese micro-blogging service Weibo. Even the White House has gotten into the act with its Obama Facebook chatbot.

Chatbot technology is still in its infancy, but it’s quickly being embraced by businesses because of its vast potential for sales, marketing, and customer service. Chatbots stand to help organizations build deeper relationships with their customers and improve service quality, while at the same time save money by automating certain administrative tasks.

However, as organizations build and deploy enterprise chatbots, it’s important to step back for a moment and consider the security implications of this brave new technology.

Be Aware of the Chatbot’s Channel Encryption
For maximum security, chatbot communication should be encrypted, and chatbots should be deployed only on encrypted channels. While these sound like obvious safeguards, unfortunately, it’s not that simple. An in-house bot that runs on an organization’s system can be set up on a private, encrypted channel, but if an organization wishes to deploy a chatbot on a public channel such as Facebook Messenger, it’s at the mercy of that platform’s security capabilities.

While Facebook is testing end-to-end encryption for its Messenger platform, the feature is still in beta and isn’t widely available. Until public channels begin offering encryption services, organizations should be wary of the type of chatbots they employ using those platforms. Chatbots used on unencrypted channels shouldn’t accept or transmit sensitive information, and for the protection of the organization, these bots shouldn’t have access to the organization’s systems.

Establish Rules Regarding Chatbot Data Handling and Storage
By their nature, chatbots collect information from users; that’s how they respond to questions, and it’s how they train themselves to get better at their “jobs” over time. Where this information is stored, how long it’s stored, how it’s used, and who has access to it must be addressed, especially in highly regulated industries that handle very sensitive information, such as healthcare and finance. Before implementing a chatbot, organizations must establish rules regarding the data the bot will gather and make these rules clear to the customers who will be using the bot.

Additionally, companies must consider where this data will reside, especially if the bot collects personal or sensitive information. This is another issue that limits the functionality of bots on public platforms until the platforms can ensure secure storage and provide additional tools regarding what gets stored and for how long.

Be on the Lookout for Criminal Chatbots
Finally, organizations must be aware of the bigger picture of chatbot security. As chatbots become better at imitating humans, the technology will be used by hackers in phishing schemes and other social engineering hacks. For example, a chatbot designed to imitate a customer or a vendor could strike up a conversation with an employee through a messaging app. After rapport has been established, the chatbot could entice the employee to click on a malicious link or hand over sensitive information.

This has already happened on the consumer level; recently, a number of men using the Tinder dating app were swindled by a bot that pretended to be a female user. After a few back-and-forth messages, the chatbot convinced the men to click on a link to become “Tinder verified.” The link required that they input their credit card information, at which time they were unwittingly signed up for a recurring online porn subscription.

Until technology can be developed to identify and intercept malicious chatbots, the best defense is to train employees to never click on links sent by customers or vendors, and to prohibit them from transmitting sensitive information through email or messaging services. Organizations should be doing these things already to defend against “traditional” phishing schemes.

Because chatbot technology is so new, specific security protocols are still being developed, particularly regarding chatbots deployed on public platforms such as Facebook, and the rapid pace of chatbot development means that new features — and threats — are continuously emerging. 

Chatbots have the potential to transform how business is conducted online. They can also be quite destructive and end up causing cybersecurity nightmares for organizations that don’t employ them properly, especially at this early stage. It is critical for organizations to not get caught up in the frenzy surrounding this new technology and to take a conservative, deliberate approach to chatbot development and deployment, particularly on public platforms.

Related Content:

Mike Baker is founder and Principal at Mosaic451, a bespoke cybersecurity service provider and consultancy with specific expertise in building, operating and defending some of the most highly-secure networks in North America. Mosaic451 offers a unique blend of deep technology ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
edyang
100%
0%
edyang,
User Rank: Apprentice
9/29/2016 | 12:01:59 PM
Re: Criminal
Good point. I bet if you ask the average person what a chatbot is, they'll stare at you blankly...
MikeBaker
100%
0%
MikeBaker,
User Rank: Author
9/28/2016 | 1:50:03 PM
Re: Criminal
That's a good question-

My impression has been that the average consumer isn't even aware of what chat bots are, or that they're in use. Until the awareness increases, criminal chat bots could be the perfect way for for bad actors to programatically split-test out different approaches/questions/scenarios to what's only been used up until now in old-fashioned social engineering based attempts.
Whoopty
100%
0%
Whoopty,
User Rank: Ninja
9/21/2016 | 7:51:38 AM
Criminal
The criminal chat bots is a really interesting idea. I wonder if people will become less concious of their own security when talking to bots, as they will assume they are from a legitimate source?

They may assume that bots are stupid, but I doubt anyone would expect a bot to screw them over. 
EdnaBaron
100%
0%
EdnaBaron,
User Rank: Apprentice
9/21/2016 | 6:25:29 AM
Re: As tech advances, so do threats...
Chatbot technology is one of the highly discussed part and this article describes each and every important points related to this particular area of technology. Cyber security is more important and it plays important role to keep confidential data. 
edyang
100%
0%
edyang,
User Rank: Apprentice
9/19/2016 | 12:44:55 PM
As tech advances, so do threats...
It's an exciting time. Artificial intelligence, machine learning, chatbots, self-driving cars, augmented reality games. But as technology advances, it's a given that there will be cybersecurity threats. The difference will be the magnitude of the impact. What if malware infected chatbots siphoned financial data, or worse social security numbers, from unsuspecting users? What if IoT health care devices were hacked? It's an exciting but also a dangerous time.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.