Endpoint

4/20/2017
02:00 PM
Ofer Amitai
Ofer Amitai
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
100%
0%

Kill Chain & the Internet of Things

IoT "things" such as security cameras, smart thermostats and wearables are particularly easy targets for kill chain intruders, but a layered approach to security can help thwart an attack.

The concept of a kill chain attack has been around for several years. The term originated from the military, but computer scientists at Lockheed-Martin Corporation were the first to use this term in the field of cybersecurity, describing a kill chain framework to defend computer networks in 2011. Its relevance has taken on new meaning in our current era of IoT devices and botnet attacks. IDC predicts that by 2020, 30 billion connected “things” will be a part of the digital infrastructure.

The  “kill chain” lays out the stages of a cyber-attack, starting from early reconnaissance to completion of the attack with the goal of data theft and enabling more attacks. These stages are:

1. Reconnaissance – The intruder selects its target device, researches it, and searches for vulnerabilities

2. Weaponization - Intruder uses a remote access malware weapon, such as a virus or worm, addressing a vulnerability  

3. Delivery - Intruder transmits weapon to the target device, whether through e-mail attachments, websites, USB drives, etc.

4. Exploitation - Malware weapons program code to triggers the attack. This then takes action on target network to exploit vulnerability.

5. Installation - Malware weapon installs access points for the intruder to use.

6. Command and Control – Malware then enables intruder to have "hands on the keyboard" persistent access to the target network, also enabling future attacks.

IoT devices, particularly items like security cameras, smart thermostats, wearables, and even coffee makers, are easy targets for kill chain intruders. They often have little or no security system, making step #2 of the kill chain rather easy.  For example, last year 80 Sony IP security camera models were found to have back doors, giving hackers easy access.

Don't Break the Kill Chain! Prevent it 
The best way to prevent a kill chain from infiltrating enterprise IoT security is to invest in a layered approach. There are four steps to this approach:

1. Assessment:  Start with a  network discovery process of all the existing IoT devices, including managed and partially managed devices. Understand what each type of device is, what operating system it is running on and which application and processes are installed on it.

2.  Segmentation:  IoT devices should not be in the same network segment as other devices, or within reach of the organization’s mission critical systems and data. Deploy firewalls between these segments to prevent “things”  from reaching the “crown jewels” of your network.

3. Detection:  Regularly analyze your network behavior to detect every IoT device which joins the network, and carefully examine if it behaves similarly to other typical devices. A compromised device or a fake device might look the same but behave differently.

4. Response:  Because manual alerts can take hours or even days to process, the best practice should involve some type of backup plan that will block or limit the access of a specific device within seconds.

This layered approach is designed to both prevent the likelihood of a kill chain attack, and also to break a live attack if one does occur. Once a vulnerability in the IoT device is detected and an attack is underway, breaking the final steps of the kill chain is most crucial, as it is often where the biggest gap lies in an organization’s advanced threat protection strategy. These last stages provide the best picture of who might be attacking and infecting your corporate network. They also require the least amount of time to remediate. For example, if a vulnerable security camera continues to communicate to an Internet forum, even after segmentation, it’s an easy call to block it entirely from the network. 

[Check out the two-day Dark Reading Cybersecurity Crash Course at Interop ITX, May 15 & 16, where Dark Reading editors and some of the industry's top cybersecurity experts will share the latest data security trends and best practices.]

Related Content:

 

Ofer Amitai is CEO and co-founder of Portnox, where he is responsible for day-to-day operations and setting the company's strategic direction. He has over 20 years' experience in network security, during which time he established the first IT security team in the Israeli Air ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Julian Assange Arrested in London
Dark Reading Staff 4/11/2019
8 'SOC-as-a-Service' Offerings
Steve Zurier, Freelance Writer,  4/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-1840
PUBLISHED: 2019-04-18
A vulnerability in the DHCPv6 input packet processor of Cisco Prime Network Registrar could allow an unauthenticated, remote attacker to restart the server and cause a denial of service (DoS) condition on the affected system. The vulnerability is due to incomplete user-supplied input validation when...
CVE-2019-1841
PUBLISHED: 2019-04-18
A vulnerability in the Software Image Management feature of Cisco DNA Center could allow an authenticated, remote attacker to access to internal services without additional authentication. The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vuln...
CVE-2019-1826
PUBLISHED: 2019-04-18
A vulnerability in the quality of service (QoS) feature of Cisco Aironet Series Access Points (APs) could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation on QoS fields within Wi-Fi fra...
CVE-2019-1829
PUBLISHED: 2019-04-18
A vulnerability in the CLI of Cisco Aironet Series Access Points (APs) could allow an authenticated, local attacker to gain access to the underlying Linux operating system (OS) without the proper authentication. The attacker would need valid administrator device credentials. The vulnerability is due...
CVE-2019-1830
PUBLISHED: 2019-04-18
A vulnerability in Locally Significant Certificate (LSC) management for the Cisco Wireless LAN Controller (WLC) could allow an authenticated, remote attacker to cause the device to unexpectedly restart, which causes a denial of service (DoS) condition. The attacker would need to have valid administr...