Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:10 AM
Connect Directly

How to Pinpoint Rogue IoT Devices on Your Network

Researchers explain how security practitioners can recognize when a seemingly benign device could be malicious.

A Raspberry Pi floating on your network may not be cause for concern – at first. But when did it join the network? What is it doing? Is it the only Raspberry Pi? These questions can help discern a benign connected device from a malicious product trying to infiltrate an organization. 

"The amount of unmanaged devices has pretty much exploded in the last five years," said David Pearson, head of threat research at Awake Security, in a talk at last week's Interop Digital. More people are connecting to corporate networks with devices that aren't managed to the level you might expect corporate infrastructure and devices to be managed.

Related Content:

Bluetooth Security Weaknesses Pile Up, While Patching Remains Problematic

2020 State of Cybersecurity Operations and Incident Response

New on The Edge: Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

This is a growing problem, in large part because most Internet of Things (IoT) device traffic is unencrypted, he explained.

"There's so much information that gets shared, whether that's internal to internal, or internal to external, that's just completely in the clear," Pearson said.

Now, as people are bringing business data onto home networks, ensuring data security is even more important.

About a year ago, Pearson and the Awake Security team hypothesized they would be able to analyze the behavior of a device and, in doing so, distinguish IoT and operational technology (OT) devices from mobile devices, bring-your-own-device (BYOD) systems, corporate infrastructure, and enterprise devices. They not only learned this was possible but discovered myriad ways these connected devices put businesses at risk. 

Pearson and his Awake Security colleague, lead network threat hunter Eric Poynton, began their talk with a discussion of key traits belonging to each device category so attendees could understand how to recognize them on a network.

Enterprise devices – the laptops and desktops used to access business services – typically use corporate authentication mechanisms. They usually have uniform naming schemes so IT and security groups can understand who is using what, and they generally use many applications. These are on the network for long periods of time; while they may close down at night or in between meetings, there will be a significant stretch between their first and last appearances.

BYOD systems overlap with enterprise devices but generally don't use corporate authentication mechanisms for servers and services. They'll have several naming schemes – "Jen's Macbook Pro," for example – and you'll notice several device models. Like corporate devices, they use many applications but are unmanaged and often do things like use personal email accounts. Similarly, mobile devices don't use corporate authentication, have various naming schemes, and move around a lot. Some might have more than 100 access points in a couple of months.

Corporate infrastructure includes things that serve the services businesses use: Active Directory, DNS, and access points. These exist for long periods of time, generally do not use the Dynamic Host Configuration Protocol (DHCP) because they are high value assets and have the same IP address consistently. They use few to zero applications, Pearson noted.

IoT and OT encompasses a large category of smart devices and are not usually known to, or managed by, the business because they don't go through IT and security to be on a network. These devices don't match any of the aforementioned profiles. Teams may notice unparsed protocols sometimes in mainstream devices or frequently in custom devices. IoT and OT products often learn about their environments via multicast. Some have specific naming schemes, like smart speakers and cameras. Some appear in large number, like smart cameras or TVs.

How to Know an IoT Device Is Malicious
The researchers' study found some cases in which malicious devices were infiltrating enterprise networks.

In one utility company, for example, the researchers found a Beagle bone – a small device similar to a Raspberry Pi. It was the only one on the network, "which is a pretty good red flag when we're talking about these kinds of things," said Pearson.

It appeared two months into observing this network, was enumerating the network, and was accessible via SSH. All of these, he said, were indicators saying this shouldn't be on the network and something wa going on.

Another case revealed a Raspberry Pi on the network of a consumer financial institution – "generally not a place where you'd expect to see Raspberry Pis," Pearson said – and it was the only Raspberry Pi on the network. The device was tunneling all of its traffic via remote access tool TeamViewer, which was "definitely something that surprised us quite a bit," he added. 

In some cases, the devices Pearson and Poynton discovered were not malicious but could introduce serious compliance issues for the organization and foreshadow future attacks. Poynton described an organization in which exercise bikes were regularly beaconing out log information back to their home bases. These logs included account names, passwords, station names, and MAC addresses. The body of the message had users' email addresses, ages, weights, heights, and social media profiles. 

The logs were on an ICS network and sending logs unencrypted over the Internet, unknown to the IT and security team and creating a "gaping hole in their security," he said.

Other examples the researchers saw included a smart beverage system phoning home in plaintext with Wi-Fi information, dozens of remote ATMs communicating their locations and customer transactions over the Internet in plaintext, and an HVAC system managed via Remote Desktop Protocol (RDP) remotely by a third-party vendor, allowing the vendor's IP to communicate with the HVAC system remotely over the Internet and creating "mind-blowing amounts of risk," said Pearson.

How can you pinpoint and address these devices before they cause problems? Pearson explained how device knowledge is essential for complex threats. It's critical to understand the products on your network as devices, he said. Otherwise you can't understand the contextual clues he and Poynton were able to discern in their study.

Behavioral analysis and understanding which behaviors are normal and which aren't are equally important. If a device is externally reachable, it's a huge risk. Do you trust whether a third-party vendor has controls to keep your security safe? If it's completely open and internally reachable, Pearson said, it's essentially compromised.

Intranetwork communications are also key: Are they allowed? Are you being smart about it? Is information sent and received externally? Consider the risks you're accepting: Is personally indentifiable information being transmitted? If so, are you OK with that?

Finally, segmentation should be top of mind, Pearson said. Segmentation reduces the scope of attacks, and being able to do this is critical.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We are really excited about our new two tone authentication system!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-12-01
Privilege Escalation vulnerability in Microsoft Windows client McAfee Total Protection (MTP) prior to 16.0.29 allows local users to gain elevated privileges via careful manipulation of a folder by creating a junction link. This exploits a lack of protection through a timing issue and is only exploit...
PUBLISHED: 2020-12-01
containerd is an industry-standard container runtime and is available as a daemon for Linux and Windows. In containerd before versions 1.3.9 and 1.4.3, the containerd-shim API is improperly exposed to host network containers. Access controls for the shim’s API socket verified that...
PUBLISHED: 2020-12-01
FusionCompute versions 6.3.0, 6.3.1, 6.5.0, 6.5.1 and 8.0.0 have a privilege escalation vulnerability. Due to improper privilege management, an attacker with common privilege may access some specific files and get the administrator privilege in the affected products. Successful exploit will cause pr...
PUBLISHED: 2020-12-01
HUAWEI nova 4 versions earlier than and SydneyM-AL00 versions earlier than have an out-of-bounds read and write vulnerability. An attacker with specific permissions crafts malformed packet with specific parameter and sends the packet to the affected prod...
PUBLISHED: 2020-12-01
HCL iNotes is susceptible to a sensitive cookie exposure vulnerability. This can allow an unauthenticated remote attacker to capture the cookie by intercepting its transmission within an http session. Fixes are available in HCL Domino and iNotes versions 10.0.1 FP6 and 11.0.1 FP2 and later.