Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/19/2016
08:00 AM
Mike Baker
Mike Baker
Commentary
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail vvv
100%
0%

Whats The Risk? 3 Things To Know About Chatbots & Cybersecurity

Interactive message bots are useful and becoming more popular, but they raise serious security issues.

Fueled by the exponential growth in mobile messaging, chatbots — interactive messaging bots that harness recent advances in artificial intelligence and machine learning — are the hottest new technology going right now. Facebook opened up its Messenger platform to bot developers earlier this year; messaging app Telegram is offering developers up to $1 million in prizes to develop bots that are fast, useful, and work in inline mode; and over 20 million people chat with the Xiaoice bot on the Chinese micro-blogging service Weibo. Even the White House has gotten into the act with its Obama Facebook chatbot.

Chatbot technology is still in its infancy, but it’s quickly being embraced by businesses because of its vast potential for sales, marketing, and customer service. Chatbots stand to help organizations build deeper relationships with their customers and improve service quality, while at the same time save money by automating certain administrative tasks.

However, as organizations build and deploy enterprise chatbots, it’s important to step back for a moment and consider the security implications of this brave new technology.

Be Aware of the Chatbot’s Channel Encryption
For maximum security, chatbot communication should be encrypted, and chatbots should be deployed only on encrypted channels. While these sound like obvious safeguards, unfortunately, it’s not that simple. An in-house bot that runs on an organization’s system can be set up on a private, encrypted channel, but if an organization wishes to deploy a chatbot on a public channel such as Facebook Messenger, it’s at the mercy of that platform’s security capabilities.

While Facebook is testing end-to-end encryption for its Messenger platform, the feature is still in beta and isn’t widely available. Until public channels begin offering encryption services, organizations should be wary of the type of chatbots they employ using those platforms. Chatbots used on unencrypted channels shouldn’t accept or transmit sensitive information, and for the protection of the organization, these bots shouldn’t have access to the organization’s systems.

Establish Rules Regarding Chatbot Data Handling and Storage
By their nature, chatbots collect information from users; that’s how they respond to questions, and it’s how they train themselves to get better at their “jobs” over time. Where this information is stored, how long it’s stored, how it’s used, and who has access to it must be addressed, especially in highly regulated industries that handle very sensitive information, such as healthcare and finance. Before implementing a chatbot, organizations must establish rules regarding the data the bot will gather and make these rules clear to the customers who will be using the bot.

Additionally, companies must consider where this data will reside, especially if the bot collects personal or sensitive information. This is another issue that limits the functionality of bots on public platforms until the platforms can ensure secure storage and provide additional tools regarding what gets stored and for how long.

Be on the Lookout for Criminal Chatbots
Finally, organizations must be aware of the bigger picture of chatbot security. As chatbots become better at imitating humans, the technology will be used by hackers in phishing schemes and other social engineering hacks. For example, a chatbot designed to imitate a customer or a vendor could strike up a conversation with an employee through a messaging app. After rapport has been established, the chatbot could entice the employee to click on a malicious link or hand over sensitive information.

This has already happened on the consumer level; recently, a number of men using the Tinder dating app were swindled by a bot that pretended to be a female user. After a few back-and-forth messages, the chatbot convinced the men to click on a link to become “Tinder verified.” The link required that they input their credit card information, at which time they were unwittingly signed up for a recurring online porn subscription.

Until technology can be developed to identify and intercept malicious chatbots, the best defense is to train employees to never click on links sent by customers or vendors, and to prohibit them from transmitting sensitive information through email or messaging services. Organizations should be doing these things already to defend against “traditional” phishing schemes.

Because chatbot technology is so new, specific security protocols are still being developed, particularly regarding chatbots deployed on public platforms such as Facebook, and the rapid pace of chatbot development means that new features — and threats — are continuously emerging. 

Chatbots have the potential to transform how business is conducted online. They can also be quite destructive and end up causing cybersecurity nightmares for organizations that don’t employ them properly, especially at this early stage. It is critical for organizations to not get caught up in the frenzy surrounding this new technology and to take a conservative, deliberate approach to chatbot development and deployment, particularly on public platforms.

Related Content:

Mike Baker is founder and Principal at Mosaic451, a bespoke cybersecurity service provider and consultancy with specific expertise in building, operating and defending some of the most highly-secure networks in North America. Mosaic451 offers a unique blend of deep technology ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AshishJ981
50%
50%
AshishJ981,
User Rank: Apprentice
1/19/2018 | 6:26:29 AM
Re: As tech advances, so do threats...

The question also comes that can platforms that integrates with chatbot platforms provide end to end encryption? And if not, then how is this communication channel secure (given that it doesn't have end-to-end encryption. We at Engati www.engati.com have started the journey. Do read our collection of blogs at Engati.com, test our platform and provide us feedback.

edyang
100%
0%
edyang,
User Rank: Apprentice
9/29/2016 | 12:01:59 PM
Re: Criminal
Good point. I bet if you ask the average person what a chatbot is, they'll stare at you blankly...
MikeBaker
100%
0%
MikeBaker,
User Rank: Author
9/28/2016 | 1:50:03 PM
Re: Criminal
That's a good question-

My impression has been that the average consumer isn't even aware of what chat bots are, or that they're in use. Until the awareness increases, criminal chat bots could be the perfect way for for bad actors to programatically split-test out different approaches/questions/scenarios to what's only been used up until now in old-fashioned social engineering based attempts.
Whoopty
100%
0%
Whoopty,
User Rank: Ninja
9/21/2016 | 7:51:38 AM
Criminal
The criminal chat bots is a really interesting idea. I wonder if people will become less concious of their own security when talking to bots, as they will assume they are from a legitimate source?

They may assume that bots are stupid, but I doubt anyone would expect a bot to screw them over. 
EdnaBaron
100%
0%
EdnaBaron,
User Rank: Apprentice
9/21/2016 | 6:25:29 AM
Re: As tech advances, so do threats...
Chatbot technology is one of the highly discussed part and this article describes each and every important points related to this particular area of technology. Cyber security is more important and it plays important role to keep confidential data. 
edyang
100%
0%
edyang,
User Rank: Apprentice
9/19/2016 | 12:44:55 PM
As tech advances, so do threats...
It's an exciting time. Artificial intelligence, machine learning, chatbots, self-driving cars, augmented reality games. But as technology advances, it's a given that there will be cybersecurity threats. The difference will be the magnitude of the impact. What if malware infected chatbots siphoned financial data, or worse social security numbers, from unsuspecting users? What if IoT health care devices were hacked? It's an exciting but also a dangerous time.
Windows 10 Migration: Getting It Right
Kevin Alexandra, Principal Solutions Engineer at BeyondTrust,  5/15/2019
Artist Uses Malware in Installation
Dark Reading Staff 5/17/2019
Baltimore Ransomware Attack Takes Strange Twist
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12184
PUBLISHED: 2019-05-19
There is XSS in browser/components/MarkdownPreview.js in BoostIO Boostnote 0.11.15 via a label named flowchart, sequence, gallery, or chart, as demonstrated by a crafted SRC attribute of an IFRAME element, a different vulnerability than CVE-2019-12136.
CVE-2019-12173
PUBLISHED: 2019-05-18
MacDown 0.7.1 (870) allows remote code execution via a file:\\\ URI, with a .app pathname, in the HREF attribute of an A element. This is different from CVE-2019-12138.
CVE-2019-12172
PUBLISHED: 2019-05-17
Typora 0.9.9.21.1 (1913) allows arbitrary code execution via a modified file: URL syntax in the HREF attribute of an AREA element, as demonstrated by file:\\\ on macOS or Linux, or file://C| on Windows. This is different from CVE-2019-12137.
CVE-2019-12168
PUBLISHED: 2019-05-17
Four-Faith Wireless Mobile Router F3x24 v1.0 devices allow remote code execution via the Command Shell (aka Administration > Commands) screen.
CVE-2019-12170
PUBLISHED: 2019-05-17
ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. This may result in remote command execution. An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This will allow for PH...