#RSAC
#RSAC
Is Your Fridge Conspiring Against
You? IoT Attacks and Embedded
Defenses
Billy Rios
Director of Threat Intelligence
Qualys
@XSSniper
SESSION ID: SEC-T08
Wolfgang Kandek
CTO
Qualys
@wkandek
#RSAC
About:Me -
 Qualys
 Director of Vulnerability Research and Threat
Intelligence
 SpearPoint Security (Acquired in early 2013)
 Founder
 Google
 Technical Lead and Security for Google Plus
2
#RSAC
About:Me
 Microsoft
 Technical Lead and Security for Google Plus
 Books:
 Hacking: The Next Generation – O’Reilly
 Inside Cyber Warfare – O’Reilly
 The Virtual Battlefield – IOS Press
 ICS Vulnerability Research:
 30 publically credited in ICS-CERT advisories
 Vendor Assistance
 Over 1000 individual issues reported to DHS
#RSAC
Let’s Review 2013 and IoT Security
#RSAC
5
#RSAC
“The large-scale attack, which occurred
between Dec. 23, 2013, and Jan. 6, 2014,
involved more than 750,000 malicious email
communications”
#RSAC
7
#RSAC
“they woke up at midnight to the sounds of
a man yelling at their daughter, Emma, and were surprised to
find their Internet-enabled baby monitor moving -- even though
they were not the ones moving it.”
#RSAC
9
#RSAC
10
#RSAC
11
#RSAC
12
#RSAC
13
#RSAC
“hard-coded password
vulnerability affecting roughly 300 medical
devices across approximately 40 vendors”
#RSAC
15
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
RJ45 - Ethernet
#RSAC
RJ11 - Modem
#RSAC
RS485 - Serial
#RSAC
RS485 has three pin and four pin interfaces
#RSAC
RS232 via RJ45
#RSAC
#RSAC
Understanding what
processor architecture is
important
#RSAC
Common Embedded Architectures
 Processors
 X86
 ARM
 Motorola PowerPC
 Operating Systems
 Windows CE/Embedded
 VxWorks
 BusyBox
 QNX
#RSAC
#RSAC
These identifying marks are really important
#RSAC
#RSAC
#RSAC
32
#RSAC
33
#RSAC
34
#RSAC
The Enumeration Effort
 Internet Facing
 Initially based on Shodan, now running in EC2
 50,000+ buildings
 Stadiums, Hospitals, Police Stations, Prisons, Corporations,
Military Installations…etc
 Costs
 EC2 time
 Hardware and software for research
 All total ~$500
#RSAC
Our Target
 Based in Silicon Valley
 Explicitly requested a full scope “Red Team” style
assessment
 No previous knowledge of the organization or the
infrastructure
 Network security teams monitoring and full corporate
security assets in play
#RSAC
Our Approach
 Identify the target in our Building Automation System
(BAS) database (no port scanning required against the
target)
 Internet facing BAS is typically found OUTSIDE of the
corporate IP space!
 Setup our exploitation infrastructure and exploited a
0day vulnerability to gain access to the Building
Automation System
#RSAC
A Lesson on Integrators
 Typically, the end organization doesn’t install IoT
 Typically, a third party (Integrator) is hired to install the
HVAC/Conference room/Nest thermostat/sensors
 When an issue arises, the Integrator is usually called in
to assist
 Traveling to the client site can be expensive and time
consuming for Integrators, so they enable remote
access
#RSAC
#RSAC
#RSAC
Exploits in Action
Internet
#RSAC
Exploits in Action
Internet
#RSAC
Exploits in Action
Internet
#RSAC
Access?
 Pivot from Automation network to Corporate Network
 VLAN separates Automation network from CorpNET
 No AV on any automation systems
 Cable Modem line allows for bypassing of perimeter ingress and
egress monitoring
 Access to Corpnet with Domain Credentials
 At this point, the assessment becomes a traditional penetration
test
 Escalation to Domain Admin
 Access to all workstations (including corporate IP and financial
data)
 Access to CEO’s email
#RSAC
Requested Proof of Concepts
 Unlock the front door of the Corporate HQ
 Shut off all IP based surveillance systems
 Modify the Access Control database (add a badge)
 Wipe an executives mobile device
#RSAC
Things to Consider
 BEFORE you accept a device
 Have a policy!
 Understand the exposures
 Insist on understanding how remote management is
implemented
 Know whether the device will be facing the Internet
 Evaluate the proposed configuration and deployment
 Get your acquisition folks involved
 Engage with your facilities and property team so they
understand the risks of default acceptance of systems
 Large capital investments (ex. Buying a building) require security
involvement from the beginning!
#RSAC
Things to Consider
 Dealing with Devices on Your Network
 Know who your integrators are
 Ask for spare devices for testing
 Do assessments against the devices
 Clear text credentials (if the device talks to your exchange server for
calendar updates… it has domain credentials)
 Backdoor passwords
 Liability
 Monitor traffic to and from the devices
 Consider restricting who can talk to the device
 Establish a baseline for device operation
 Known good firmware, files, and processes
#RSAC
Great Resources
 /Dev/TTYS0 - http://www.devttys0.com/blog/
 Travis Goodspeed -
http://travisgoodspeed.blogspot.com/
 Mikeselectricstuff -
http://www.youtube.com/user/mikeselectricstuff?f
eature=watch
 STBUYN - http://dontstuffbeansupyournose.com/
 Cyber Pacifists - http://www.cyberpacifists.net/
 Reversemode – http://www.reversemode.com/
 W00tsec - http://w00tsec.blogspot.com/
#RSAC
Kit
 Screwdriver set with nut driver, torx and square
 http://www.amazon.com/s/ref=nb_sb_ss_c_0_14?url=sea
rch-alias%3Dindustrial&field-keywords=screwdriver+set
 Soldering iron with desoldering kit
 http://www.amazon.com/s/ref=nb_sb_noss_2?url=search
-alias%3Daps&field-keywords=soldering
 Solderless breadboard
 http://www.adafruit.com/products/758?gclid=CMPMiO-
y5bwCFZRsfgodHG0ACw
 Jumper wires
 http://www.amazon.com/s/ref=nb_sb_noss_1?url=search
-alias%3Dindustrial&field-
keywords=jumper+wires+male+to+male
#RSAC
Kit
 Console Cables
 http://www.amazon.com/s/ref=nb_sb_noss?url=search-
alias%3Daps&field-keywords=console+cable
 TTL Reader
 http://www.amazon.com/s/ref=nb_sb_noss?url=search-
alias%3Daps&field-keywords=TTL+to+USB
 JTAG Reader
 http://blackcatusbjtag.com/
 ROM Reader
 http://www.amazon.com/s/ref=nb_sb_ss_c_0_14?url=sea
rch-alias%3Dindustrial&field-keywords=screwdriver+set
 Logic Analyzer
 http://www.saleae.com/logic
#RSAC
Kit
 Disassembler (with appropriate chipset support)
 https://www.hex-rays.com/products/ida/
 Debugger
 https://www.immunityinc.com/products-immdbg.shtml
 Terminal Software
 http://www.hilgraeve.com/hyperterminal/
 Virtualization Software
 http://www.vmware.com/
#RSAC
#RSAC
Questions?

More Related Content

PPTX
SANS Critical Security Controls Summit London 2013
PPTX
The Internet of Everything is Here
PDF
Micro segmentation and zero trust for security and compliance - Guardicore an...
PPTX
Advanced Persistent Threat - Evaluating Effective Responses
PDF
NIST Zero Trust Explained
PPTX
Big Data Analytics for Cyber Security: A Quick Overview
PPTX
LoginCat - Zero Trust Integrated Cybersecurity
PDF
Zero Trust Model Presentation
SANS Critical Security Controls Summit London 2013
The Internet of Everything is Here
Micro segmentation and zero trust for security and compliance - Guardicore an...
Advanced Persistent Threat - Evaluating Effective Responses
NIST Zero Trust Explained
Big Data Analytics for Cyber Security: A Quick Overview
LoginCat - Zero Trust Integrated Cybersecurity
Zero Trust Model Presentation

What's hot (20)

PPTX
Tripwire Energy Working Group: TIV Demo
PDF
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
PPTX
Jason Kent - AppSec Without Additional Tools
PPTX
Vulnerability Testing Services Case Study
PDF
Hardware Security on Vehicles
PPTX
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
PDF
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
PPTX
Jack Nichelson - Information Security Metrics - Practical Security Metrics
PDF
Pöyry ICS Cyber Security brochure (English)
PPTX
Shadow Data Exposed
PPTX
An in depth understanding in the application of the zero-trust security model...
PPTX
Reasoning About Enterprise Application Security in a Cloudy World
PPTX
Zero Trust Framework for Network Security​
DOCX
“Verify and never trust”: The Zero Trust Model of information security
PPTX
Lisa Guess - Embracing the Cloud
PDF
The 1st Step to Zero Trust: Asset Management for Cybersecurity
PDF
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
PPTX
Two Peas in a Pod: Cloud Security and Mobile Security
PPTX
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
DOCX
What is zero trust model of information security?
Tripwire Energy Working Group: TIV Demo
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Jason Kent - AppSec Without Additional Tools
Vulnerability Testing Services Case Study
Hardware Security on Vehicles
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Pöyry ICS Cyber Security brochure (English)
Shadow Data Exposed
An in depth understanding in the application of the zero-trust security model...
Reasoning About Enterprise Application Security in a Cloudy World
Zero Trust Framework for Network Security​
“Verify and never trust”: The Zero Trust Model of information security
Lisa Guess - Embracing the Cloud
The 1st Step to Zero Trust: Asset Management for Cybersecurity
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Two Peas in a Pod: Cloud Security and Mobile Security
NTXISSACSC2 - Four Deadly Traps in Using Information Security Frameworks by D...
What is zero trust model of information security?
Ad

Similar to RSA ASIA 2014 - Internet of Things (20)

PDF
Whose Cloud is It Anyway - Data Security in the Cloud
PDF
Take It to the Cloud: The Evolution of Security Architecture
PDF
Security precognition chaos engineering in incident response
PDF
RSA2015: Securing the Internet of Things
PDF
Introduction to the Current Threat Landscape
PDF
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts
PPTX
So You Want a Job in Cybersecurity
PDF
cybersecurity-careers.pdf
PPTX
Be the Hunter
PDF
A modern approach to safeguarding your ICS and SCADA systems
PDF
RSAC 2016: How to Get into ICS Security
PDF
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
PDF
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
PPTX
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
PDF
Information Security Risk Management
PDF
IoT & Robotics Overview
PPTX
Fle f04 mishra-v0.9
PDF
NetworkWorld-SafeBreach
PPTX
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
PPTX
Cybersecurity - Jim Butterworth
Whose Cloud is It Anyway - Data Security in the Cloud
Take It to the Cloud: The Evolution of Security Architecture
Security precognition chaos engineering in incident response
RSA2015: Securing the Internet of Things
Introduction to the Current Threat Landscape
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts
So You Want a Job in Cybersecurity
cybersecurity-careers.pdf
Be the Hunter
A modern approach to safeguarding your ICS and SCADA systems
RSAC 2016: How to Get into ICS Security
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
Information Security Risk Management
IoT & Robotics Overview
Fle f04 mishra-v0.9
NetworkWorld-SafeBreach
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Cybersecurity - Jim Butterworth
Ad

More from Wolfgang Kandek (10)

PPTX
Anatomie eines Angriffs
PPTX
Gartner UK 2015 Anatomy of An Attack
PPTX
MindTheSec Anatomia de um Ataque
PPTX
RSA USA 2015 - Getting a Jump on Hackers
PDF
Unsafe SSL webinar
PPTX
BSI Lagebericht 2014
PPTX
Februar Patch Tuesday 2015 Webinar
PPTX
20 Critical Security Controls and QualysGuard
PPTX
Patch Summary Webinar February 14
PPTX
Patch Summary Webinar April 11
Anatomie eines Angriffs
Gartner UK 2015 Anatomy of An Attack
MindTheSec Anatomia de um Ataque
RSA USA 2015 - Getting a Jump on Hackers
Unsafe SSL webinar
BSI Lagebericht 2014
Februar Patch Tuesday 2015 Webinar
20 Critical Security Controls and QualysGuard
Patch Summary Webinar February 14
Patch Summary Webinar April 11

Recently uploaded (20)

PPTX
CS6006 - CLOUD COMPUTING - Module - 1.pptx
PPTX
Soft Skills Unit 2 Listening Speaking Reading Writing.pptx
PPTX
Design ,Art Across Digital Realities and eXtended Reality
PPTX
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
PDF
Beginners-Guide-to-Artificial-Intelligence.pdf
PDF
IAE-V2500 Engine for Airbus Family 319/320
PDF
Using Technology to Foster Innovative Teaching Practices (www.kiu.ac.ug)
PDF
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
PDF
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
PDF
ST MNCWANGO P2 WIL (MEPR302) FINAL REPORT.pdf
PDF
IAE-V2500 Engine Airbus Family A319/320
PDF
Research on ultrasonic sensor for TTU.pdf
PPTX
SC Robotics Team Safety Training Presentation
PDF
Lesson 3 .pdf
PDF
V2500 Owner and Operatore Guide for Airbus
PDF
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
PPT
Programmable Logic Controller PLC and Industrial Automation
PPTX
Agentic Artificial Intelligence (Agentic AI).pptx
PPTX
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
PDF
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)
CS6006 - CLOUD COMPUTING - Module - 1.pptx
Soft Skills Unit 2 Listening Speaking Reading Writing.pptx
Design ,Art Across Digital Realities and eXtended Reality
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
Beginners-Guide-to-Artificial-Intelligence.pdf
IAE-V2500 Engine for Airbus Family 319/320
Using Technology to Foster Innovative Teaching Practices (www.kiu.ac.ug)
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
ST MNCWANGO P2 WIL (MEPR302) FINAL REPORT.pdf
IAE-V2500 Engine Airbus Family A319/320
Research on ultrasonic sensor for TTU.pdf
SC Robotics Team Safety Training Presentation
Lesson 3 .pdf
V2500 Owner and Operatore Guide for Airbus
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
Programmable Logic Controller PLC and Industrial Automation
Agentic Artificial Intelligence (Agentic AI).pptx
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)

RSA ASIA 2014 - Internet of Things

  • 1. #RSAC #RSAC Is Your Fridge Conspiring Against You? IoT Attacks and Embedded Defenses Billy Rios Director of Threat Intelligence Qualys @XSSniper SESSION ID: SEC-T08 Wolfgang Kandek CTO Qualys @wkandek
  • 2. #RSAC About:Me -  Qualys  Director of Vulnerability Research and Threat Intelligence  SpearPoint Security (Acquired in early 2013)  Founder  Google  Technical Lead and Security for Google Plus 2
  • 3. #RSAC About:Me  Microsoft  Technical Lead and Security for Google Plus  Books:  Hacking: The Next Generation – O’Reilly  Inside Cyber Warfare – O’Reilly  The Virtual Battlefield – IOS Press  ICS Vulnerability Research:  30 publically credited in ICS-CERT advisories  Vendor Assistance  Over 1000 individual issues reported to DHS
  • 4. #RSAC Let’s Review 2013 and IoT Security
  • 6. #RSAC “The large-scale attack, which occurred between Dec. 23, 2013, and Jan. 6, 2014, involved more than 750,000 malicious email communications”
  • 8. #RSAC “they woke up at midnight to the sounds of a man yelling at their daughter, Emma, and were surprised to find their Internet-enabled baby monitor moving -- even though they were not the ones moving it.”
  • 14. #RSAC “hard-coded password vulnerability affecting roughly 300 medical devices across approximately 40 vendors”
  • 16. #RSAC
  • 17. #RSAC
  • 18. #RSAC
  • 19. #RSAC
  • 23. #RSAC RS485 has three pin and four pin interfaces
  • 25. #RSAC
  • 27. #RSAC Common Embedded Architectures  Processors  X86  ARM  Motorola PowerPC  Operating Systems  Windows CE/Embedded  VxWorks  BusyBox  QNX
  • 28. #RSAC
  • 29. #RSAC These identifying marks are really important
  • 30. #RSAC
  • 31. #RSAC
  • 35. #RSAC The Enumeration Effort  Internet Facing  Initially based on Shodan, now running in EC2  50,000+ buildings  Stadiums, Hospitals, Police Stations, Prisons, Corporations, Military Installations…etc  Costs  EC2 time  Hardware and software for research  All total ~$500
  • 36. #RSAC Our Target  Based in Silicon Valley  Explicitly requested a full scope “Red Team” style assessment  No previous knowledge of the organization or the infrastructure  Network security teams monitoring and full corporate security assets in play
  • 37. #RSAC Our Approach  Identify the target in our Building Automation System (BAS) database (no port scanning required against the target)  Internet facing BAS is typically found OUTSIDE of the corporate IP space!  Setup our exploitation infrastructure and exploited a 0day vulnerability to gain access to the Building Automation System
  • 38. #RSAC A Lesson on Integrators  Typically, the end organization doesn’t install IoT  Typically, a third party (Integrator) is hired to install the HVAC/Conference room/Nest thermostat/sensors  When an issue arises, the Integrator is usually called in to assist  Traveling to the client site can be expensive and time consuming for Integrators, so they enable remote access
  • 39. #RSAC
  • 40. #RSAC
  • 44. #RSAC Access?  Pivot from Automation network to Corporate Network  VLAN separates Automation network from CorpNET  No AV on any automation systems  Cable Modem line allows for bypassing of perimeter ingress and egress monitoring  Access to Corpnet with Domain Credentials  At this point, the assessment becomes a traditional penetration test  Escalation to Domain Admin  Access to all workstations (including corporate IP and financial data)  Access to CEO’s email
  • 45. #RSAC Requested Proof of Concepts  Unlock the front door of the Corporate HQ  Shut off all IP based surveillance systems  Modify the Access Control database (add a badge)  Wipe an executives mobile device
  • 46. #RSAC Things to Consider  BEFORE you accept a device  Have a policy!  Understand the exposures  Insist on understanding how remote management is implemented  Know whether the device will be facing the Internet  Evaluate the proposed configuration and deployment  Get your acquisition folks involved  Engage with your facilities and property team so they understand the risks of default acceptance of systems  Large capital investments (ex. Buying a building) require security involvement from the beginning!
  • 47. #RSAC Things to Consider  Dealing with Devices on Your Network  Know who your integrators are  Ask for spare devices for testing  Do assessments against the devices  Clear text credentials (if the device talks to your exchange server for calendar updates… it has domain credentials)  Backdoor passwords  Liability  Monitor traffic to and from the devices  Consider restricting who can talk to the device  Establish a baseline for device operation  Known good firmware, files, and processes
  • 48. #RSAC Great Resources  /Dev/TTYS0 - http://www.devttys0.com/blog/  Travis Goodspeed - http://travisgoodspeed.blogspot.com/  Mikeselectricstuff - http://www.youtube.com/user/mikeselectricstuff?f eature=watch  STBUYN - http://dontstuffbeansupyournose.com/  Cyber Pacifists - http://www.cyberpacifists.net/  Reversemode – http://www.reversemode.com/  W00tsec - http://w00tsec.blogspot.com/
  • 49. #RSAC Kit  Screwdriver set with nut driver, torx and square  http://www.amazon.com/s/ref=nb_sb_ss_c_0_14?url=sea rch-alias%3Dindustrial&field-keywords=screwdriver+set  Soldering iron with desoldering kit  http://www.amazon.com/s/ref=nb_sb_noss_2?url=search -alias%3Daps&field-keywords=soldering  Solderless breadboard  http://www.adafruit.com/products/758?gclid=CMPMiO- y5bwCFZRsfgodHG0ACw  Jumper wires  http://www.amazon.com/s/ref=nb_sb_noss_1?url=search -alias%3Dindustrial&field- keywords=jumper+wires+male+to+male
  • 50. #RSAC Kit  Console Cables  http://www.amazon.com/s/ref=nb_sb_noss?url=search- alias%3Daps&field-keywords=console+cable  TTL Reader  http://www.amazon.com/s/ref=nb_sb_noss?url=search- alias%3Daps&field-keywords=TTL+to+USB  JTAG Reader  http://blackcatusbjtag.com/  ROM Reader  http://www.amazon.com/s/ref=nb_sb_ss_c_0_14?url=sea rch-alias%3Dindustrial&field-keywords=screwdriver+set  Logic Analyzer  http://www.saleae.com/logic
  • 51. #RSAC Kit  Disassembler (with appropriate chipset support)  https://www.hex-rays.com/products/ida/  Debugger  https://www.immunityinc.com/products-immdbg.shtml  Terminal Software  http://www.hilgraeve.com/hyperterminal/  Virtualization Software  http://www.vmware.com/