The Internet of Evil Things: The Rapidly Emerging Threat of High Risk Hardware Industry report Provided by: Pwnie Express Date: 4/15/2015 Contents: IoET: The Rapidly-Emerging Threat of High-Risk Hardware Page 2 Hardware Undermines All: The Business Impact of IoET .........................................................................................Page 3 A Survey: The InfoSec Pro’s Take on High-Risk Hardware .......................................................................................Page 4 The Top IoET Threats of 2015 ............................................................................................................................................................Page 5 Unauthorized & Unchecked: Shadow IT and High-risk BYOx Devices .........................................................Page 6 - Example Devices ............................................................................................................................................................................. - Default Wireless Printer Case Study ............................................................................................................................. - High-Risk BYOx in the Wild .................................................................................................................................................... - Additional References ................................................................................................................................................................ Page 6 Page 6 Page 7 Page 11 The Internet of Insecure Things: The Proliferation of Vulnerable IoT Devices .................................... Page 12 - Example Devices ........................................................................................................................................................................... - The VoCore Embedded AP Case Study ..................................................................................................................... - Vulnerable IoT in the Wild ..................................................................................................................................................... - Additional References ............................................................................................................................................................... Page 12 Page 13 Page 14 Page 14 Plug-and-Play Cyber Espionage: The commoditization of malicious hardware .................................Page 15 - Example Devices ............................................................................................................................................................................ - Wireless KeyGrabber Case Study ................................................................................................................................... - Malicious Hardware in the Wild ....................................................................................................................................... - Additional References ............................................................................................................................................................... Page 16 Page 17 Page 18 Page 18 Mitigating the IoET Threat: A Call to Action ...........................................................................................................................Page 19 About Pwnie Express ................................................................................................................................................................................. Page 20 1 IoET: The Rapidly Emerging Threat of High Risk Hardware “The Internet of Everything is creeping into the enterprise, whether the security team knows about the devices or not. Most organizations do not understand the risk these devices already present.” Chris Wysopol, Co-Founder, CTO and CISO at Veracode MiFi 68 The Internet of Everything has arrived and alongside every great technology trend comes a challenging and loosely-defined threat vector. With the rush to Internet-enable everything from wristwatches to power grids, the massive proliferation of smart devices has significantly expanded the attack surface of our interconnected world. This attack surface has expanded well beyond the visibility of today’s monitoring and intrusion detection systems. As a result, a little understood and ever expanding threat vector has emerged: The Internet of Evil Things (IoET). "The promise of the Internet of Things is straightforward: more connected things leads to more efficiency, more productivity, more profit." said John Pescatore. "But none of that promise gets realized if we can't keep those things safe and secure. The starting point has to be knowing what things are on our network, what vulnerabilities are exposed, and how can we mitigate the risks." John Pescatore, Director of Emerging Security Trends, SANS Institute. Today’s information security (InfoSec) leaders are concerned about unauthorized and rogue devices on their network, and for good reason—the 16 billion connected computing devices around the globe include a significant number of high risk hardware devices. These device threats range from unauthorized bring-your-own-device (BYOD) and vulnerable IoT devices to a rapidly expanding market of low cost, plug-and-play cyber espionage devices. A survey of over 600 InfoSec professionals, conducted by Pwnie Express in December 2014, established that 83 percent of today’s Chief Security Officers and InfoSec professionals are concerned that rogue devices could be operating undetected in their network environment already. The majority of respondents, 69 percent, also report they don't have full visibility of all wireless devices within their network environment. It is clear we are reaching a critical tipping point in enterprise security: the growing IoET needs to be defined and protected against. The Internet of Evil Things: The Rapidly Emerging Threat of High Risk Hardware report aims to provide security, IT and businessleaders with: The key factors of the IoET threat vector and its business impact; How today’s InfoSec leaders are viewing this threat; Today’s top IoET related threats, and; The need for an industry-wide initiative to effectively combat this threat. 2 Hardware Undermines All: The Business Impact of IoET “The IoET threat is the soft underbelly for enterprise organizations, enabling and exacerbating the other threats we face by giving would-be attackers low-hanging fruit to bypass our traditional defenses.” Ed Skoudis, Fellow and Instructor at SANS Institute. In the days before mobile and wireless dominated the computing landscape, asset monitoring and inventory systems, vulnerability scanning, intrusion detection and other traditional security controls achieved network device awareness (SANS Critical Security Control #1). Today, the enormous adoption of wireless, mobile/micro and transient computing devices has rendered yesterday’s defenses inadequate. In addition, by operating at the lowest layer of the network stack, rogue hardware can compromise all other layers of defense. Today’s rogue devices can circumvent Network Access Controls (NAC), domain authentication, network and wireless intrusion prevention systems (IPS), application aware firewalls, high security wireless deployments and even HTTPS/SSL encryption. The business impact of this level of compromise can be catastrophic. As illustrated by NPR’s Project Eavesdrop, a single rogue device can expose a tremendous amount of sensitive information to a cyber criminal, including: Protected customer data such as personally identifiable information (PII), social security numbers (SSNs) and credit and debit card primary account numbers (PANs); Passwords to internal and third party systems, websites, cloud services and financial accounts; Complete email threads, internal documents and protected intellectual property; VoIP/SIP phone calls, text or video chat sessions; Keystrokes, phone numbers, email addresses, GPS coordinates, software application versions, USB and Bluetooth accessories; All end user Internet traffic including visited websites, search keywords, session IDs, cookies, and SSL certificates. This high risk hardware threat vector effectively undermines nine of the SANS Top 20 critical controls, leaving security teams and organizations unequipped to effectively monitor, detect and respond to a significant and growing class of intrusions. Areas of deficiency include: Devices and Assets – It is difficult or not possible to detect unauthorized devices such as BYOD mobile devices, rogue Access Points (APs), rogue devices, wireless devices and other IoT devices (Violations of SANS Controls #1 and #7); Distributed Organization – It is difficult or not possible to monitor and assess remote sites with personnel and security solutions that are unable to work effectively on a remote basis. (Violations of SANS Controls #4 and #18.) 3 Security Controls – Companies are unable to validate security controls and configurations, especially in remote and wireless environments (Violations of SANS Controls #3, #10 and #11); Incident Response – It is difficult or not possible to detect or log devices in the vicinity of incidents (Violation of SANS Control #18); Security Expertise – The available resources are insufficiently trained. (Violation of SANS Controls #9 and #20). A Survey: The InfoSec Pro’s Take on High Risk Hardware An industry survey conducted by Pwnie Express, conducted among 621 InfoSec professionals, discovered that: 83 percent of InfoSec respondents are concerned that rogue devices could be operating undetected in their network environment already; Only 31 percent indicate having full visibility of all wireless devices in their network environment; Of the most concerning high risk device attack types, InfoSec professionals are narrowly divided over insider rogue device attacks (37 percent), attacks initiated by an external actor using a rogue device (31 percent), and attacks that stem from the improper use of BYOD (32 percent); Rogue Access Points, MiFi and mobile hotspots lead the list of high risk devices most concerning to InfoSec professionals. About 36 percent see a threat in having these devices in their network environment; Other high risk devices of concern to InfoSec professionals include: BYOD devices that have been compromised without the users' knowledge Malicious devices inserted into corporate systems Drive-by devices Smart phones with a mobile hotspot Misconfigured devices Guest devices dropped into the corporate network, whether intentionally or accidentally USB human interface devices (HIDs) Rogue Device Awareness and Concern Survey, Pwnie Express, December 2014 Figure 1: Majority of Respondents from the USA Figure 2: Mix of Respondent Roles/Titles 4 Figure 3: InfoSec professionals lack visibility into all wireless devices (Number of Respondents: 621) Figure 4: InfoSec professionals worry about rogue devices (Number of Respondents: 621) Figure 5: Rogue Access Points are of highest concern (646 devices listed, respondents may select multiple devices) The Top IoET Threats of 2015 “Hands down, BYOx and stealth IT is worrisome. The bottomline is that most users are simply not going to wait toIT to provision. Oftentimes this may be an executive who just wants to use the shiny new "thingy" and if they can't they'll find a way to make it happen.” Mike Saurbach, Manager Information Security, Corning Credit Union The IoET threat vector encompasses any hardware computing device that poses a tangible security risk to an organization. This ranges from unsecured mobile hotspots and default-state printers to vulnerable wireless thermostats and malicious keystroke logging devices. Based on Pwnie Express’s data and analysis of deployed customer environments, customer feedback, third party surveys and public reports of real-world breaches involving rogue hardware devices, the InfoSec team at Pwnie Express assembled a broad set of the top most prevalent hardware device threats affecting today’s global IT infrastructure. These device threats generally fall into these three categories: Unauthorized & Unchecked: Shadow IT and high-risk “Bring Your Own Everything” (aka BYOx) devices The Internet of Insecure Things: The proliferation of vulnerable IoT devices Plug-and-Play Cyber Espionage Devices: The commoditization of malicious hardware 5 Unauthorized & Unchecked: Shadow IT and High Risk BYOx Devices This category of IoET hardware encompasses the following types of high risk devices: Unauthorized personal devices in violation of organizational policy (aka “Shadow IT”); Corporate-sponsored BYOD hardware; Devices that fall within the expanding trend of “Bring Your Own Everything” (aka BYOx); Devices in a default or unconfigured state, including devices with default passwords and default “wide open” settings; Unauthorized & Unchecked: Example Devices Wireless/mobile devices roaming from corporate wireless to “guest” wireless to circumvent corporate security controls Wireless/mobile devices connecting to open (unencrypted) third party wireless networks or personal MiFi/mobile hotspot devices (vulnerable to eavesdropping and Evil AP attacks) Unauthorized/vulnerable mobile devices Unauthorized/rogue wireless access points connected to the corporate network Vulnerable, default-state, or misconfigured printers 4G/LTE USB dongles Microcells/femtocells Rooted Androids/iPhones Default-state wireless access points (pivot point / backdoor into wired networks) Default-state network equipment Unsupported / End-Of-Life (EOL) devices with unpatchable security vulnerabilities Devices in an otherwise misconfigured or vulnerable state, including devices missing security patches or offering limited/weak encryption. Unauthorized & Unchecked: Default Wireless Printer Case Study As wireless printers have become more prevalent, manufacturers often make the process of connecting to wireless printers even easier. They do so by configuring wireless printers to provide their own wireless access points by default so that wireless clients can simply connect to the printer itself. There are several issues here. For one, the default wireless access point the printer broadcasts is usually open, allowing anyone to connect to the printer directly over WiFi. If the printer is in its default state, an attacker can then access the printer’s configuration and control with a default admin username and password—assuming an admin account is even present in a default. 6 As wireless printers have become more prevalent, manufacturers often make the process of connecting to wireless printers even easier. They do so by configuring wireless printers to provide their own wireless access points by default so that wireless clients can simply connect to the printer itself. There are several issues here. For one, the default wireless access point the printer broadcasts is usually open, allowing anyone to connect to the printer directly over WiFi. If the printer is in its default state, an attacker can then access the printer’s configuration and control with a default admin username and password—assuming an admin account is even present in a default configuration. The attacker then has the ability to compromise almost anything, similar to when the printer is a vulnerable wireless client, except now it can also directly attack any other wireless clients connected to the printer’s wireless access point. The other major issue for corporate wireless clients is that even if someone eventually locks the wireless printer’s access point down, any corporate wireless client that has connected to the wireless printer in an open network state (i.e., no security or encryption) is now potentially vulnerable to an Evil AP attack, regardless of being within range of the wireless printer. By default, most wireless clients will automatically connect to an open wireless network they have previously connected to. This gives an attacker the ability to hijack corporate wireless clients, tricking them into connecting to a malicious wireless access point that is pretending to be the open wireless printer network. Again, if the corporate wireless client is also plugged into the wired network via Ethernet, the client can then potentially become a wireless bridge to access the wired network. Popularity: While it may not be immediately clear that this is a point of attack, wireless printers are becoming both more common and more vulnerable to attack. Simplicity: As the attacker has to rely on knowledge of a printer that already exists on the network, the simplicity of this attack may vary. Impact: The impact from a successful attack can be quite devastating.By using the misconfigured printer either as a window into the network or even by simply intercepting the print jobs sent to the printers, sensitive data can be much more easily accessed. For more details about our assessment of vulnerable wireless printers: https://www.pwnieexpress.com/rogue-device-spotlight-wireless-printers/ Unauthorized & Unchecked: High Risk BYOx in the Wild Pwn Pulse is a rogue device detection system by Pwnie Express. It provides continuous visibility throughout the wired, wireless and RF spectrum, across all physical locations including remote sites and branch offices, detecting “known-bad”, unauthorized, vulnerable, and suspicious devices. Using anonymized data from real-world customer environments, Pwn Pulse provides insight on the prevalence of unauthorized and vulnerable BYOx devices in organizations today. The statistics below are based on a sample of over 250,000 wireless devices detected by Pwn Pulse across a variety of customer environments and industry verticals. Of particular note, these findings HP printers are the most prevalent wireless devices deployed in a highly vulnerable default configuration state (e.g., default passwords, unencrypted WiFi, wide open default config) (83%). As outlined by the “Default Wireless Printer Case Study” above, these default-state printers can be undermined to expose confidential print jobs, compromise corporate client devices, and leveraged as a backdoor into private corporate networks. A complete lack of encryption (“open” network) is the most common risk affecting vulnerable Wireless APs. (69%). Xfinitywifi dominates the WiFi landscape as the most common open (unencrypted) network. (58%). 7 Samsung mobile devices are the most prevalent devices deployed as vulnerable mobile hotspots with no encryption (“open” network) or weak encryption. (42%). Wireless/mobile client devices that had previously connected to a default Linksys AP are most vulnerable to eavesdropping and man-in-the-middle attacks. (45%). Wireless/mobile client devices that had previously connected to an “attwifi” AP are most vulnerable to Evil AP attacks. (36%). Figure 6: HP printers are the most prevalent wireless devices deployed in a highly vulnerable default configuration state. 8 Figure 7: Lack of encryption is the most common risk affecting vulnerable Wireless APs.. Figure 8: Xfinitywifi dominates the WiFi landscape as the most common open (unencrypted) network. 9 Figure 9: Samsung mobile devices are the most prevalent devices deployed as vulnerable mobile hotspots with no encryption (“open” network) or weak encryption. Figure 10: Wireless/mobile client devices that had previously connected to a default Linksys AP are most vulnerable to eavesdropping and man-in-the-middle attacks. 10 Figure 11: Wireless/mobile client devices that had previously connected to an “attwifi” AP are most vulnerable to Evil AP attacks. Additional References http://smallbusiness.foxbusiness.com/technology-web/2014/10/02/5-tablet-security-threats-are-yours-protected/ http://www.zdnet.com/article/byod-why-the-biggest-security-worry-is-the-fool-within-rather-than-the-enemy-without/ http://www.techrepublic.com/article/byon-is-a-bigger-threat-to-the-enterprise-than-byod-says-sysaid-ceo/ http://midsizeinsider.com/en-us/article/security-risks-from-using-bring-your-own http://www.pcworld.com/article/254518/your_printer_could_be_a_security_sore_spot.html https://threatpost.com/majority-of-4g-usb-modems-sim-cards-exploitable/110139 http://www.informationweek.com/mobile/google-glass-security-risk-for-governments/d/d-id/1111246 http://arstechnica.com/security/2015/02/lenovo-pcs-ship-with-man-in-the-middle-adware-that-breaks-https-connections/ http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10047 11 The Internet of Insecure Things: The Proliferation of Vulnerable IoT Devices There’s not a CIO out there who has an effective umbrella strategy for the Internet of Things today, The attack surface is gargantuan – and continues to grow exponentially. Making matters worse, current approaches don’t offer the robust, enterprise-level security that’s needed. Shawn Wiora, CIO and CISO at Creative Solutions in HealthCare This category of IoET hardware encompasses IoT devices that are physically or logically incapable of complying with standard, minimum viable or baseline security controls. At the heart of the IoT are the Internet connected devices. In its 2014 Internet of Everything Market Research, ABIresearch determined that the installed base of active wireless connected devices would exceed 16 billion in 2014—up more than 20% over 2013's number. Looking ahead to 2020, ABIresearch forecasts the number of devices to more than double to 40.9 billion. 1 Many manufacturers are bringing devices to market with little attention to security and privacy. According to John Pescatore, a director of the SANS Institute, "Because so many devices will be coming from consumer markets, the price, size and power constraints for many of those devices almost guarantee security will be an afterthought."2 The Open Web Application Security Project (OWASP) has created an Internet of Things Top Ten Project to help device manufacturers, developers and consumers address the most common security shortcomings. OWASP believes it's not just about the device, or the network, or the client. There are many disparate components involved and securing the IoT will require a holistic approach. A 2014 survey conducted by the SANS Institute found the majority of the cybersecurity community is already familiar with the security issues around the IoT. 78 percent of InfoSec professionals were unsure about their capabilities for basic visibility and management of these devices, or stated they lacked the capability to secure them. 46 percent do not feel they have a policy in place that could drive the necessary level of visibility and management of IoT devices. As the report author wrote, "you need visibility in order to know what you need to protect and how to protect it."3 As the IoT grows exponentially, the ability to monitor and secure these devices lags far behind and, in many cases, is completely non-existent. Cyber criminals have been quick to leverage these shortcomings to surreptitiously steal data and information, spread malware, create botnets, launch denial of service attacks, commit industrial sabotage and infiltrate public and private networks. The Internet of Insecure Things: Example Devices Hackable thermostats Vulnerable burglar alarms Flawed IP cameras Hijacked UAVs/drones Insecure Smart TVs Limited-security fitness tracking devices Rooted wearable tech Vulnerable medical devices Critically flawed automobiles Spoofable aircraft controls Hackable smart meters Remotely accessible heating/cooling systems Critically flawed industrial automation devices 1 ABIresearch press release, The Internet of Things Will Drive Wireless Connected Devices to 40.9 Billion in 2020, 20 August 2014 2 John Pescatore, SANS Institute, Securing the "Internet of Things" Survey, January 2014 3 See supra, note 2 12 The Internet of Insecure Things: The VoCore Embedded AP Case Study The VoCore is a low cost micro computer best known for its diminutive size.At merely 25 x 25mm, it can serve as a low cost method of Internet enabling almost any IoT device imaginable. The VoCore is an Indiegogo funded project and can be easily acquired online or assembled or as a DIY kit today. Out of the box, the VoCore acts as an easy-to-use, transparent wireless bridge. Simply plug this tiny device into your wired network and, by default, it will immediately start broadcasting an open wireless network. Once a wireless client connects to the VoCore wireless access point, the wireless client will obtain an IP address directly from the wired network the VoCore is plugged into. What’s even scarier about this device is because it acts as a “transparent bridge” it is virtually undetectable on the wired side of the network. It doesn’t get an IP address on the wired or wireless side, making it invisible and not accessible to detect or configure once plugged into the wire. In addition, the wireless chipset on this device supports packet injection and can easily be modified to attack wireless networks or clients and run Evil AP attacks. Popularity: While not yet commonly used (to our knowledge), the VoCore’s Indiegogo funding helped it to become well known in theory, if not yet in practice. With its ease of use, low cost and low physical profile, it is likely that the VoCore will be seen on a more consistent basis in the near future. Simplicity: The VoCore is extraordinarily easy to acquire and use. While DIY kits are available, for slightly more money a fully assembled unit can be purchased and deployed with extreme ease. Impact: The VoCore is the kind of device that can cause substantial damage in the hands of both experienced or inexperienced users.With some knowledge of how to properly take advantage of its full capabilities, the VoCore can be used to compromise an entire network. Even an inexperienced user, however, could leave a sizeable security hole in a network’s defenses by simply plugging the device into an Ethernet jack. For more details about our assessment of the VoCore device: https://www.pwnieexpress.com/rogue-device-spotlight-vocore/ 13 The Internet of Insecure Things: Vulnerable IoT in the Wild Below are just a few examples of real-world security breaches caused by vulnerable IoT devices: http://www.infoworld.com/article/2613909/hacking/researcher-hijacks-insecure-embedded-devices-en-masse-forinternet-census.html http://blog.trendmicro.com/security-flaw-at-thousands-of-gas-stations-shows-risks-for-internet-of-everything/ https://nakedsecurity.sophos.com/2012/12/12/samsung-tv-vulnerability/ http://www.computerworld.com/article/2496537/security0/wireless-ip-cameras-open-to-hijacking-over-the-internet-researchers-say.html http://www.wsj.com/articles/SB126102247889095011 http://www.wired.com/2014/08/wireless-car-hack/ http://arstechnica.com/security/2010/08/cars-hacked-through-wireless-tyre-sensors/ http://www.wired.com/2014/04/traffic-lights-hacking/ Additional References https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project#tab=OWASP_Internet_of_Things_ Top_10_for_2014 http://resources.infosecinstitute.com/internet-things-much-exposed-cyber-threats/ http://www.wired.com/2012/12/darpa-drones/ http://www.forbes.com/sites/larrymagid/2014/07/31/safety-security-and-privacy-risks-of-fitness-tracking-andquantified-self/ http://www.computerworld.com/article/2881545/security-privacy-gaps-put-us-drivers-at-risk.html http://www.bbc.com/news/technology-22608085 http://searchconsumerization.techtarget.com/news/2240242717/IoT-technologies-emerge-to-manage-connecteddevice-deluge 14 Plug-and-Play Cyber Espionage: The commoditization of malicious hardware “Over the past several years I've witnessed first-hand how malicious devices have become easier to acquire and deploy. Today, there are several choices using off-the-shelf hardware and software that make it much easier to pull off attacks such as keystroke logging, MiTM devices which have a physical presence, and persistent hardware backdoors”. Paul Asadoorian, Founder and CEO, Security Weekly Plug-and-play "Evil Access Points" and malicious drop boxes were just the beginning. Over the past 10 years, the weaponization of IoT has resulted in a plethora of low cost, commercially available malicious hardware devices, including: Purpose built, application specific devices designed to capture passwords, credit and debit card numbers, PINs, keystrokes and confidential or proprietary data; Devices designed to breach WiFi networks, wireless access points, wireless/mobile client devices and Bluetooth devices; Devices that compromise the security of cellular networks, cell towers, base stations, cellular and mobile devices, SMS and text messaging services and pagers; Devices designed to attack other commonly used RF technologies, such as RFID and NFC, Zigbee, Z-wave, GPS, satellite, Wm-bus, Dash7 and 6LoWPAN; Compromised, counterfeit, modified or backdoored hardware components; Standalone, purpose built, covert remote access hardware, aka “drop boxes”; Devices designed to surreptitiously monitor and/or record video, audio, photographic or location tracking data; and Devices used to compromise the security of Industrial Control Systems (ICS/SCADA environments) and critical infrastructure systems. In the past, attacks of this caliber required highly specialized, expensive equipment and a deep level of technical expertise. Today the proliferation of plug-and-play hacking devices has made many of these attacks easier than setting up a home router. These malicious hardware devices now come in a variety of portable, stealthy form factors, and some can be purchased online for as little as $10. 15 In a Financial News article about tools used for cyber espionage, Stuart Poole-Robb of the London-based business intelligence and cyber security firm KCS Group said, "The wide range of devices made purely for computer hacking is evidence of the increasing sophistication of the attacks and the degree of forward planning that goes into them.”4 In 2014 security expert Brian Krebs detailed in a blog post how a group of thieves ran a multi-million dollar fraud ring that involved installing Bluetooth enabled wireless gas pump skimmers at filling stations throughout the southern United States. The rogue Bluetooth skimming devices used in the attack took just minutes to install and netted more than $2.1 million for the criminals involved.5 Once deployed, malicious hardware devices can operate for weeks, months or even years without detection, remotely controlled by covert channels, WiFi, Bluetooth, 4G/LTE cellular and sometimes even text messages. Powered by AC, USB, PoE or battery packs, many of these devices are small enough to hide almost anywhere. In the wild, they’ve been spotted under desks, behind baseboards and wall jacks, and inside desk phones, power strips, Ethernet couplers, UAVs/drones and even custom 3D-printed enclosures. By operating at the lowest layer of the network stack, the physical layer, malicious hardware can compromise all other layers of defense. Today’s malicious hardware can circumvent all operating system and application layer security controls, Network Access Controls (NAC), switch port security, domain authentication, network and wireless IPS, application aware firewalls, high security wireless deployments, and even HTTPS/SSL encryption. 4 Financial News, Five top cyber espionage devices, September 12, 2014 5 KrebsonSecurity blog, Gang Rigged Pumps with Bluetooth Skimmers, January 22, 2014 Plug-and-Play Cyber Espionage: Example Devices Evil Twins: Unauthorized/rogue wireless AP using the same network name (i.e., SSID) as the corporate wireless network name; Evil APs: An Evil AP cycles through wireless clients' probe requests for open networks to trick them into connecting to the attacker’s wireless Access Point; HAK5 WiFi Pineapple: A plug-and-play Evil Access Point designed to hijack and compromise wireless clients; Keygrabber WiFi: A stealthy USB device used to capture keystrokes from the keyboard of a target computer. Uses WiFi to upload keystrokes to an attacker over the Internet; MiniPwner: Hacking and pentesting drop box used to gain backdoor remote access to a target network; 16 Pwn Phone/Pad: Mobile pentesting platform for an Android-based phone or tablet. An unauthorized Pwn Phone/Pad in the hands of a rogue actor can be used as a malicious attack device.*; Pwn Plug: Plug-and-play, portable pentesting platform. An unauthorized Pwn Plug in the hands of a rogue actor can be used as a malicious drop box.* Kali NetHunter phones: Mobile pentesting platform for Android-based mobile devices; ANTCOR WiFi Network Unlocker: Automated one-click wireless encryption cracking and bridging device supporting WEP, WPA and custom password dictionary attacks; Kali supported covert hardware: Stealthy, small form factor single board computers running a Linux distribution designed for hacking and pentesting; * While Pwnie Express devices are marketed to InfoSec professionals and licensed for authorized uses only, Pwnie Express acknowledges that even its own products can be misused in a malicious or unauthorized manner by a rogue actor. Plug-and-Play Cyber Espionage: Wireless KeyGrabber Case Study Created by KeeLog, the KeyGrabber product line includes no less than six distinct types of devices designed for the express purpose of capturing, storing and reporting intercepted keystrokes from a locally connected keyboard. Each one is intended for a slightly different deployment, from a bare PCB the user needs to solder into the keyboard to “nano” sized units that easily slip between the computer and keyboard. KeeLog even offers an open source DIY keylogger that anyone can build around an Atmel microcontroller. KeeLog’s top of the line product is the KeyGrabber Wi-Fi Premium, an Internet connected keylogger which allows for device configuration and data retrieval over the local network or Internet. Once a KeyGrabber Wi-Fi Premium is deployed, it could be left operational on-site indefinitely. Popularity: The KeyGrabber is a series of devices, all of which are designed for commercial use in addition to their use for other, maybe more questionable purposes. Simplicity: The KeyGrabber stands alone in incredible ease of use. The device is sold commercially as a way of tracking children’s online whereabouts and employee productivity, so it is designed for the most inexperienced user. With a DIY kit and multiple models, the tool is also easily accessible. Impact: The impact of a KeyGrabber is entirely a function of what is typed. While most organizations cannot be taken down by the contents of an employee’s daily email, a few stolen username/password combinations could prove disastrous to the organization. For more details about our assessment of the Wireless KeyGrabber device: https://www.pwnieexpress.com/rogue-device-spotlight-wireless-keygrabber/ 17 Plug-and-Play Cyber Espionage: Malicious Hardware in the Wild In addition to the example devices noted above, malicious use of the following hardware devices has been either publicly demonstrated or referenced as an attack vector in real-world security breaches: Rogue cellular base stations cell jammers IMSI catchers GSM encryption cracking hardware HackRF/BladeRF/USRP/Realtek SDR SMS/pager message decoders RFID cloners (Proxmark, Prox Pik) Long-range RFID sniffers Zigbee hacking tools (Kisbee, Killerbee, goodFET) HackRF/BladeRF/USRP/Realtek SDR GPS redirection devices physical security/alarm system hacking devices WiFi Robin Auto-Hacking Router Reaver Pro II r00tabaga MultiPwner Ubertooth Keysweeper Backdoored Cisco hardware Rakshasa hardware backdoor Power Pwn Demyo Power Strip Pentester's Dreamplug Raspberry Pi Power Strip The 3D-printed web enabled power strip Poor man's Power Pwn DARPA F-Bomb Covert micro-hardware (Mouse-Box, Electric Imp, etc.) WiFi/Bluetooth/GSM enabled payment card skimmers HAK5 Rubber Ducky The Glitch SerialGhost KeyGrabber MultiLogger Throwing Star LAN Tap trojan mouse malicious USB devices HAK5 USB switchblade/hacksaw Hidden/spy cameras hidden microphones malicious drones/UAVs GSM bugs GPS tracking devices The NSA Playset Wireless ICS/SCADA attack devices RF decoders, replayers, sniffers, and RF jammers Additional References http://www.csoonline.com/article/2684064/mobile-security/rogue-cell-towers-discovered-in-washington-dc.html http://www.engadget.com/2010/01/15/3g-gsm-encryption-cracked-in-less-than-two-hours/ https://www.yahoo.com/tech/a-florida-resident-drove-around-with-a-cellphone-jammer-84369099229.html http://www.irongeek.com/i.php?page=security/plug-and-prey-malicious-usb-devices http://www.securityfocus.com/news/8835 18 Mitigating the IoET Threat: A Call to Action The IoET represents an emerging threat vector that will only grow as adoption of connected devices continues to surge across the globe. Cyber criminals are more determined than ever to infiltrate military, government and business networks, and high risk hardware has become a significant means of furthering these intrusions. The Internet of Evil Things: A Rapidly Emerging Threat Vector report is only a first step in an effort to identify, define, classify and defend against the high risk hardware devices that fall within this threat vector. We ultimately hope to provide an industry standard framework that InfoSec professionals can leverage to monitor, detect and respond to hardware device threats affecting their business critical infrastructure. But we know this is easier said than done. While Pwnie Express will continue to work toward a comprehensive solution, combating the IoET cannot and should not be a single company initiative. We call upon security professionals to help us: 1. dentify and catalog all known IoET devices in a referenceable public database; 2. Formalize an industry standard taxonomy and classification system for IoET devices, including a risk rating methodology; 3. Assess the scope, prevalence and impact of IoET devices in real-world network environments. "A well-researched and thoughtful piece; of high utility to security professionals. The examples are particularly poignant reinforcements to the threats outlined in the report."ng." Ed Adams, President and CEO of Security Innovation Join the IoET SWAT Team Help Pwnie Express mitigate the global threat of the IoET. We invite InfoSec professionals, industry experts and security conscious organizations to contribute to this effort. Please reach out to us via email: [email protected] or get involved by signing up at: www.internetofevilthings.com 19 About Pwnie Express Pwnie Express, the world leader in remote security assessment, enables organizations to detect and deter attacks in wireless environments and remote locations by mitigating the growing attack surface created by expanding wireless environments and the emerging threat vector from the IoT. Pwnie Express provides continuous visibility throughout the wired/wireless/RF spectrum, across all physical locations including remote sites and branch offices, detecting “known-bad”, unauthorized, vulnerable, and suspicious devices. Thousands of organizations worldwide rely on Pwnie products for unprecedented insight into their distributed network infrastructures. The award-winning products are backed by the expertise of Pwnie Express Labs, the company's security research arm. Pwnie Express is headquartered in Boston, Massachusetts. About the Authors This report authored by: Dave Porcello, Founder & CTO, Pwnie Express Dave founded Pwnie Express in 2010 with the clear vision of providing unparalleled hardware and expertise in network security to safeguard enterprises across sectors, enabling them to conduct business from anywhere while mitigating risk. An accomplished entrepreneur with more than 12 years experience in security, Dave served as IT Director for Technology Infrastructure at The School for Field Studies, leading six international field stations. Dave also held a Director of Security position at Vermont Mutual Insurance. Dave draws on his security, business and leadership background to provide the vision for Pwnie Express’s evolving product line. Rick Farina, Director of Research and Development, Pwnie Labs Rick, the lead developer of Pentoo Linux, has dedicated the last 15 years of his life to security research on all kinds of wireless technologies. In addition to eight years specializing in WiFi technologies at AirTight, Rick has spoken at numerous Wireless and Security Conferences as well as hosting both free and paid training classes to share his experience with the community. Rick is the current Director of Research and Development at Pwnie Labs, where his experience and knowledge are leading Pwnie Labs to the forefront of industry research. 20
© Copyright 2025