The Bot in the Machine. How the Internet of Things Starts to Turn Against Us Johannes B. Ullrich, Ph.D. [email protected] @johullrich 1 About Me • Dean of Research, SANS Technology Ins7tute • Living in Jacksonville FL (aka Southern GA) • SANS Internet Storm Center hEps://isc.sans.edu • Created DShield.org • Instructor for SANS • Past: Physicist, Web Developer 2 ISC Mission • Global Network Security Information Sharing Community • We share fast, ask readers for insight • Expanding diverse sensors for automatic data collection • Built around DShield platform • Raw data available for others to analyze 3 ISC: The big picture 4 ISC Handlers • Currently about 30 volunteer handlers • Located worldwide and working in different industries 5 How to use our data • Threat Intelligence – Diaries – IP Address Feeds – Domain Feeds • Data is free to use for your own network (Creative Commons License) • Share back! 6 Outline • What is “The Internet of Things” and why is it different? • Risks Associated with the IoT • Current Attacks • Strategies to Secure the IoT 7 The “Internet of Things” 8 Home / Small Business 9 Enterprise Networks 10 Municipal/Gov Networks 11 New Protocols: IPv6 • • • • Easier to Scale then IPv4 Auto configuration Extensible Integrated with various Layer 2 options 12 New Protocols: 6LoWPAN / IEEE 802.15.4 • IPv6 over Low power Wireless Personal Area Network • Easier network management • Low Power • Low Hardware Requirements • Security 13 Risks: New Wireless Protocols • IEEE 802.15.4 / 6LoWPAN • AES identified as encryption algorithm • Key Management challenge: Auto configuration / on-boarding at scale • IPSec (IKEv2) may not work due to power constraints 14 Example: LIFX Light Bulbs • Light Bulbs communicate via 6LoWPAN with each other (mesh) • One light bulb acts as router/controller to connect to Wi-Fi (802.11) • Pre-shared AES key hardcoded. Same for all bulbs • 6LoWPAN is used to exchange WiFi credentials (which are now at risk) • Solution: Derive 6LoWPAN key from WiFi Password. 15 Risks: New Attack Platforms • Many devices use customized versions of commodity operating systems (Linux/Windows) • Wide range of architectures, not just x86 • Embedded systems can even be found inside conventional systems 16 Case #1 – Compromised Routers • E-Mail + phone call from ISP in Wyoming – Affects Linksys E1000/1200 – Scanning for Port 80/8080 – Latest firmware not affected – Reset of router clears malware 17 Case #1: Verification • Check DShield Logs: No spike in port 80/8080, but they are always busy 18 Case#1: Honeypot Data Seeing “interesting” requests: GET /HNAP1/ HTTP/1.1! Host: a.b.c.d:8080! ! But nothing else… Something seems to be going on, publishing first “Diary” 19 Case #1: Experiment wget hEp://routerip/HNAP1/ <?xml version="1.0" encoding="utf-8"?> <soap:Envelope xmlns:xsi="http://www.w3.org/…”> <soap:Body> <GetDeviceSettingsResponse ... >! <DeviceName>Cisco40033</DeviceName> <VendorName>Linksys</VendorName> …<ModelName>E4200</ModelName> …! </GetDeviceSettingsResponse> </soap:Body> </soap:Envelope>! 20 Case#1: Honeypot • Setting up a simple Honeypot to simulate router (reply with correct HNAP response) • Scanning routers now send exploit: POST /tmUnblock.cgi HTTP/1.1! Host: [ip of honeypot]:8080! Authorization: Basic YWRtaW46JmkxKkBVJDZ4dmNH! 21 Case 1: The Moon Worm 22 Case#1: Challenges • MIPS Architecture • No common virtual environments available • Most reverse analysis tools are x86 centric • Exploit requires specific firmware versions • NO PATCH?!! 23 Case #2: Compromised DVRs • Security Camera DVRs • Exposed to Internet for remote monitoring 24 Case #2: Exploit • Very simple exploit: default username/password (root/12345) used to telnet • Various binaries copied to DVR – Bitcoin miner – Scanner for Synology Vulnerability – wget / helper tools 25 Case #2: Why Vulnerable? • Simple Password Dialog • Not possible to turn off telnet 26 Case #2: Who Did it? 27 Case #2: Who did it? 28 Case #2: Why Vulnerable? 29 Echo File Transfer echo -ne '\x00\x00\x00\x2f \x00\x00\x00\x1a\x00\x00 \x00\x00\x00\x00\x00\x05\x00\x00\x00\ x00 \x00\x00\x00\x04\x00\x00\x00\x00\x00\ x00 \x00\x31\x00\x00\x00\x00\x00 \x00\x00\x2a\x00\x00\x00\x1b \x00\x00\x00 \x14\x00\x00\x00' >> / var/run/rand0-btcminer-arm && echo -e '\x64\x6f\x6e\x65'! 30 Case #3: Synology Disk Stations Vulnerable web based admin interface Exposed on port 5000 Allows remote code execution Exploited before patch became available • Difficult to patch devices • • • • 31 Case #3: Synology Vulnerability History • CVE-2014-2264: Hardcoded VPN Password • CVE-2013-6955: webman vulnerability allows appending to arbitrary files • CVE-2013-6987: read/write/delete files via directory traversal 32 Case #3: Iowa State Breach • Iowa State stored student data including SSNs on Synology devices • Devices got breached by Bitcoin miner campaign • 5 devices breached • 29,780 SSNs exposed 33 Case #3: Continuation … Synolocker 34 Case #4: Handheld Inventory Scanners 35 Case #4: Targeted Attack • 12 of 40 scanners delivered to a robotics/logistic company came with malware pre-installed • Malware attacked network “from the inside” • Targeting accounting systems • Exfiltrating data • Firmware downloaded from manufacturer site was infected as well 36 Case #4: Malware Details • Scanner runs Windows XP Embedded • Malware only detected due to network monitoring • Not possible to install standard AV or Whitelist tools on scanner 37 Defensive Strategies 38 We need solutions that scale! 39 Network Segmentation • Target: Air Conditioner network not sufficiently segmented, allowed for breach of “business” network. • How many segments can we manage? • Do all devices fit into the same segment? • How do they talk to the rest of the network? 40 Onboarding Devices • Accounting for devices / inventory • Configuring security parameters (passwords, keys) • Establishing baseline configuration • Develop/Procure tools to provision devices at scale securely 41 Patching • How are patches distributed / validated? • Can automatic patching be used? • Centralized patch management solutions? • Inventory/Onboarding first. Needs to integrate with Patching 42 Logging / Monitoring • What logs to collect and how? • Flooded by meaningless logs? • Setup “satellite collectors” that aggregate and pre-filter before sending to central log management system 43 Solution 1: Don’t buy crap • Ask the right questions before purchasing devices: – Onboarding tools? – Logging standards? – Support contracts? 44 Solution 2: Scalable & Repeatable Processes • Take what you learned from your desktop/server environment • Automation! 45 Conclusion • The Internet of Things: It is coming, and makes a lot of sense • And yes, it is already being attacked • Your defenses need to scale. Automate! 46 Thanks! Questions? [email protected] http://isc.sans.edu Daily Updates * Daily Podcast * Data Feeds 47
© Copyright 2024