Top Banner
IOT Devices Expanding Your Level of Presence (and Your Digital Risk Footprint)
16

IoT Devices Expanding Your Digital Footprint

Apr 12, 2017

Download

Technology

SurfWatch Labs
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IoT Devices Expanding Your Digital Footprint

IOT Devices Expanding Your Level of Presence (and Your

Digital Risk Footprint)

Page 2: IoT Devices Expanding Your Digital Footprint

Today’s Speakers

Adam MeyerChief Security StrategistSurfWatch Labs

2

Kristi HortonChief Security StrategistGate 15 & Real Estate ISAC

Page 3: IoT Devices Expanding Your Digital Footprint

Understanding the IoT Security Challenge

3

• Network-enabled or "smart" IOT devices are commonplace

• The potential of having numerous devices per building potentially translates into the largest digital footprint that is NOT under proper security management

Page 4: IoT Devices Expanding Your Digital Footprint

Classes of IoT DevicesOperational Technology• Home and Building Automation: Remote

management, smart appliances• Smart Energy: Climate control, smart meters,

smart plugs, smart light bulbs• Security and Safety: Cameras, doors, etc.• Multimedia: Smart TVs, DVRs, voice

automation (i.e. Alexa, Echo, Siri), etc.• Industrial Infrastructure

Information Technology• Mobile Devices: iPads, iPhones, Android phones

and tablets• Wearables: Activity trackers, heart rate, breathing

rate, Smart watches

4

Page 5: IoT Devices Expanding Your Digital Footprint

The Age of the “Smart” Building

5

• The more IoT-enabled devices and the greater the interconnectivity between various building systems, the more detailed and sensitive the data that will be captured.

• According to IDC forecasts, 40 percent of the information in the digital universe requires some level of protection, but only half of that data is protected.

Page 6: IoT Devices Expanding Your Digital Footprint

Your Expanding Digital Footprint

I.e. LED lighting, HVAC and physical security systems, will take the lead as connectivity is driven into higher-volume, lower cost devices

6

I.e. Smart meters and specific industry devices such as manufacturing field devices, process sensors for electrical generating plants and real-time location devices for healthcare

Page 7: IoT Devices Expanding Your Digital Footprint

Trending IoT Targets From the Last Year

7

Page 8: IoT Devices Expanding Your Digital Footprint

IoT Threat Examples

8

Chinese Hacking of US Chamber of Commerce includes IoT Devices - Reported in Dec 2011• Chamber of Commerce thermostat was

communicating with a computer in China• Another time, chamber employees were

surprised to see one of their printers printing in Chinese

Page 9: IoT Devices Expanding Your Digital Footprint

IoT Threat Examples

9

Rise of the IoT Botnets• Proliferation of devices

• DDoS attacks

• Ease of weaponization – ala Mirai, which weaponizes vulnerable IoT devices

Distribution of Mirai Botnet in October attack

Page 10: IoT Devices Expanding Your Digital Footprint

IoT Botnets Driving a Surge in Service Interruption

10

The percent of negative CyberFacts related to “service interruption” surged in the fourth quarter of 2016 due to attacks and concern around Mirai and other IoT-powered botnets.

Page 11: IoT Devices Expanding Your Digital Footprint

Latest IoT Threat

11

Imeij IoT Malware Targets AVTech Devices• ELF_IMEIJ.A, aka Imeij leverages the

RFI exploit• Targets Linux-based ARM devices and

gathers info on the infected device, sends it to a remote server and launches DDoS attacks on demand

• Botnet operators can also clean the device and remove the malware

• 130,000+ AVTech devices currently exposed online

Page 12: IoT Devices Expanding Your Digital Footprint

What’s Next for IoT Threats?

12

The Security Challenge Will Only Increase as More IoT Devices are Used• Many organizations don’t have a good

handle on their level of presence

- DDoS attacks will continue until they become less successful (Cybercriminals follow the path of least resistance and most money)

- Cybercriminals are always looking for new opportunities

• As-a-service attack capabilities for sale on the Dark Web right now

Page 13: IoT Devices Expanding Your Digital Footprint

What You Should Do to Reduce Your Uncontrolled IoT Footprint

13

Designate Clear Ownership and Accountability• Who owns IoT devices?

- Single owner?

- Shared owner via more agile DevOps model?

• Who else should be involved in management of these devices?- IT?

- Security?

- Facilities?

Page 14: IoT Devices Expanding Your Digital Footprint

What You Should Do to Reduce Your Uncontrolled IoT Footprint

14

Define and Enforce IoT Management Policies• Treat “smart” devices (i.e. smart light bulb) as

an IT asset that is networked

• Define and enforce what data needs to be kept secure and the devices that interact, use or store that data

• Segment your network to minimize impact of a breach and for resiliency purposes

- Think about the payload delivery of malware (opportunity) – path of least resistance to achieve a level of presence

- Adversaries gain access in a non-vital zone and pivot into a vital zone

Page 15: IoT Devices Expanding Your Digital Footprint

What You Should Do to Reduce Your Uncontrolled IoT Footprint

15

Things You Can Do Now … So You’re Not Overwhelmed Later• Take stock of your software and devices

• Leverage security solutions that can:

- Monitor network protocols and Internet traffic for threats

- Proactively detect malware at the endpoint

• Stay current and aware of relevant cyber threats within this technology area and ensure you have visibility of risks within your digital supply chain and your business

• Incorporate IoT security risks into your incident response and legal processes

Page 16: IoT Devices Expanding Your Digital Footprint

Q&A and Additional SurfWatch Labs Resources

16

SurfWatch Cyber Advisor:www.surfwatchlabs.com/cyber-advisor

SurfWatch Threat Analyst:www.surfwatchlabs.com/threat-intel

Dark Web Intelligence: www.surfwatchlabs.com/dark-web-intelligence

Personalized SurfWatch Demo:info.surfwatchlabs.com/request-demo

Strategic and Operational Threat Intelligence