By Will Lambert, Pre-Post Sales Cyber Security Consultant, ZeroDayLab
The Internet of Things (IoT) is a phenomenon like no other the human race has experienced before. It must be said, the IoT is an impressive feat of engineering. Never before has a civilisation been able to connect to such a high degree of personal devices to an interconnected network. Let's stand back and admire the city we have created. Like all the other great cities in history, it's not without fault.
The city we have build is pushing forward, developing and evolving in ways that even 10 years ago, we would not have thought possible. Not only do we have wearable tech such as our smart watches, glasses and fitness trackers but we are also lucky enough to have Smart TVs, fridges, toasters, juicers, light bulbs, the list goes on. 'When does it stop?', you ask me? Never. It never stops. We all want the latest gadgets and the market is more than willing to provide. 'Supply and demand' is the bricks and mortar that continues to push our city skywards but are we building on fractured foundations?
According to CCS Insight, we can expect to see the number of IoT devices available to rise. Wearable tech alone is expected to rise from 123 million (2016) to a sky-scraping 411 million in 2020, valued at $14 billion. What an empire it will be; but answer me this, should we build this awe-inspiring empire on rock or sand?
Coding is broken. This is a fact known throughout the security industry. We have seen Smart devices being hacked because of insecure coding, the result being that they have been infected with malware. Once infected, they can be hijacked and used as zombies in a Distributed Denial of Service attacks on a massive scale. Last year, we witnessed speeds of up to 620Gps, like Krebsonsecurity.com suffered last year. It was discovered that much of the traffic originated from zombified IoT devices, like IP cameras and Digital Video Recorders.
What speeds will hacked IoT devices reach in the future and what scale of DDoS can we expect to see this year? What about next year? Will we even have dependable internet in 2020, or will we see rolling internet blackouts? The need for the market to produce quality products is more important now. This calls for a change in culture throughout the IoT market. Quality no longer needs to equal 'does it work?' but rather, 'does it work securely?'. When the market is looking to push out their latestSmart device, security vulnerabilities should be addressed how a coding bug would be. The code would have to be stripped back to address security vulnerabilities to ensure that they produce a Smart device that not only works well but is secure.
The market is not on its own in fixing the foundations of our future empire. Hajime was first discovered in October 2016 and appears to be the work of a hacker who has set out to neutralise as many Smart devices as possible. It spreads using Telnet and at first was suspected to be a developing malware that could potentially be used in a DDoS but the attack never came. Hajime is self-replicating and appears to be fighting malicious botnets like Mirai for control of IoT devices. Unlike malicious botnets, Jajime allows the IoT device to continue to work normally, in fact, most of the time you won't know that you have been hit by it! Once a device has been infected with Hajime, it closes ports 23, 7547, 555 and 5358 which are commonly exploted by IoT malware. Once these ports are closed, it contacts a Control and Command (C2) server with the following message;
On a personal note, I think it is wrong to affiliate the term malware to Hajime. Hajime to me is not malware, it is helper software or 'helware' (a new term, I just made it up)! Hajime was not the first helware, Wifatch was discovered in 2014. Again, this was used to secure devices and even left a message asking owners to update the device and change default passwords. Like Hajime, it leaves a signature,
However, some malware out there is there to brick your IoT device which removes the threat of it becoming a zombie but with one small change; you won't be able to use it either. BrickerBot (spread via Telnet) was detected in March 2016 and is designed to logically destroy IoT devices. It damages devices to such a degree it results in a Permanent Denial of Services (PDos). There is an upside though; it can't be used as a zombie anymore...
Let's think about the amount of Personally Identifiable Information (PII) held on Smart devices. How many of you store credit card details on your phone, or have contact information on your watch? What does your fitness tracker say about you? Smart devices usually have GPS, microphones and cameras built-in, they can track what you do, where you go, who you meet with, what your interests are, what you like to buy, amongst any other details of our personal lives that we would prefer not to share publicly. Put away the tin foil hats, my point is this: in the eyes of EU GDPR, should these devices become breached and your PII is available to attackers, who is to blame? Will the suppliers of insecure IoT devices be liable to 4% annual turnover or €20 million fines?
Apple stands alone in the defence of their products. Other vendors allow third party security apps to be installed such as Malwarebytes and Mcaffee. I contacted Apple to ask how they protect their devices from hackers and why they choose to stand alone;
<Customer Service>
<Customer Service>
Will
<Customer Service>
<Customer Service>
Will
<Customer Service>
Will
<Customer Service>
<Customer Service>
Will
<Customer Service>
Will
Will
Some companies are now beginning to realise how important secure coding is, some even use a secure coding assessment as a part of their interview process. However, many are still more concerned with pushing an insecure product to market, to meet the needs of the many, quickly. These needs include browsing your social networking sites which not only shows all of your contacts, interests and hobbies but you can also control your Smart heating and Smart lights via your Smart phone not to mention using it in conjunction with toasters, blenders, fridges, locks, cookers, vacuums, scales, sprinkler systems and mowers. Your Smart watch handles all your messages, emails and contacts while your Smart fitness tracker tells you if you can have a takeaway that night. Having smashed your steps you can order your pizza with a touch and a swipe as you've already been Smart and stored all your banking information on what you assumed was a secure device, that it had been subjected to rigorous testing...Smart right? Companies who rush to push a product to the market fail to see the big picture, they fail to see what can happen to our empire if we continue to build on sand.
"Weinberg's Second Law: If builders built buildings the way programmers wrote programs, then the first woodpecker that came along would destroy civilisation."