SlideShare a Scribd company logo
1 of 29
“The Insecurity of Industrial Things”
ICS Cyber Security Conference
© 2016 Senrio Inc
1
http://senr.io
Twitter: @xipitersec
The Insecurity of
Industrial Things
Stephen A. Ridley (CTO, Senrio Inc)
Jamison Utter (VP, Senrio Inc)
“The Insecurity of Industrial Things”
ICS Cyber Security Conference
© 2016 Senrio Inc
We hate to break it to you…
“…but OT is IT, and ICS is ‘IoT’”
“The Insecurity of Industrial Things”
ICS Cyber Security Conference
© 2016 Senrio Inc
Before we explain this:
it helps if we give you our
background…
Senrio’s Unique Perspective
• Stephen A. Ridley, Founder
and CEO
- Background in Defense &
Intelligence as vulnerability
researcher
- Senior Security Architect at
McAfee
- Chief Information Security
Officer at major financial
services firm
- Co-authored Android Hacker’s
Handbook
- Founder and Senior
Researcher at Xipiter,
providing services and training
to Fortune 500 and
government clients
Extensive Security and Embedded Device Expertise
Stephen Ridley co-
authored the Android
Hackers’ handbook
Sold out trainings at Black Hat for the last five years; private
trainings for government, military, and private industry clients
• In last few years, spoken
(and taught) about device
security on every continent
except Antarctica
• Keynoted major information
security conferences.
Senrio’s Unique Perspective
• Have created and sold thousands of
unique hardware-based security
research tools: http://www.int3.cc
• Original research turned into
industry’s leading training on
mobile/device security:
- http://armexploitation.com
- Software Exploitation Via Hardware
Exploitation
- http://Automation-Exploitation.com
• As a services company served
Fortune 500 brands in ICS,
Medtech, Retail, embedded
systems as well as government
agencies
At the Forefront of Embedded Device Security Research
Developed customer tools; Shikra named one of the best
embedded security research tools by Rapid 7
Senrio included in Gartner Market Guide on OT Security
and rated “Transformer” by Current Analysis
“The market needs a comprehensive answer to the IoT dilemma but today there
are few solutions to this challenge. Senrio offers a much-needed new approach,”
Christina Richmond, Program Director, Security Services, IDC.
IoT Home Controller
• Summer Project for Interns: $200 each
to purchase IoT devices online
• Smart smoke alarm, used ATM,
webcam, smart home controller, smart
thermostat, NAS, smart wall outlet,
game console, point-of-sales system,
Android tablet, etc
• Vera Lite Home Controller by Mi Casa
Verde
• Trivial to compromise < 2 weeks by an
intern
• Discovered vulnerabilities that would
allow an attacker to retrieve the ssh
private keys used to accessing the
manufacturer’s backend by
downloading the firmware from the
manufacturer’s website
Mi Casa Verde VeraLite Home Controller, $99 on
Amazon
As Safe as Leaving Your Key under the Doormat
Remote Power Management Unit
• Originally published by Christian Science
Monitor on May 18: NetBooter NP-02B
made by SynAccess Networks
• Senrio found hidden functionality that lets
attackers reset passwords, revert to
default settings and lock administrators
out
• Exotic hardware and firmware no longer
keeps manufacturers safe
• Sensitive placement leads to unforeseen
consequences: ability to remotely turn off
servers, signage or critical systems
• Inexpensive/low value device deployed in
high-impact use cases
WiFi Camera
• Discovered and exploited a remote code execution vulnerability in the latest
firmware of the D-Link DCS-930L Network Cloud Camera.
• The result of a stack overflow in a service that processes remote commands
• The vulnerable function copies data from an incoming string to a stack
buffer, overwriting the return address of the function.
• This vulnerability can be exploited with a single command which contains
custom assembly code and a string crafted to exercise the overflow.
• Affects more than one model: code re-uses means vulnerability reuse
• More on our blog and articles via ThreatPost, Security Week, and Network
World.
“The Insecurity of Industrial Things”
ICS Cyber Security Conference
© 2016 Senrio Inc
We hate to break it to you…
ICS is IoT!
What is the “Internet Of Things?!”
A new breed of miniature computers that, in contrast to a PC or server,
have a single-purpose operating system communicating with other
devices and/or the Internet
= Networked Embedded Device
ICS is IoT!
Embedded devices have been around for decades
What’s new is the unprecedented connectivity & ubiquity
Gimmicks, hype and hyperbole Pragmatic business needs and
financial rationale
Consumer IoT Enterprise IoT
New Wireless Tech & Cheap
SoCs Drive Adoption
Cheaper Connectivity!
Legacy Systems Get Connected to IP-based/ Ethernet Networks
Programmable Logic
Controllers (PLCs)
Connected Manufacturing Floor
Communication via Ethernet Everywhere!
Traffic Control in the Cloud
Seriously, everything has an RJ45 Jack Now
Industry choosing SoCs over ASICs
The root-cause for why “ICS is IoT”!
ASIC SoC
$$$ $
Moving from ASICs to SoCs
ASIC
• “Application Specific Integrated
Circuit”
Custom Chips
• Developed specifically for a task
• Expensive!
• Based on “baked in logic”
• Simple “mask ROMs”
• No need for “firmware”.
• Generally use “read-only” solid
state storage
SoCs (and FPGAs)
• “System On Chip”
General purpose Chips
• Requires software (aka
firmware) to make them specific
to business case.
• Generally use read/write solid
state storage for firmware.
• Firmware is generally:
• Real-Time Operating System
(RTOS)
• Embedded OS
• “bare metal code”
The root-cause for why “ICS is IoT”!
SoCs require firmware!
ROM (Read Only
Memory)
• PROM was a one-time Programmable
ROM, which made testing firmware
dramatically faster and easier
• PROM was susceptible to losing data
over time or when exposed to UV light
• EPROM took advantage of this by putting
a window over the die to allow erasing
ROM begat PROM, and PROM, EPROM.
Quick refresher on Solid State Storage…
SoCs require firmware!
Quick refresher on Solid State Storage…
SoCs store their
business logic in
read/writeable
FLASH as “firmware”
…and, EPROM led to EEPROM
• Electronically Erasable PROMs could be erased
without UV light
• However, the entire EEPROM must be erased
before writing
• By combining several small EEPROMS on one
chip in ‘banks’, Toshiba invented FLASH
• Now most devices use FLASH which is where
Firmware is stored for IoT and ICS!
Most Popular SoCs are ARM!
PLC
• There is one in your
cellphone!
• Set-top boxes
• ATMs and Payment systems
• PLCs and HMIs
• Raspberry Pis!
• everywhere!
Point Of
Sale
Most Popular SoCs are ARM!
ATMega
used in
Arduinos!
STM32
used in
IoT
• IoT and ICS use the same
SoCs/hardware
• IoT and ICS use the same
kinds of software/firmware
• IoT and ICS use the same
communications protocols
• PLCs even use the same
embedded webservers and
FTP daemons!
“The Insecurity of Industrial Things”
ICS Cyber Security Conference
© 2016 Senrio Inc
So ICS devices and IoT use the same
tech!
“The Insecurity of Industrial Things”
ICS Cyber Security Conference
© 2016 Senrio Inc
So now, “software guys” can trivially
hack hardware!
Attack Vectors
• Bad code can
affect entire
product line
• Firmware
extracted via
hardware
• Simple
vulnerabilities in
hardware/firmwar
e can propagate
all the way up to
exploit desktops
and HMI systems
Traditional
Attack vector
New IoT Attack
Vector
Malware, code
injection, shell script
Compromised firmware,
reconfiguration, misuse
©2016 Senrio LLC
Primitive thinking for Evolutionary Issues
Firewalls, Border Controls, Air
Gaps
Boundless Networking
Anti-Virus, Signature Detection Cognitive Security
Passing the Problem
Prevention Detection and Response
Owning our own Security
SW/HW Uncanny Valley
Originally conceived of by Japanese roboticist Masahiro
Mori in 1970 to explain the psychological reaction to
anthropomorphic robots or other humanoid figures.
• General feeling of
unease when
leaving the
comfort zone of
the own domain
• Industry building a
house of cards
• HCCEmbedded:
third party
vulnerability in
firmware
Obscurity No More
• STUXNET changed the game for Industrial
Control - spreads via USB sticks
• Cost of high capital bypassed by finding
universal vulnerabilities in supply chain or
weaponizing cheaper equipment
• Increased research focus on Industrial Control
Systems:
- SCADA exploit modules within the Metasploit
framework increased from 7 before Stuxnet to 57
- 0day vulnerabilities for sale: 22 modules exploiting
11 zero-day vulnerabilities.
• Shodan puts ICS devices at your fingertips:
- Traditional search engines like Google index the
web content intended for user consumption
- Shodan indexes headers which are intended for
machine-to-machine communication
- Finding targets for a publicly available exploits is
akin to searching Google for the nearest Kinko’s
Industrial Control IS a Target
Going Dark Not An Option
• Isolating or “air gapping” critical
systems from the Internet is a fallacy
in the 21st century
- Isolated networks can get infected
intentionally (worms like Stuxnet)
- Insider threat
- Unintentional compromise by
connecting an infected computer
during service or maintenance of the
system.
• Need for connectivity and greater
insight is driving the smart grid effort
Dealing With the Realities of a Connected Future
Solving for a New Threat Model
Traditional Threat
Model:
• Code injection
• Malware
• Device compromise
IoT Threat Model
• Malicious
reconfiguration
(safety/reliability)
• Pivot to high value
networks
• Reroute traffic, use
data streams
• DDoS and botnets
Why Traditional Security
does not Work for IoT:
• No homogeneity
• Size/weight constrains
• No user interaction
• Difficult to detect breach
• No on-device memory
• Signature-based systems
not scalable
• Exploits not detected by
traditional methods
• Inside-out does not work
• Air-gapping is not 100%
secure
• Firewalls and IDS cause
downtime and don’t alert
on the right things
Leverage Unique IoT Behavior for Protection
Using IoT
Characteristics for
Protection
• Predictable
behavior
• Dedicated
functionality
• IP connectivity
http://senr.io
Twitter: @xipitersec
ICS is IoT, IT is OT, and
all of these are the
“Digital Society”
Stephen A. Ridley (CTO, Senrio Inc)
Jamison Utter (VP, Senrio Inc)

More Related Content

What's hot

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Burton Lee
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityPriyanka Aash
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...CODE BLUE
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesCharalampos Doukas
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)HITCON GIRLS
 
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...JamieWilliams130
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...YouAttestSlideshare
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsDaniel Miessler
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetNathan Wallace, PhD, PE
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...REVULN
 
Gavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune SystemGavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune Systemcentralohioissa
 
The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016William Slater III
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015Hildebrand Technology
 
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018Mender.io
 
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks  Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks Dragos, Inc.
 

What's hot (20)

IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
The IoT Attack Surface
The IoT Attack SurfaceThe IoT Attack Surface
The IoT Attack Surface
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
 
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the Internet
 
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...
 
Gavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune SystemGavin Hill - Lessons From the Human Immune System
Gavin Hill - Lessons From the Human Immune System
 
The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016The Mirai Botnet and Massive DDoS Attacks of October 2016
The Mirai Botnet and Massive DDoS Attacks of October 2016
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
Linux IOT Botnet Wars and the Lack of Basic Security Hardening - OSCON 2018
 
Forrester zero trust_dna
 Forrester zero trust_dna Forrester zero trust_dna
Forrester zero trust_dna
 
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks  Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
 

Similar to The Insecurity of Industrial Things

IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)Rui Miguel Feio
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Mirco Vanini
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practiceteam-WIBU
 
Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Marco Dal Pino
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture Symantec
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerProduct of Things
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!Justin Black
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cCharles Li
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiativeAlexander Hirner
 
Cyber warfare update 2016
Cyber warfare update 2016 Cyber warfare update 2016
Cyber warfare update 2016 Kevin Murphy
 

Similar to The Insecurity of Industrial Things (20)

IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)
 
pptt.pptx
pptt.pptxpptt.pptx
pptt.pptx
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
IoT security
IoT securityIoT security
IoT security
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
 
Cyber warfare update 2016
Cyber warfare update 2016 Cyber warfare update 2016
Cyber warfare update 2016
 

Recently uploaded

Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...ranjana rawat
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...Pooja Nehwal
 
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...Call Girls in Nagpur High Profile
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...anilsa9823
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...Pooja Nehwal
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...amitlee9823
 
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Naicy mandal
 
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Pooja Nehwal
 
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...motiram463
 
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...tanu pandey
 
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...Pooja Nehwal
 
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsDeira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsEscorts Call Girls
 
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai GapedCall Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gapedkojalkojal131
 
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Pooja Nehwal
 

Recently uploaded (20)

Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
Book Paid Lohegaon Call Girls Pune 8250192130Low Budget Full Independent High...
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
 
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
 
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
Lucknow 💋 Call Girls Adil Nagar | ₹,9500 Pay Cash 8923113531 Free Home Delive...
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
 
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
 
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
Makarba ( Call Girls ) Ahmedabad ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Rea...
 
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
Kalyan callg Girls, { 07738631006 } || Call Girl In Kalyan Women Seeking Men ...
 
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
 
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...Shikrapur Call Girls Most Awaited Fun  6297143586 High Profiles young Beautie...
Shikrapur Call Girls Most Awaited Fun 6297143586 High Profiles young Beautie...
 
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
 
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...High Profile Call Girls In Andheri 7738631006 Call girls in mumbai  Mumbai ...
High Profile Call Girls In Andheri 7738631006 Call girls in mumbai Mumbai ...
 
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Arekere ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsDeira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
 
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
🔝 9953056974🔝 Delhi Call Girls in Ajmeri Gate
 
@Delhi ! CAll GIRLS IN Defence Colony 🦋 9999965857 🤩 Dwarka Call Girls
@Delhi ! CAll GIRLS IN Defence Colony 🦋 9999965857 🤩 Dwarka Call Girls@Delhi ! CAll GIRLS IN Defence Colony 🦋 9999965857 🤩 Dwarka Call Girls
@Delhi ! CAll GIRLS IN Defence Colony 🦋 9999965857 🤩 Dwarka Call Girls
 
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai GapedCall Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
Call Girls Dubai Slut Wife O525547819 Call Girls Dubai Gaped
 
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
Call Girls in Thane 9892124323, Vashi cAll girls Serivces Juhu Escorts, powai...
 

The Insecurity of Industrial Things

  • 1. “The Insecurity of Industrial Things” ICS Cyber Security Conference © 2016 Senrio Inc 1
  • 2. http://senr.io Twitter: @xipitersec The Insecurity of Industrial Things Stephen A. Ridley (CTO, Senrio Inc) Jamison Utter (VP, Senrio Inc)
  • 3. “The Insecurity of Industrial Things” ICS Cyber Security Conference © 2016 Senrio Inc We hate to break it to you… “…but OT is IT, and ICS is ‘IoT’”
  • 4. “The Insecurity of Industrial Things” ICS Cyber Security Conference © 2016 Senrio Inc Before we explain this: it helps if we give you our background…
  • 5. Senrio’s Unique Perspective • Stephen A. Ridley, Founder and CEO - Background in Defense & Intelligence as vulnerability researcher - Senior Security Architect at McAfee - Chief Information Security Officer at major financial services firm - Co-authored Android Hacker’s Handbook - Founder and Senior Researcher at Xipiter, providing services and training to Fortune 500 and government clients Extensive Security and Embedded Device Expertise Stephen Ridley co- authored the Android Hackers’ handbook Sold out trainings at Black Hat for the last five years; private trainings for government, military, and private industry clients • In last few years, spoken (and taught) about device security on every continent except Antarctica • Keynoted major information security conferences.
  • 6. Senrio’s Unique Perspective • Have created and sold thousands of unique hardware-based security research tools: http://www.int3.cc • Original research turned into industry’s leading training on mobile/device security: - http://armexploitation.com - Software Exploitation Via Hardware Exploitation - http://Automation-Exploitation.com • As a services company served Fortune 500 brands in ICS, Medtech, Retail, embedded systems as well as government agencies At the Forefront of Embedded Device Security Research Developed customer tools; Shikra named one of the best embedded security research tools by Rapid 7 Senrio included in Gartner Market Guide on OT Security and rated “Transformer” by Current Analysis “The market needs a comprehensive answer to the IoT dilemma but today there are few solutions to this challenge. Senrio offers a much-needed new approach,” Christina Richmond, Program Director, Security Services, IDC.
  • 7. IoT Home Controller • Summer Project for Interns: $200 each to purchase IoT devices online • Smart smoke alarm, used ATM, webcam, smart home controller, smart thermostat, NAS, smart wall outlet, game console, point-of-sales system, Android tablet, etc • Vera Lite Home Controller by Mi Casa Verde • Trivial to compromise < 2 weeks by an intern • Discovered vulnerabilities that would allow an attacker to retrieve the ssh private keys used to accessing the manufacturer’s backend by downloading the firmware from the manufacturer’s website Mi Casa Verde VeraLite Home Controller, $99 on Amazon As Safe as Leaving Your Key under the Doormat
  • 8. Remote Power Management Unit • Originally published by Christian Science Monitor on May 18: NetBooter NP-02B made by SynAccess Networks • Senrio found hidden functionality that lets attackers reset passwords, revert to default settings and lock administrators out • Exotic hardware and firmware no longer keeps manufacturers safe • Sensitive placement leads to unforeseen consequences: ability to remotely turn off servers, signage or critical systems • Inexpensive/low value device deployed in high-impact use cases
  • 9. WiFi Camera • Discovered and exploited a remote code execution vulnerability in the latest firmware of the D-Link DCS-930L Network Cloud Camera. • The result of a stack overflow in a service that processes remote commands • The vulnerable function copies data from an incoming string to a stack buffer, overwriting the return address of the function. • This vulnerability can be exploited with a single command which contains custom assembly code and a string crafted to exercise the overflow. • Affects more than one model: code re-uses means vulnerability reuse • More on our blog and articles via ThreatPost, Security Week, and Network World.
  • 10. “The Insecurity of Industrial Things” ICS Cyber Security Conference © 2016 Senrio Inc We hate to break it to you… ICS is IoT!
  • 11. What is the “Internet Of Things?!” A new breed of miniature computers that, in contrast to a PC or server, have a single-purpose operating system communicating with other devices and/or the Internet = Networked Embedded Device ICS is IoT! Embedded devices have been around for decades What’s new is the unprecedented connectivity & ubiquity Gimmicks, hype and hyperbole Pragmatic business needs and financial rationale Consumer IoT Enterprise IoT New Wireless Tech & Cheap SoCs Drive Adoption
  • 12. Cheaper Connectivity! Legacy Systems Get Connected to IP-based/ Ethernet Networks Programmable Logic Controllers (PLCs)
  • 14. Traffic Control in the Cloud Seriously, everything has an RJ45 Jack Now
  • 15. Industry choosing SoCs over ASICs The root-cause for why “ICS is IoT”! ASIC SoC $$$ $
  • 16. Moving from ASICs to SoCs ASIC • “Application Specific Integrated Circuit” Custom Chips • Developed specifically for a task • Expensive! • Based on “baked in logic” • Simple “mask ROMs” • No need for “firmware”. • Generally use “read-only” solid state storage SoCs (and FPGAs) • “System On Chip” General purpose Chips • Requires software (aka firmware) to make them specific to business case. • Generally use read/write solid state storage for firmware. • Firmware is generally: • Real-Time Operating System (RTOS) • Embedded OS • “bare metal code” The root-cause for why “ICS is IoT”!
  • 17. SoCs require firmware! ROM (Read Only Memory) • PROM was a one-time Programmable ROM, which made testing firmware dramatically faster and easier • PROM was susceptible to losing data over time or when exposed to UV light • EPROM took advantage of this by putting a window over the die to allow erasing ROM begat PROM, and PROM, EPROM. Quick refresher on Solid State Storage…
  • 18. SoCs require firmware! Quick refresher on Solid State Storage… SoCs store their business logic in read/writeable FLASH as “firmware” …and, EPROM led to EEPROM • Electronically Erasable PROMs could be erased without UV light • However, the entire EEPROM must be erased before writing • By combining several small EEPROMS on one chip in ‘banks’, Toshiba invented FLASH • Now most devices use FLASH which is where Firmware is stored for IoT and ICS!
  • 19. Most Popular SoCs are ARM! PLC • There is one in your cellphone! • Set-top boxes • ATMs and Payment systems • PLCs and HMIs • Raspberry Pis! • everywhere! Point Of Sale
  • 20. Most Popular SoCs are ARM! ATMega used in Arduinos! STM32 used in IoT • IoT and ICS use the same SoCs/hardware • IoT and ICS use the same kinds of software/firmware • IoT and ICS use the same communications protocols • PLCs even use the same embedded webservers and FTP daemons!
  • 21. “The Insecurity of Industrial Things” ICS Cyber Security Conference © 2016 Senrio Inc So ICS devices and IoT use the same tech!
  • 22. “The Insecurity of Industrial Things” ICS Cyber Security Conference © 2016 Senrio Inc So now, “software guys” can trivially hack hardware!
  • 23. Attack Vectors • Bad code can affect entire product line • Firmware extracted via hardware • Simple vulnerabilities in hardware/firmwar e can propagate all the way up to exploit desktops and HMI systems Traditional Attack vector New IoT Attack Vector Malware, code injection, shell script Compromised firmware, reconfiguration, misuse
  • 24. ©2016 Senrio LLC Primitive thinking for Evolutionary Issues Firewalls, Border Controls, Air Gaps Boundless Networking Anti-Virus, Signature Detection Cognitive Security Passing the Problem Prevention Detection and Response Owning our own Security
  • 25. SW/HW Uncanny Valley Originally conceived of by Japanese roboticist Masahiro Mori in 1970 to explain the psychological reaction to anthropomorphic robots or other humanoid figures. • General feeling of unease when leaving the comfort zone of the own domain • Industry building a house of cards • HCCEmbedded: third party vulnerability in firmware
  • 26. Obscurity No More • STUXNET changed the game for Industrial Control - spreads via USB sticks • Cost of high capital bypassed by finding universal vulnerabilities in supply chain or weaponizing cheaper equipment • Increased research focus on Industrial Control Systems: - SCADA exploit modules within the Metasploit framework increased from 7 before Stuxnet to 57 - 0day vulnerabilities for sale: 22 modules exploiting 11 zero-day vulnerabilities. • Shodan puts ICS devices at your fingertips: - Traditional search engines like Google index the web content intended for user consumption - Shodan indexes headers which are intended for machine-to-machine communication - Finding targets for a publicly available exploits is akin to searching Google for the nearest Kinko’s Industrial Control IS a Target
  • 27. Going Dark Not An Option • Isolating or “air gapping” critical systems from the Internet is a fallacy in the 21st century - Isolated networks can get infected intentionally (worms like Stuxnet) - Insider threat - Unintentional compromise by connecting an infected computer during service or maintenance of the system. • Need for connectivity and greater insight is driving the smart grid effort Dealing With the Realities of a Connected Future
  • 28. Solving for a New Threat Model Traditional Threat Model: • Code injection • Malware • Device compromise IoT Threat Model • Malicious reconfiguration (safety/reliability) • Pivot to high value networks • Reroute traffic, use data streams • DDoS and botnets Why Traditional Security does not Work for IoT: • No homogeneity • Size/weight constrains • No user interaction • Difficult to detect breach • No on-device memory • Signature-based systems not scalable • Exploits not detected by traditional methods • Inside-out does not work • Air-gapping is not 100% secure • Firewalls and IDS cause downtime and don’t alert on the right things Leverage Unique IoT Behavior for Protection Using IoT Characteristics for Protection • Predictable behavior • Dedicated functionality • IP connectivity
  • 29. http://senr.io Twitter: @xipitersec ICS is IoT, IT is OT, and all of these are the “Digital Society” Stephen A. Ridley (CTO, Senrio Inc) Jamison Utter (VP, Senrio Inc)