All too often, companies building connected devices either ignore security completely, try to bolt it on late in the development cycle, or treat it as a “nice to have” feature.

CIA Exploits of IoT Devices, What Lessons Can We Learn?

Alan Grau | Icon Labs

 

Recent WikiLeak documents allege that the CIA developed, or sought to develop, or even “borrowed”, cyberattack technology that could target a wide range of IoT devices, including smart TVs, connected cars, and mobile phones.  In the case of smart TVs and mobile phones, the attacks allowed these devices to be used to eavesdrop on either voice communication, data communication or both.  

The concepts of using connected devices for gathering intelligence or perpetrating malicious acts is certainly not new, but the scope of activities reported in the WikiLeak documents is startling to some.  However, as someone working on security for IoT devices I didn’t find this particularly surprising.  I certainly don’t have any inside information on the activities of the CIA or other government agencies, but have seen companies make the same mistakes over and over again in building their IoT devices.  

 

Why IoT Devices are Targets

All too often, companies building connected devices either ignore security completely, try to bolt it on late in the development cycle, or treat it as a “nice to have” feature.  The companies viewing security as a critical feature and taking a comprehensive approach to securing their devices and networks are in the minority.  

It is not surprising an organization with the resources of the CIA could develop effective cyberattacks against a wide range of IoT devices.   All too often devices contain easily exploited vulnerabilities that don’t require sophisticated cyber-attacks.  In many cases the devices have back-doors for remote access by service technicians, weak authentication methods, or default passwords that are never changed.  It doesn’t take a nation-state attack to exploit these vulnerabilities.   

Even devices including basic cyber-security defenses often fall short.  They may provide a level of protection by encrypting network traffic or harden the device using code signing for trusted boot or provide other defenses against cyber-attacks.  In many cases however,, these measures don’t go far enough. Each device is different, but many fail to provide security on all the device’s interfaces, leaving something open to attack.  For example, a number of IoT devices have implemented SSH to provide secure communication, but have used an identical shared key for an entire product line.  If that shared key is then compromised, all devices using that key are vulnerable.  

 

Lessons from WikiLeaks

The glaringly obvious conclusion is that security can no longer be viewed as a “nice to have”.  It is critical to address security during the earliest design stage of a device. While creating a “completely secure device” is a huge challenge, it is important to set the bar as high as possible.  And even if it is not practical to implement a full security roadmap in your next product release, it is important to get started.  If you can create a base of security in your device, you can build upon it in subsequent releases.

Adding secure remote update capability, intrusion detection, and security management are critical features and a great starting point. These features allow detection of attempted cyber-attacks against your devices, receiving notifications of those attacks, and to take action to mitigate attacks.  The Miria botnet was extremely effective, in part because there were no automated methods to patch the vulnerability.  Remote software update capabilities solve the problem.

 

Conclusion

I’m often asked by industry insiders if they should be worried about the CIA hacking their device and eavesdropping on their conversations. While that might be a concern for some, the bigger fear is with so many vulnerable IoT devices, a malicious cyber-attack could potentially impact critical services either in the US or abroad.  That scenario played out in 2015 when the Ukrainian power grid was hacked, causing power to be lost in a third of the country.  

The only way to stop these attacks is to begin taking security seriously. Regardless of the device or application, it is critical to build in security from the beginning.

 

About Alan Grau
Alan Grau is the President and cofounder of Icon Labs, a leading provider of security solutions for embedded devices.

 

Comments (0)

This post does not have any comments. Be the first to leave a comment below.


Post A Comment

You must be logged in before you can post a comment. Login now.

Featured Product

Introducing the revolutionary Comelit Visto Smart Doorbell

Introducing the revolutionary Comelit Visto Smart Doorbell

The Visto Doorbell is a new Smart Doorbell from Comelit which combines a modern Italian design with all of the basic features you are looking for in a smart video doorbell. In fact, it is so smart that it can use the 2 wires from your existing doorbell and pass both the power and the data signals. This solves the common problem of having poor wifi coverage all the way at your front door. The Visto also has built in night vision, video recording on a SD card and in the cloud, motion detection, and multiple mounting options including an angle mount. The second thing we are introducing is the Visto Dealer referral program. Because we only sell through the Professional Distribution channel, we want to give our dealers who buy in that channel extra incentives to sell our product. For any security dealers or installers who go on our website www.vistodoorbell.com, and sign up for our program, we will offer the following: - Free referrals to customers in your area - Cashback program - 10% discount during the 1st month of the launch - Free Visto t-shirts and gear - A chance to win a trip for 2 to Venice, Italy Its that easy. Let us refer customer to you and get paid in the process. All while selling a wonderful Italian designed smart doorbell which is innovative and easy to install. So all dealers should protect the pro-channel and install products like the Visto which are made and sold only at your friendly local security and low voltage distributors.