IoT Security Flashcards
1
Q
Typical IoT Ecosystem
A
- Command Relay Server
- Update CDN
- Web GUI
- Cloud Storage
- External API
- Internal API
- Authentication Server
- Heartbeat Server
2
Q
IoT Common Vulnerabilities
A
- Same pre-shared key
- No authentication of updates
- Open services (telnet)
- Old software version
- Default passwords
- Identification using MAC
- Attacks on voice UI
- Unencrypted traffic
3
Q
Attacks on Voice Assistants
A
- Cocaine Noodles
-> Analyze voice recognition software
-> Create mangled voice commands
-> Unrecognizable by humans but understandable by assistants - Dolphin attack
-> Record voice command
-> Shift audio into ultrasonic spectrum
-> Control different voice assistants inaudibly - Lying Alexa
-> Utilize skills to return information
-> Inaudible command injection redirects to different skill
-> Alexa returns misinformation while user is talking to it
4
Q
Mirai
A
- IoT botnet appearing for the first time in 2016
- Infects typical IoT devices
- Actively scans the network and propagates to any vulnerable devices it finds
- Has been used to perform one of the largest DDoS attacks in history
5
Q
Why is Mirai possible?
A
- Vulnerabilities: Manufacturers expose sensitive services access to their devices
- Weak credentials: Poor default passwords, password change not enforced
- Poor network management: Users do not have proper network configuration leading to exposure of IoT devices on Internet
- Always online
6
Q
Mirai: Defense Mechanisms: Mitigation
A
- Limit exposure to external adversaries (use of firewalls and NAT, closing open ports not needed for functionality)
- Ensure correct security configuration (set the admin password)
- Remove device vulnerabilities (security patches)
7
Q
Mirai: Defense Mechanisms: Detection
A
- Signature-based intrusion detection
-> System monitors communications or device behaviour for known patterns of attack
-> Fast and reliable, widely deployed - Anomaly-based intrusion detection
-> Detects deviations from normal behaviour as anomalies
-> Able to detect also previously unknown attacks
8
Q
Mirai: Defense Mechanisms: Recovery
A
- Network isolation
-> Traffic filtering rules used to isolate infected device from others
-> Prevent further injections in the network
-> Prevent device from attacking remote victims - Reset device
-> Most IoT malware don’t maintain persistent state
-> Simple reboot will remove possible infections (requires manual intervention in many cases)
-> Vulnerability is however only removed through SW patch
9
Q
Mirai process
A
1) Scan
2) Report IP + credentials to Listener Server
3) Listener Server adds new device with Loader Server
4) Load (Infect)
5) Recruited (Infect)
6) Send command to C&C server
7) Dispatch (Versende) command
8) Attack