Slide 1

Slide 1 text

Outsmarting IoT Defense: The Hacker’s Perspective IoT Tech Expo Europe | Amsterdam August 2022

Slide 2

Slide 2 text

My Background Natali Tshuva CEO & Co-Founder Sternum Computer Scientist (age 14) Reverse Engineer Unit 8200 (Israel NSA) Exploit Designer Inventor of patented technology I can’t exploit Company Founder CEO of growing company

Slide 3

Slide 3 text

No content

Slide 4

Slide 4 text

THE RISE OF IoT

Slide 5

Slide 5 text

1.5 Billion IoT device breaches in 6 months IoT devices connect to the internet every second Global IoT security spending by 2023 $1.1 Trillion Source: IoT Analytics, Gartner, Statista The Rise Of IoT 127 New Devices

Slide 6

Slide 6 text

3rd Party Dependencies Limited Resources High Diversity Operating Systems Communication Protocols Hardware Old/Existing/In-dev Devices 3rd Party Libraries Closed-Sourced Components Communication Modules Homegrown Code Compute Memory Battery Bandwidth Extremely Difficult to Protect & Observe

Slide 7

Slide 7 text

IOT DEVICES - VULNERABLE & CONSEQUENTIAL ASSET ENTERPRISE DEVICE MANUFACTURERS INFRASTRUCTURE

Slide 8

Slide 8 text

RASP – Runtime Application Self Protection. VULNERABILITIES ARE INEVITABLE AND ENDLESS.

Slide 9

Slide 9 text

New CVE’s Each Month 2000~ Patch Tuesdays Due To Memory Vulnerabilities 70% Companies Have A Publicly Available Exploit. 58% 15 Vulnerabilities Per 1000 Lines Of Code Many Third-party Code Vulnerabilities Left Undiscovered By Static Analysis Tools

Slide 10

Slide 10 text

RASP – Runtime Application Self Protection. I KNOW A VULNERABILITY EXISTS. “ “

Slide 11

Slide 11 text

No content

Slide 12

Slide 12 text

No content

Slide 13

Slide 13 text

My way in. ● Ransomware ● Network Breach ● APT ● Reputation Damage ● Intelligence ● IP Theft ● Cryptomining ● Power Play Outcome LARGE VOLUME OF DEVICES ONE SPECIFIC COMPANY Openssl, TCP/IP, BT Libraries, OS’s Schneider Electric APC (TLStorm), VERKADA hack, CISCO business router Reversing One Targeted Device Target Way In Examples 3rd-party Vulnerability

Slide 14

Slide 14 text

Many Attack Vectors Chip level vulnerabilities 3rd party Code Vulnerabilities Protocol vulnerabilities Network Vulnerabilities Mobile App vulnerabilities Smart Camera Insulin Pump Vulnerable connected devices

Slide 15

Slide 15 text

Hacker Defender

Slide 16

Slide 16 text

LIMITED OPTIONS: REACT. PATCH. CVE-2022-20699 STACK OVERFLOW VULNERABILITY Exploit publicly available Direct access from the Internet HACKER ON THE INTERNET FULL ENTERPRISE NETWORK EXPOSED Hacker View: Cisco Router No prevention on-device. No search for indicators of attack. CHANGE CONTROLS LATERAL MOVEMENT RANSOMWARE DISRUPT SERVICE Complete takeover on the VPN/Gateway ACCESSES THE NETWORK AND DEVICES CISCO RV340 BUSINESS CLASS ROUTER Exploitation Video: https://youtu.be/O1uK_b1Tmts

Slide 17

Slide 17 text

SAME STORY. DIFFERENT DEVICE.

Slide 18

Slide 18 text

LIMITED OPTIONS: REACT. PATCH. HACKER ON THE INTERNET Zero-Day Exploit CHANGE CONTROLS LATERAL MOVEMENT RANSOMWARE DISRUPT SERVICE Enterprise Video Recorder ACCESS TO SENSITIVE ENTERPRISE DATA (BOARD/ MANAGEMENT MEETINGS) Hacker View: Video Recorder Exploitation – No prevention on-device. No search for indicators of attack.

Slide 19

Slide 19 text

Hacker View: Take over access controls Target: HCI Mercury Access controllers (CVE-2022-31481) *REAL-LIFE EXAMPLE* RS-485 IP Network Vulnerable Access Controller e.g. HID Mercury LP1501 Other Access Controllers Access Control Server “Trellix noted that by chaining two of the aforementioned weaknesses, it was able to gain root-level privileges on the device remotely and unlock and control the doors, effectively subverting the system monitoring protections.”

Slide 20

Slide 20 text

Patching is Reactive & Costly but Can’t Safeguard Static Analysis Finds Only 50% of Vulnerabilities “ Usually there are much simpler ways of penetrating the security system[…] than cracking the crypto” Adi Shamir Current Approaches Reactive. Imposing. Not Holistic.

Slide 21

Slide 21 text

RASP – Runtime Application Self Protection. We Can’t Fight Vulnerabilities. But We Can Fight Exploits In Real-time. “ “

Slide 22

Slide 22 text

IT IS WHEN AN ATTACKER WALKS THE INEVITABLE PATH OF EXPLOITATION

Slide 23

Slide 23 text

EVERY VULNERABILITY IS DIFFERENT, EXPLOITATIONS SHARE A UNIQUE FINGERPRINT

Slide 24

Slide 24 text

Memory override (stack, heap, data, overflow) Manipulation of execution flow Command Injection Information leak Injection of malicious code Exploitation Fingerprint™ Patented Technology Sternum Is Uniquely Able to Deliver Benefits of EPP/XDR & RASP

Slide 25

Slide 25 text

Hacker Defender

Slide 26

Slide 26 text

CVE-2022-20699 STACK OVERFLOW VULNERABILITY Exploit publicly available HACKER ON THE INTERNET NO REACTION REQUIRED NOTIFICATION SENT FORENSICS SHARED VISIBILITY INTO BIGGER PICTURE DEVICE INTEGRITY MAINTAINED Defender View Power Flips. Exploitation Fingerprint: Memory corruption Command Injection Manipulation of execution flow Information leak Injection of malicious code Real-time monitoring Anomaly detection

Slide 27

Slide 27 text

BRINGING INDUSTRY STANDARDS TO IOT. RASP*. EDR. ZERO-DAY PROTECTION. Be Ahead Of Attacker. Real-time. On The Edge. No Patching Needed Implementation On New And Legacy Devices

Slide 28

Slide 28 text

A REAL WORLD ATTEMPT TO EXPLOIT AN IOT DEVICE

Slide 29

Slide 29 text

SEE US IN ACTION BOOTH #228 [email protected]

Slide 30

Slide 30 text

Thank You IoT Tech Expo Europe 2022 [email protected]

Slide 31

Slide 31 text

SEE HOW WE STOP IT CLICK TO DEPLOY

Slide 32

Slide 32 text

Thank You Hexacon 22 [email protected]