Connected Devices: Growing Attack Surfaces.

Connected Devices: Growing Attack Surfaces.

As an underscore to my post titled “Let’s Ban BYOD” (https://www.netswitch.net/lets-ban-byod/ ), the increase in machine-to-machine attacks that we are seeing this first quarter alone is giving rise to new and highly dangerous forms of malware, and changing the risk landscape accordingly.

We know that our friends at Gartner have predicted that there will be almost 7 billion connected devices in use in 2016, a 30 percent increase over 2015, and that by 2020 that number will jump to more than 20 billion.  This means that there will be between two and three connected devices for every person on the planet.

This also means that the attack surfaces are growing at an alarming rate. At least, it’s alarming to some of us.

We also know that most consumer connected devices simply don’t prioritize security, which is why we want corporate mobile devices to be controlled by IT and we want companies to move from the BYOD model to the C (choose) YOD model. If they don’t, we can expect the number of cyber-attacks to skyrocket.

In its 2016 Planning Guide for Security and Risk Management, Gartner says in a classical understatement: "The evolution of cloud and mobile technologies, as well as the emergence of the 'Internet of Things,' is elevating the importance of security and risk management as foundations."

When Gartner refers to mobile technologies, they are referring to smartphones which singularly present the largest risk category within IoT in the near term. When we are connected to the growing list of IoT devices (from wearables to smart cars), the risk categories expand and the threat grows exponentially.

Smartphones are particularly attractive to cybercriminals because of the sheer number in use and multiple vectors of attack, including malicious apps and web browsing. These reverse drive-by attacks conducted by malicious websites masquerading as benign URLs will fingerprint a smartphone and do an instant vulnerability assessment. Not for your benefit. Those vulns are passed along to the c and c and instantly your device is set-up for compromise. It happens every day, and all the time.

Apple is the only maker who performs commercial app code review, but even they can’t filter out a lot of these malicious applications that make it onto your mobile devices. The only sure-fire way to knock out this threat vector is through central control of a corporate issued mobile device by your IT guys. BYOD was a cool idea whose benefits fail to outweigh the risks. Time to punt and go to a “choose” rather than a “bring” model. And, leave your wearables at home. Please.

In this new machine-to-machine world, we will see entirely new worms and viruses able to propagate from device to device. These are known as the "headless worms" (malicious code) which will be targeting "headless devices" such as smartwatches and other wearables, smartphones and medical hardware with an enormous potential for harm resulting from a threat that can multiply across billions of connected devices.

With millions of infected machines controlled by networks offering up billions of attack surfaces, you can easily imagine a massive global outage where suddenly everyone’s smartphone simply dies.

We now see an increasing reliance on virtualization and cloud computing variants which will create a proliferation of attacks on private and hybrid clouds and all forms of cloud infrastructure, including virtual machines, based on malware specifically designed to exploit virtual computing systems. The unwitting role of mobile devices running quietly compromised apps will be to provide the pathway for hackers to easily gain access to these virtualized environments.

To make matters worse, hackers are getting really very good at evasion tactics. We evaluated a dozen or so “sandboxing” security products in 2014 and decided that smart criminals would be able to obfuscate and get around these defenses at some point in the future, so we passed. It turns out that we now have a class of malware known as a “two-faced ferret” that appears benign under initial surveillance, but immediately morphs into malicious code once it bypasses first phase inspection.

We now see frequent instances of “ghostware” that is malicious code designed to evade forensic detection and make it very difficult for law enforcement to track how much data has been stolen in sophisticated extortion attacks.

This is also making it much more difficult for regulators to assess fines and establish the basis for willful intent. It could prompt an adjustment on regulatory definition and determination that would put any cyber-theft liability directly on the shoulders of executives, officers, board members and shareholders.

So, what can we do to shore up, prepare, prevent and manage the threat?

First, let’s acknowledge that the threat is real. We still haven’t done that, and until we do, we will continue to witness a race where the bad guys out-sprint the good guys by a wide margin.

Boards need to accept the fact that we now have an actual new business dimension that needs the same policy and administrative attention as tax, insurance, audit, regulatory compliance, general and specific liability and corporate governance.

Even if we just took care of the basics, like taking control of our mobile devices, implementing fundamental security policies, compliance and best practices, managing administrative privileges, network segregation, configuration and patch management, anti-virus and intrusion prevention and detection software, employee training in phish and spoof detection and the identification of malicious web downloads and email attachments, we would be way ahead of where the vast majority of companies now find themselves.

Prioritizing fundamentals and getting them done is a whole lot better than doing nothing and costs very little to implement. We don’t need to strive for perfection, but if we can just assure that our most critical exposures are mitigated, we will at least reduce residual risk and be better prepared for today’s advanced threats and the more sophisticated and complex threats associated with machine-to-machine invasions coming down the tunnel.

It’s true that Rome wasn’t built in a day, but someone had to lay the first stones.

要查看或添加评论,请登录

Steve King, CISM, CISSP的更多文章

  • Connected Device Security: A Growing Threat

    Connected Device Security: A Growing Threat

    Many cybersecurity analysts have warned of the rapidly emerging threat from an expanded IoT space. And as you have…

    3 条评论
  • China’s Ticking Time-Bomb.

    China’s Ticking Time-Bomb.

    It should now be clear to even the casual observer that China has been spying on us for years and stealing reams of…

    7 条评论
  • Comparing Major Crises To COVID-19: A Teachable Moment

    Comparing Major Crises To COVID-19: A Teachable Moment

    Lessons from past financial crises might prepare us for the long and short-term effects of COVID-19 on the economy and…

  • The Escalating Cyber-Threat From China

    The Escalating Cyber-Threat From China

    A Modern-day Munich Agreement In an article penned back in May of 2015 in a policy brief published by the Harvard…

    1 条评论
  • Cybersecurity: Past, present, future.

    Cybersecurity: Past, present, future.

    We have made a flawed assumption about cybersecurity and based on that assumption we have been investing heavily on…

    15 条评论
  • Three Marketing Tips for Improved Conversion Rates

    Three Marketing Tips for Improved Conversion Rates

    While we are all devastated to one degree or another by this outbreak and with the knowledge that it will likely change…

  • Coronavirus in the Dark.

    Coronavirus in the Dark.

    So, yes. It is now very clear that the outbreak of the COVID-19 virus and the concomitant investor panic leading to a…

    13 条评论
  • Panicky Investors Issue Dire Warning On Coronavirus

    Panicky Investors Issue Dire Warning On Coronavirus

    Sequoia Capital just issued a dire warning to its portfolio companies. “Coronavirus is the black swan of 2020.

    5 条评论
  • AI in Cybersecurity? Closing In.

    AI in Cybersecurity? Closing In.

    "AI Needs to Understand How the World Actually Works" On Wednesday, February 26th, Clearview AI, a startup that…

    8 条评论
  • Do CapitalOne Shareholders Have a Case Against AWS?

    Do CapitalOne Shareholders Have a Case Against AWS?

    An adhesion contract (also called a "standard form contract" or a "boilerplate contract") is a contract drafted by one…

    1 条评论

社区洞察

其他会员也浏览了