Investigating Compromised IoT Devices
Jeremy Pickett
Founder @ JaphOnTech | Infosec Research, Incident Response, Anti Fraud, Reverse Engineer)
The LI article is a small excerpt of the entire article. Full article available for download, no signups, trackers, Open Source Attribution. Adobe PDF or Word .docx
TLDR
This essay examines cautiously investigating compromised IoT devices to avoid disrupting critical operations. It covers surgical analysis techniques, IoT visibility challenges, and managing risks devices pose when breached. Duty of care balances inspection with availability needs.??
Introduction
The proliferation of connected IoT and OT devices in industrial, medical, and other environments has introduced new response challenges when breaches occur. Legacy devices often lack security controls and monitoring, forcing responders to cautiously inspect compromised systems to avoid operational disruption. Thorough investigation is essential, but safely detaining affected devices mid-operation can have serious consequences. Responders must surgically analyze systems while maintaining availability, through tactics like network flow mirrors, malware sandboxing, and selective credential rotation. Duty of care obligations necessitate managing risks devices pose when operational reliability is paramount.
The Landscape of Connected Devices
Challenges with Legacy Devices
Response Challenges
Mitigation Strategies
Duty of Care
Looking Forward
The ever-growing landscape of connected devices has indeed brought new response challenges. But with careful planning, innovative strategies, and a keen understanding of the underlying technology, organizations can navigate this complex terrain.
Background and History
From Mirai to Industrial Systems: A Tale of Two Technologies
The advent of the Internet of Things (IoT) brought an explosion of connected devices into both consumer and industrial spaces. While initially these technologies seemed to exist on parallel tracks, the security challenges they presented soon converged into a shared narrative of vulnerability and complexity.
The Mirai Botnet: A Consumer Target
In 2016, the Mirai botnet made headlines by targeting consumer IoT devices such as cameras and routers. This malware scanned the internet for vulnerable devices, then enslaved them to launch devastating Distributed Denial of Service (DDoS) attacks.
The response to Mirai was aggressive. Security professionals were able to contain the infection by disabling affected devices. While this approach might have seemed heavy-handed, the nature of the targeted devices (mostly non-essential consumer electronics) allowed for this robust response without significant societal impact.
The Industrial Side: A More Delicate Matter
However, the situation in the operational technology (OT) arena, particularly in industrial control systems (ICS), was far more delicate. Here, attacks could not be met with the same aggressive response as Mirai.
An example is the Ukrainian power grid attack in 2015, where hackers gained control over electrical substations, causing widespread power outages. Simply shutting down the compromised systems was not an option, as it would have further exacerbated the problem.
Moreover, the proprietary nature of many industrial systems added complexity. Unlike consumer devices, where standards are often common, industrial systems frequently use unique and specialized formats. This lack of visibility made investigations difficult and time-consuming, sometimes leading to failed inquiries.
Medical Devices: A Life-and-Death Scenario
The stakes were even higher in the medical field. The infamous WannaCry ransomware attack demonstrated how a failure in response strategy could lead to life-threatening situations. When the ransomware infected the UK's National Health Service (NHS) in 2017, it disrupted surgeries and other critical medical procedures. In this instance, cauterizing the devices by shutting them down was not just a matter of inconvenience—it was a matter of life and death.
The Dance of Legal Obligations and Ethical Responsibility
These challenges were further complicated by legal obligations around the duty of care. Responders had to weigh public good with operational needs when managing compromised devices.
For instance, the decision to shut down a compromised industrial system might protect against further cyberattacks but could also lead to loss of essential services. This delicate balance required precision response capabilities, minimizing disruption while still safeguarding critical infrastructure.
Conclusion: An Evolving Landscape
The progression from early IoT breaches like Mirai to the more complex challenges posed by industrial and medical technology underscores the evolving nature of cybersecurity. What once could be met with a sledgehammer now requires a scalpel.
As technology continues to advance, security professionals must adapt to an ever-shifting landscape, developing strategies that balance the need for aggressive containment with the equally vital requirements of availability, reliability, safety, and legal compliance. It's a dance of precision, one that demands both skill and grace, and one that will continue to shape the future of our interconnected world.
Top 5 Technologies
1. Network Traffic Mirrors: Reconstructing a Digital Crime Scene
Understanding Network Taps
Network taps are hardware devices or software applications that allow for the monitoring of network traffic. They can be used to mirror (or duplicate) the traffic flowing between network devices. This mirrored traffic can be analyzed without affecting the live network.
Hardware Taps:
Software Taps:
领英推荐
The Target Breach Example
During the investigation of the Target breach in 2013, network traffic analysis was pivotal. Here's how the technologies mentioned above might have been applied:
Lessons Learned and Best Practices
2. Malware Sandboxes: A Controlled Explosion
Understanding Malware Sandboxes
Malware sandboxes are specialized environments designed to execute and analyze suspicious code without risking the security of the broader system. It's like having a digital blast chamber where you can safely study the explosion.
Types of Sandboxing Environments:
The NotPetya Wiper Malware Example
The analysis of the NotPetya wiper malware demonstrated the essential role of malware sandboxing. Here's a detailed look at how this was accomplished:
Lessons Learned and Best Practices
The NotPetya example illustrates how malware sandboxing is not merely a theoretical exercise but a hands-on battle against cyber threats. It's like inviting the malware to a duel in a controlled arena, where researchers are armed with the tools to dissect, analyze, and ultimately understand their digital adversary.
The saying "know your enemy" takes on a profound meaning in this context. By safely detonating malicious code in a sandbox, researchers were able to delve into the heart of the NotPetya malware, understanding its destructive behavior without causing actual harm. It was a masterclass in cyber forensics, one that underlines the importance of having a controlled explosion in the ever-evolving battlefield of cybersecurity.
3. Credential Rotation: A Precise Surgical Strike
Understanding Credential Rotation
Credential rotation is the practice of selectively changing or blocking compromised credentials, such as passwords or access tokens. This method enables a targeted response to security incidents without affecting users who aren't impacted by the breach.
Methods and Technologies:
A Hypothetical Case: Email System Breach
Let's delve into a scenario where credential rotation can be a lifesaver:
Lessons Learned and Best Practices
Credential rotation is like the scalpel in the hands of a skilled surgeon in the operating theater of cybersecurity. It allows for precise, targeted actions that mitigate damage without causing unnecessary disruption.
4. Protocol Analysis: Cracking the Code
Protocol analysis is the process of examining and decoding communication formats, specifically proprietary protocols that might be used within various technological environments. This method is often necessary to reconstruct sequences of events or understand the behavior of specific software, particularly in industrial contexts where unique or specialized communication standards might be employed. Think of it as the cybersecurity world's version of cracking an enigmatic code or solving a cryptic puzzle.
The investigation of the Triton malware serves as a powerful illustration of protocol analysis in action. Triton was a highly sophisticated piece of malware that targeted industrial safety systems, specifically Triconex Safety Instrumented System (SIS) controllers. Unraveling how the malware operated required understanding the unique communication protocols used by these controllers.
Security researchers delved into the intricate details of the proprietary Triconex protocol, meticulously dissecting and decoding the communication sequences. Tools like Wireshark, along with custom parsers, were employed to capture and analyze the network packets. This was not merely a technical exercise but a detective endeavor, akin to Sherlock Holmes deciphering a coded message.
The researchers' efforts paid off, revealing how Triton exploited vulnerabilities in the system and communicated with the controllers to disrupt safety mechanisms. This understanding was vital in developing countermeasures and securing similar industrial systems against future threats.
Protocol analysis in the Triton case was a masterclass in digital detective work. By cracking the proprietary communication code, researchers were able to peel back the layers of a highly complex cyber threat. This was not just about understanding bits and bytes but about unraveling a sophisticated puzzle that required intellectual rigor, technical expertise, and a flair for digital forensics.
In a world where proprietary protocols abound, particularly in industrial environments, the skill of protocol analysis remains an essential tool in the cybersecurity arsenal. It's a capability that transcends mere technology, touching the very essence of curiosity, problem-solving, and intellectual engagement. In the Triton case, protocol analysis was not just a technical task; it was a journey into the heart of a digital enigma, a challenge worthy of the finest minds in cybersecurity, and a testament to the intellectual richness of the field.
5. Forensic Virtualization: A Disposable Crime Lab
Forensic virtualization is the practice of replicating specific systems and architecture within disposable Virtual Machines (VMs) to analyze and investigate digital evidence or malicious activities. Unlike a traditional laboratory setup, this virtual crime lab can be assembled and disassembled at will, providing a flexible and secure environment for analysis. It's akin to building a digital zoo where a dangerous cyber predator can be observed, studied, and understood without posing a threat to the surrounding ecosystem.
The case of the Stuxnet worm, a malicious computer worm that targeted supervisory control and data acquisition (SCADA) systems, showcases the power of forensic virtualization. Stuxnet was uniquely designed to attack industrial systems, specifically those controlling uranium enrichment centrifuges. Understanding its behavior, structure, and purpose was not just a technical challenge but a venture into uncharted territory.
Researchers tasked with analyzing Stuxnet faced a complex problem: how to study a piece of malware that was engineered to interact with highly specialized industrial equipment. The solution was to use forensic virtualization to create a virtual playground that mirrored the targeted industrial systems.
Utilizing virtualization platforms like VMware and VirtualBox, researchers were able to build a digital replica of the SCADA systems that Stuxnet was designed to infiltrate. Within this virtual environment, they could safely execute and probe the worm, observing its behavior, dissecting its code, and unraveling its attack mechanisms.
This controlled examination revealed Stuxnet's intricate design, its ability to exploit multiple zero-day vulnerabilities, and its specific targeting of Siemens Step7 software. The insights gained from this virtual exploration were instrumental in understanding the worm's origins, objectives, and potential countermeasures.
Forensic virtualization, as demonstrated in the Stuxnet analysis, is more than just a technological tool; it's an inventive approach that allows researchers to step into the very heart of a digital threat. By constructing a virtual environment that mirrors the targeted systems, they can explore, experiment, and learn, all within the safe confines of a digital enclosure.
In the battle against sophisticated cyber threats, the ability to create these virtual crime labs represents a fusion of creativity, technology, and intellectual curiosity. It's a method that transforms the challenge of understanding a dangerous predator into an opportunity for discovery, much like observing a wild animal within the controlled environment of a zoo. But in this digital zoo, the cages are made of code, the keys are algorithms, and the insights gained can shape the very future of cybersecurity. It's a fascinating dance between danger and discovery, played out on the virtual stage of innovation and expertise.
The Art and Science of Cybersecurity
Together, these methods represent a toolkit for the modern cybersecurity professional. They blend the precision of a surgeon, the curiosity of a detective, and the caution of a bomb disposal expert. As the digital landscape continues to evolve, these tools will be honed, adapted, and expanded, ensuring that the guardians of our interconnected world remain ever vigilant and ever capable. It's a game of digital cat and mouse, played on a global stage, and the stakes have never been higher.