If an attack is successfully monetised, expect similar attacks to follow: Some preventive security steps

Ted Harrington of Independent Security Evaluators

Adversaries are constantly evolving. Success breeds copy-cats. And security is multifaceted. These are some of the key lessons Jeremy Cowan takes away from talking to Ted Harrington, executive partner, Independent Security Evaluators.

IoT Now: Where does the greatest threat to enterprise data security lie? Is it the threat to data in transit, or in stored data assets?

Ted Harrington: That depends on the threat model for a given enterprise. Threat modelling is an exercise through which an organisation identifies the assets it is trying to protect, the adversaries it is concerned with defending against, and the collection of attack surfaces against which those adversaries will launch campaigns. The greatest threat to one organisation may not be the same for another organisation; threat modelling helps answer that question.

IoT Now: In one study I understand ISE identified 21 financial, healthcare, insurance and utility account sites (70% of sites tested) that fail to forbid browsers from storing cached content on disk. So, after visiting these sites, unencrypted sensitive content is left behind on end-users’ machines. Does this prove that good procedures and training are as important as up-to-date software? How do you persuade digital service providers to prioritise training & process?

TH: Primarily this study proves that companies of all types need to effectively understand how attackers break systems. Only by understanding the attacker can you hope to defend against him. What this study demonstrated is that even well-intentioned development efforts, attempting to take security into consideration, will always fall short if those efforts don’t account for how to break a system. There are several strategies that we use in order to try and persuade companies to pursue more effective security approaches. These include:

Executive education. We believe that a more informed executive will make better security decisions. Thus, a byproduct of all of our security research entails not only the technical outcomes, but also translates those outcomes in a way that is meaningful and actionable for executives.

Exploit demonstration. There are many natural biases inherent in human nature that cause people to overestimate their own capabilities and underestimate either adversarial capabilities or the likelihood of a compromise. By pursuing research that makes the intangible become tangible, we help undermine such biases, which in turn hopefully results in meaningful action.

Empathy. Too often the security community is considered to be at odds with those who build things; a common refrain amongst developers is that security “slows us down”, and amongst user experience professionals that security “makes things difficult”. While we disagree with positions like these, we don’t outright discard them; instead, we always take care to listen, and understand what troubles our customers. By best understanding their business and empathising with their problems, we are able to develop mitigations that are effective in the real world context in which their business operates.

IoT Now: It was reported in January that hackers had mounted their third attack on the Romantik Seehotel Jaegerwirt hotel in Austria, demanding $1,600 in bitcoins to return control of the hotel’s doorlocks to the management. Unfortunately, with the hotel fully booked, the hotelier opted to comply and pay the ransom. What lessons can be learned from this for the hospitaility industry and other sectors?

TH: Several lessons can be gleaned from this.

Adversaries are constantly evolving. Ransomware itself is a relatively new twist on an old attack tool, and using it to coerce payment by undermining the guest experience is a truly remarkable innovation. By focusing on yesterday’s defence paradigms only, companies will never be able to defend against modern attackers, let alone future attackers.

Success breeds copy-cats. Because this attacker was successful in monetising its efforts, the hospitality industry can reasonably expect similar attacks to follow. Attackers often make outcome-based decisions just like everyone else does; where they see opportunity demonstrated by past success, they will pursue.

Security is a multifaceted. When it comes to security, the hospitality industry has been largely focused on PCI compliance, and protecting personally identifiable information (PII) about guests. However, this case demonstrated a compromise of other very valuable assets – brand reputation, guest safety, and guest experience. Considerations of PCI and PII alone are insufficient to also protect brand reputation, guest safety, and guest experience.

IoT Now: What role has ISE played in overcoming this threat?

TH: We’ve been very involved with the hospitality industry for several years now. Along with my counterpart at Hyatt Hotels, we launch and co-chaired the Door Lock Security Working Group for the industry trade association Hospitality Technology Next Generation.

As a result of that 2+ year effort, we created several valuable deliverables for the industry, including an abstracted threat model for door locking systems, and a set of development best practices for emerging locking systems such as RFID, online locking systems, and mobile key.

I have just recently taken a leadership role along with Interel, a leading innovator of connected devices for hoteliers, to co-chair the IoT Working Group for the same trade association. The group is currently underway, and we are guiding it to help the industry think through how to adopt connected devices, and ensure they are developed and deployed in a secure manner.

IoT Now: Are US healthcare providers paying enough attention to protecting patient data? Or are they more focused on meeting HIPAA (Health Insurance Portability & Accountability Act (USA, 1997) requirements?

TH: These are essentially the same, as HIPAA forces healthcare to focus on patient data. The real problem in healthcare security is instead what they are not focusing on: protecting patient health. We recently published a large piece of research, produced over the course of 2 years and in partnership with 12 hospitals and many of their supporting medical devices and other technologies.

This study investigated how hackers could cause patient harm or fatality in a healthcare setting. We proved that not only was it very much possible, we proved that in many cases it would be easy to do so. Fundamentally, efforts to protect just patient data alone are insufficient to also protect patient health. At the risk of appearing to be overstating the obvious, this could be the most significant security issue at the moment.

Jeremy Cowan

IoT Now: What are the top three actions that IoT service providers should take now to ensure that their customers’ data and identities are secure?

TH: Build security in. From the moment you gather requirements, through to well after deployment, each stage of the development process should consider security as a top priority. This obviously leads to more effective security, but more surprisingly, it also leads to less expensive and less resource intensive security.

    • Engage security assessments from third party experts. Whether or not you investigate your systems for weakness, your adversary will.
    • Adopt the adversarial mindset. When you think about your security assessments, don’t settle for commodity approaches like automated scanning, black box pen testing, or compliance-as-security. The attackers go well beyond these basic steps, and so should you.

Ted Harrington, executive partner of Baltimore-based Independent Security Evaluators was interviewed by editorial director, Jeremy Cowan.

Comment on this article below or via Twitter: @IoTNow OR @jcIoTnow

RECENT ARTICLES

5th Edition Connected Africa announces Telecom Innovation & Excellence Awards 2024

Posted on: April 19, 2024

The International Center for Strategic Alliances (ICSA) has announced the 5th Edition Connected Africa- Telecom Innovation & Excellence Awards 2024, set to be held on 22 May 2024 in Johannesburg, South Africa. Under the theme “Building a Connected Global Economy,” the summit aims to influence the telecom in Africa. With a focus on fostering forward-thinking

Read more

Facilio launches refrigerant tracking and leak detection software

Posted on: April 19, 2024

Property operations software firm Facilio has announced the launch of its ready-to-deploy refrigerant tracking and leak detection software solution. This is meant for all grocery and convenience store operators who want to implement an automatic leak detection system to identify and mitigate potential refrigerant leaks to achieve 100% compliance.

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This interconnected network of devices transforms previously “dumb” objects, such as toasters or security cameras, into smart devices that can interact with each other and their

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more