IoT Is A Cyberwar Nightmare

The world got a glimpse of the future last month when a large-scale cyberattack prevented access to hundreds of key websites, including Twitter, the online New York Times, and Amazon. The “distributed denial of service” attack against the New Hampshire-based DNS provider Dyn, which blocked access to major online services for users as far away as Europe, fulfilled the direst predictions of technologists and security researchers alike.

The attack exposed the clear reasons for concern about the coming age of an Internet of Things, in which more household devices are connected to the web. What’s less immediately clear is what should be done to ensure the internet’s most likely future iteration remains safe.

To date, the vast majority of disruptive and even destructive cyberattacks have been the work of militaries, foreign intelligence services, or other state-sponsored hackers. These actors are usually operating under some degree of political direction and interests and tend to moderate their use of malicious code for disruptive or destructive purposes.

But according to America’s top intelligence official, Director of National Intelligence James Clapper, last month’s attack was “likely” the work of a non-state actor, and his assessment has been backed up by reports from the private cybersecurity firm Flashpoint. This marks an important shift. The barriers to entry are becoming low enough that hackers no longer need the backing of a government to carry out crimes or even acts of warfare in cyberspace. 

These non-state actors are especially destabilizing because they are not subject to traditional means of diplomacy or law enforcement. They operate beyond legal jurisdictions and without regard for geographic political boundaries, so the instruments of deterrence that have largely kept nation-states from projecting disruptive or destructive cyber-force are increasingly obsolete.

The first factor driving these low barriers to entry is the internet’s rapidly expanding digital real estate, which non-state hackers view as their battlefield. The rapidly expanding Internet of Things consists of normal household devices like surveillance cameras, thermostats, baby monitors, televisions, and refrigerators to which an IP address has been affixed and that can communicate with one another and other devices. It is already massive and is expected to more than triple in size by 2020 to nearly 21 billion devices. 

For a cyber-defender, this means that hackers will not only have three times as many targets, they will also have three times as many vectors from which to attack any given target. This creates vast new challenges for network security and complicates the already murky legal and technical landscape for attributing who is responsible for an attack.

The second factor bolstering this threat is the ubiquity of the tools used to conduct such attacks. The Mirai malware that was used last month to compromise 50,000 Internet-connected devices is a powerful new threat. Botnets, or armies of zombie computers infected with malware, are not a new phenomenon; what is new, however, is the act of transforming the Internet of Things into a distributed zombie network, an Internet of Botnets. But the source code for Mirai is not secured in a government vault, but rather shared in forums on deep, dark corners of the web for sympathetic, force-multiplying hackers to copy and deploy with the stroke of a key.

Finally, October’s attack demonstrated our need for a more redundant Internet. Dyn, which is akin to a large digital phonebook, is one of many companies that connect a web address typed in a browser to a website’s IP address. By flooding its servers in New Hampshire with dummy traffic from random devices, amateurs effectively shut down popular online services like Twitter and Netflix for millions of their customers. Ultimately, the effects of that attack were quite limited. The effects, however, of a similar style attack directed against more critical services during a local, regional, or national emergency could be catastrophic.

Such hypotheticals are entirely reasonable to contemplate. They will also undoubtedly encourage a chorus of criticism about the viability of the Internet of Things. Technology skeptics will ask, “Why does my refrigerator need an internet connection?” But that’s the wrong question. There are too many benefits to linking our world together to slow that process down. The real question is: How can we prevent such attacks?

First, we need to require higher levels of security in any device that will be connected to the web. Some of this will be done because manufacturers are self-incentivized to do so. For example, last week, Chinese camera manufacturer Hangzhou Xiongmai was quick to recall millions of its products sold in the United States that were vulnerable to the Mirai malware. More will follow voluntarily to avoid legal liability in the event of an attack.

Second, we need better technology to manage in real time the vulnerability of Internet of Things devices. Just as technology vendors (or at least the more reliable ones) deploy software patches when a bug is discovered, Internet of Things manufacturers should include device-based auto-updates as a standard security measure in their new products. And there are plenty of other viable low-cost solutions for these devices, after all, we’re not talking about nuclear weapons. An entire secondary cybersecurity market to protect relatively simple devices attached to the Internet of Things is already gaining speed.

And third, we all have to recognize that we have a broad responsibility to protect the internet as consumers of it. While it’s easy to place blame on device manufacturers, in the end, perhaps the more appropriate culprit is the user. Think about how we fully embrace our responsibilities to prevent the spread of the flu: We take shots, wash our hands, cover our mouths when we cough, and stay home and self-isolate when we are sick (at least most of us do). 

That same mentality must be inculcated in the public when it comes to the web. When we attach a device to the Internet, we need to change the password, allow security updates, and monitor for trouble. Technology can help, but in the end we own the Internet, all of us, and it’s our job to keep it safe and secure.

In October, the United States observed National Cybersecurity Awareness Month. How appropriate that the largest single attack on the Internet came rolling through it like a line of squalls. It neatly demonstrated the basic facts of our present cyber-security state: Everything is hackable, and in the digital age of non-state threats, cybersecurity is a collective responsibility. Now we need to heed those facts.

Ein News:             DDoS: Deceptive Denial Attacks:
 

« International Police Start Crackdown On The Darknet
Fears Of Hacked US Election Ebb Away »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: Future-proof your security with Secure Access Service Edge (SASE)

ON-DEMAND WEBINAR: Future-proof your security with Secure Access Service Edge (SASE)

Watch this webinar to explore the Security orchestration, automation, and response (SOAR) paradigm, its relationship with organization IT practices, and its role in your security strategy.

Chatham House

Chatham House

Chatham House is an independent policy institute based in London. Topics cover foreign affairs and defence including cyber security.

Bryan Cave LLP

Bryan Cave LLP

Bryan Cave LLP is a global business and litigation law firm. Practice areas include Data Privacy and Security.

Ovarro

Ovarro

Ovarro is the new name for Servelec Technologies and Primayer. Ovarro's technology is used throughout the world to monitor, control and manage critical and national infrastructure.

Beta Systems Software

Beta Systems Software

The Identity Access Management solutions of Beta Systems comply with the vision of a strong provisioning foundation combined with state-of-the-art governance and analytics applications.

Lacework

Lacework

Lacework brings speed, scale, and automation to cloud security and allows security and DevOps teams to collaborate on keeping data and applications safe.

e-Crime Bureau

e-Crime Bureau

e-Crime Bureau is a specialized company offering cyber/computer forensics, cyber security consulting services, forensic audit and investigations services and training to clients across Africa.

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

Dreamlab Technologies

Dreamlab Technologies

Dreamlab specialises in securing critical IT infrastructures. We offer qualitative support and advice for managing your infrastructure and cyber security needs.

NSEIT

NSEIT

NSEIT offers end-to-end Information Technology products, solutions and services including cybersecurity to organizations in the financial sector.

Smart Contract Security Alliance

Smart Contract Security Alliance

The Smart Contract Security Alliance supports the blockchain ecosystem by building standards for smart contract security and smart contract audits.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

Baxter Clewis Consulting

Baxter Clewis Consulting

Baxter Clewis are cyber security and compliance experts. We provide Security Consulting, IT Assurance, and Technical Security services.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Techsolidity

Techsolidity

Techsolidity is an emerging e-learning platform that offers a wide range of upskilling programs worldwide in areas including cybersecurity.