CISO-MAG August 2020
CISO-MAG August 2020
XDR
IS
HERE Threats are evolving. EDR is not enough.
The latest threats have been engineered to hide from your standard detection and response
security.
Security and SOC teams are suffering from alert fatigue, lack of visibility, and difficulty with
integration from siloed solutions.
ESTABLISH A SECURITY
BASELINE FOR IoT
* Responsible for selection of news under PRB Act. Printed & Published by Apoorba Kumar, E-Commerce Consultants Pvt. Ltd., Editor: Brian Pereira.
The publishers regret that they cannot accept liability for errors & omissions contained in this publication, howsoever caused. The opinion & views contained in this publication are not
necessarily those of the publisher. Readers are advised to seek specialist advice before acting on the information contained in the publication which is provided for general use & July not Jay Bavisi
be appropriate for the readers’ particular circumstances. The ownership of trade marks is acknowledged. No part of this publication or any part of the contents thereof July be reproduced,
stored in a retrieval system, or transmitted in any form without the permission of the publishers in writing. Editor-in-Chief
INDEX
10 BUZZ 30 INSIGHT
Cybersecurity - Top 5 Lessons IoT Security Trends & Challenges
Learned from COVID-19 in the Wake of COVID-19
58 COVER STORY
Understanding the IOT Threat Landscape
46 KNOWLEDGE HUB
Securing Industrial IoT
Infrastructures
Detect, investigate and
hunt at Google speed Get a free TCO impact analysis
Chronicle, now part of Google Cloud, is a security In 15 minutes we will produce a detailed cost comparison
analytics platform that works at planet-scale. Redefine between your legacy SIEM and Chronicle that you can
your SIEM with zero-management security analytics from download and use for your own internal analysis.
Chronicle and let us ensure perfect fidelity, no matter how
much data you generate. Sign-up today:
https://chronicle.security/unwind-your-siem
Modernize your enterprise security with Chronicle.
BUZZ
Cybersecurity
TOP 5 LESSONS LEARNED
FROM COVID-19
- Hemanta Swain,
VP, & CISO at TiVo Corp
A
t last, I went to a grocery Through my personal experiences and learning from important ways to stop the spread of diseases in avoided breaches. Moreover, we tend to overlook
shop with enough precau- COVID-19, I realize that this pandemic resonates 2020. the basic health of our infrastructure, systems,
tions after using multiple closely with my Infosec professional life. This may and applications. This becomes evident during a
online delivery services not be new for cybersecurity professionals, but I will As for cyber security, we should be reminded security breach.
for weeks. And I found that outline a few of my experiences here. that basics cannot be ignored in our industry
most people are following In the minds of many people, this transition from either. It’s not uncommon to see security pro- In my view, both are needed, but there should
health advice and keeping physical to digital is inevitable, unstoppable, and ir- fessionals lagging behind in the adoption of the be a continuous effort to keep basic security hy-
safe distances, although it revocable, even though cash is still used for most re- latest technologies that address challenges (ad- giene intact. This is essential to build a sustain-
makes it hard to recognize anyone wearing a mask. tail purchases globally (COVID-19 influence aside). vanced threats) and support business priorities. able security posture. One can and should follow
This was, and still is, an unusual experience for every- We are also reminded of the number of breaches CIS top 20 controls and OWASP top 10 list with
one. COVID-19 is the biggest challenge that we face 1. Basic (Health/Security) Hygiene: that happen because of haphazard patching and secure access using multi-factor-authentication,
today. The COVID-19 pandemic has forced us to stay The pandemic has reminded us all that the most other basic requirements not being met. Just like regular patching, vendor risk assessment, email
home to save lives and has given us time to rethink basic of hygiene strategies, handwashing, first with handwashing, all cybersecurity profession- security, and endpoint security protection. But
our actions and prepare for a healthier future. to be discovered to be effective against spread- als know that keeping up to date with patches basic security hygiene is the key.
ing disease in the 1850s, is still one of the most is key to protecting the organization from easily
12 - August 2020 - CISO MAG Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 13
BUZZ 2. Segmentation (Shelter-in-place and Isolation):
During this pandemic, we’ve seen, perhaps for
the first time, the entire world sheltering in place
simultaneously. We’ve seen how isolating people
from their networks of friends and extended fam-
ily drastically helps contain infection rates.
5. Quick Recovery:
We’ve seen successful and botched re-openings
around the world and the difference between the
successes and failures seems to be how much plan-
ning and data went into each decision to re-open.
Those locations that rush to re-open in order to get
back to business have risked more infections and
more deaths, which further hamper economic re-
covery. A balance must be struck in order to ensure
that any re-opening is safe and appropriate for the
level of recovery of the state or country.
20
20- -August
August2020
2020- -CISO
CISOMAG
MAG Vol 4Vol
- Issue 08 08
4 - Issue Vol
Vol 44 -- Issue
Issue 08
08 August2020
August 2020- -CISO
CISOMAG
MAG- -21
21
UNDER THE
SPOTLIGHT
It has been nearly three decades since joint go to market engagements, we have successful-
the inception of Aeris. Aeris evolved ly established an end-to-end IoT ecosystem, cracked
the IoT monetization code and today we provide flex-
from being a cellular network to now ible business and commercial models for IoT, for the
a world renowned IoT enabler. How price conscious markets, going beyond India, and,
has your journey with Aeris been creating our presence in SAARC, APAC, Middle East
and what were the key milestones for and the APAC region.
the company?
With no hardware choke points and sev-
Aeris was founded in 1992 and is a cellular network eral small-cell antennas relying on 5G’s
designed and built exclusively for machines. Be- Dynamic Spectrum Sharing feature en-
cause it was made for machines, Aeris delivers the
abling multiple data streams to share
most reliable, flexible, and efficient global cellular
network for M2M data transmission available today. bandwidth partitioned in slices that may
The growth of Aeris mirrors each introduce cyber
the development and growth risk, do you feel with
of M2M communications and 5G technology comes
the Internet of Things (IoT). It
the emergence of tens
has operational reach in over
180 countries and has offic- of billions of smart de-
vices susceptible to cy-
es in the Americas (Chica-
go & San Jose), Europe (U.K.)
5G comes with the berthreats related to
and India (Delhi NCR). We promise of download IoT networks?
announced our joint venture
with Softbank in Japan in 2016 speeds of up to 10
5G comes with the promise of
known as Aeris Japan K.K., to times faster and there download speeds of up to 10
provide IoT and telematics
services globally using the is a huge concern times faster and there is a huge
concern over this for security
Aeris IoT solutions platform.
We are also part of Ventic LLC,
over this for security perspective as faster speeds
a joint venture that is the result perspective as faster may present an opportunity
for hackers to target more de-
of a long-term commitment
between Volkswagen and Ae- speeds may present an vices and launch bigger cy-
berattacks.
ris in the development and opportunity for hackers
operations of connected ve-
hicle platform technologies. to target more devices But let’s not forget that we wit-
nessed similar concerns and
Today we have 14 million de-
and launch bigger threats when the Internet was
vices managed on our IoT cyberattacks. growing and maturing to gain
the critical mass and adoption.
Platform, worldwide. Aeris is
Similar concerns were raised
at the forefront of technology
when cloud technology was at
industry, building networks
its hype. Therefore, it is quite
and applications to enable
natural that any new and ad-
Fortune 500 clients fundamen-
vanced technology will bring
tally improve their businesses.
with it a gamut of new security challenges. We need
We offer global connectivity for machines as well as
to remind ourselves that the security of the “thing” is
IoT solutions and services to multiple sectors which
only as secure as the network in which it resides. This
include Automotive, Finance & Insurance, Telecom,
includes the people, processes and technologies in-
Utilities, Manufacturing, Agriculture and more. From
volved in its development and delivery. Managing
telematics to medical devices to remote machines,
the security of 5G networks and services requires a
Aeris’ customers enjoy solutions tuned for high per-
new approach, where security is an integral part of
formance and mission-critical reliability.
the end-to-end architecture and ‘security by design’
We entered the Indian market in 2016, and with our
is a must.
22- -August
22 August2020
2020- -CISO
CISOMAG
MAG Vol 4Vol
- Issue 08 08
4 - Issue Vol 44 -- Issue
Vol Issue 08
08 August
August2020
2020- -CISO
CISOMAG
MAG- -23
23
UNDER THE
SPOTLIGHT
You have spoken about integrating IoT Farmers adopting connected technology can tie up by BIoT has the potential to widen the lens on value
with agriculture to revolutionize the with IoT solution and service providers who allow creation beyond location, and associated benefits of • Define clear responsibilities for the players in the
them to securely provision and connect their devices low-hanging fruit such as cost savings and operation- ecosystem and institutionalize data governance.
landscape. What is the feasibility of that? to the cloud with minimum (near zero) effort and help al efficiency through improved energy management,
What is your response to the apprehen- them do this securely with identity and access man- increased level of efficiency with enhanced building • Selection of secure communication pro-
sions surrounding cyberthreats that may agement best practices being deployed during the performance and effectiveness that could distinguish tocol is required for building automa-
arise to unsuspecting farmers? entire device deployment lifecycle. buildings within a marketplace from a desirability tion systems, which can help integrate
and profitability standpoint. with enterprise management solutions.
For IoT deployments, irrespective of the industry ver- When it comes to the concept of Building
tical whether it is manufacturing or finance or agri- Internet of Things (BIoT), it is often said BIoTs can alleviate security concerns for both owners When all these systems are unified to work together,
culture or even a social sector engagement, security and tenants. Real-time monitoring can bolster inter- we have a resilient Building Internet of Things (BIoT).
that immaturity and poor definition of nal security, and specialized weather sensors provide
should never be an afterthought. In the security industry, the integration of the three
the concept are a few of the biggest risks advance warnings of adverse weather events. As the major segments has been successful to a large ex-
Keeping connected devices and their data safe starts in smart buildings. Do you think there is frequency and severity of hurricanes, floods, and tor- tent. Physical Security Management Systems (PSIM)
during device design and at device provisioning still a need for a more comprehensive un- nadoes increase under a changing climate, so does have been used for interoperability between safety &
and deployment. Deploying IoT programs at scale derstanding of threats posed on BIoT? the value of disaster preparedness and resilience. security systems including fire detection, extinguish-
calls for simplifying device onboarding processes ing, evacuation, mass notification in both large and
and reducing manual steps. A common goal is to set The Commercial Real Estate (CRE) industry is per- From a security point of view, CRE companies can small projects.
up each deployed device to immediately be able to haps uniquely positioned to implement the latest minimize the security and privacy risk that IoT tech-
communicate over networks to the right destination technologies using IoT-enabled building manage- nology presents by taking several measures men-
in the cloud. But doing that securely requires exam- ment systems (BMS) or BIoT to make building per- tioned below to become secure, vigilant, and resilient:
ining all the steps in the process and setting the right formance more efficient and also use sensor-gen-
parameters for those devices. erated data to enhance building user experience. • Use purpose-built BIoT devices or add-
The value created from the information generated ons, rather than generic IoT solutions.
24 - August 2020 - CISO MAG Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 25
UNDER THE
SPOTLIGHT
BIoTs
can alleviate
security concerns
for both owners
and tenants.
Real-time
monitoring
can bolster
internal security,
and specialized
weather sensors
provide advance
warnings of adverse
weather events.
26 -- August
26 August 2020
2020 -- CISO
CISO MAG
MAG Vol 4Vol
- Issue 08 08
4 - Issue Vol 44 -- Issue
Vol Issue 08
08 August
August 2020
2020 - CISO
- CISO MAG
MAG - 27
- 27
UNDER THE
SPOTLIGHT
With COVID-19 and employees working the post-COVID-19 world? Has the lock-
from home, there are even bigger threats down period been an enabler for security
from the IoT landscape. What are your advancements in the IoT space or has it
thoughts surrounding that? been an obstacle?
It is true that while the underlying network is rela- Having proper security in place makes common
tively easy to secure, like the internet, smart devices sense but too often this has been an afterthought. The
and sensors create an ecosystem that is complex and outbreak of COVID-19 mandated remote working of
widespread. IoT devices vary widely in their uses, and the employees with country-wide lockdowns leading
so do their security needs, which means it’s very easy to an upsurge in the Bring Your Own Device (BYOD)
to either overspend or underspend on the necessary trend, and, thus, higher vulnerability. The demand for
precautions. Each component is vulnerable, and their endpoint security rose during the lockdown period.
internetworked communication is instantaneous. That COVID-19 has accelerated the demand for managed
means a hacker can take down an entire system in a IoT security services to safeguard the data of employ-
second, long before any human or network fail-safes ees as well as organizations. In addition, regulations
can respond. A disgruntled worker could sabotage are now forcing device and sensor manufacturers to
devices during design or manufacturing. Criminals take security into account and not to ship without it –
could steal a device shipment, reprogram the devic- security by design.
es, and return the devices on their journey. A hacker
could fake a device malfunction in an existing system,
alter the device software, and then bring the device
back online — security personnel would simply as-
sume it was a minor glitch. In every case, the breach-
es might never be detected. Augustin Kurian is part of the editorial team at CISO
MAG and writes interviews and features.
Knowledge and preparedness are key determinants
for how successful any IoT security implementation
will be, even when facing the unknown. By building
comprehensive security measures into the ecosys-
tem first, before a single device is activated, you can
create a secure foundation that will last well into the
future.
30 -- August
30 August 2020
2020 -- CISO
CISO MAG
MAG Vol 4Vol
- Issue 08 08
4 - Issue Vol
Vol44--Issue
Issue08
08 August 2020
August - CISO
2020 MAG
- CISO - 31
MAG - 31
INSIGHT
F
inally, we have
arrived in the
age of an Inter-
net of Things
(IoT) ecosys-
tem, with con-
nected devic-
es deployed
in our homes,
workplace, and
public places. According to research an-
alyst Omdia’s most recent “IoT Devices
Market Tracker,” the global IoT installed
base is expected to reach 27.5 billion
in 2020, growing to 45.9 billion in 2025.
With that number of devices deployed
and even more on the way, it is anticipat-
ed that the volume of cybercrime or at-
tempts to thwart cybersecurity will only
increase. With threats from both criminal
and rival nations evolving, it is important
that defensive strategies are put in place
to protect IoT systems, especially with
threats to the digitalscape looming large.
There is a general attitude of procrastination among The COVID-19 crisis has led to another issue known
enterprises about employing security measures for as shadow IoT devices, which is when employees
their digital network and devices. When deploying working at home introduce unauthorized IoT devices
data systems in any environment, security teams tra- to the enterprise. This increases a significant level of
ditionally look for three things: speed, security, and vulnerability for the organization and its data as these
budget-friendliness. Unfortunately, organizations devices are not layered with security measures and
tend to choose only two, leaving security out of the can easily give access to an enterprise network.
equation while cost and convenience remain the
bane of data protection efforts for years to come. A leading cloud security provider reported that
during the early months of 2020, there was a 1500%
increase in IoT devices usage at enterprises. These
Strengthening Assent Inventory are unauthorized IoT devices that include digital
Management home assistants, TV set-top boxes, IP cameras, smart
home devices, smart TVs, smartwatches, and even CISO MAG did not evaluate/test the products
automotive multimedia systems. Each of these assets mentioned in this article, nor does it endorse
Organizations must prioritize to strengthen the secu-
can be used as a point of exposure to get access to an any of the claims made by the writer. The facts,
rity measures of their devices and the network, es-
enterprise network. Hence, it is crucial that IT and se- opinions, and language in the article do not
pecially during the pandemic. As data and devices
curity professionals pay heed to the digital security reflect the views of CISO MAG and CISO MAG
are getting scattered with remote working in prac-
hygiene practices of the workforces. does not assume any responsibility or liability
tice, it is vital to review corporate security strategies
for them. CISO MAG does not guarantee the
and ensure a decent overview of inventory of assets
Cloud Security satisfactory performance of the products
and IoT devices. It’s recommended to build a broad
mentioned in this article.
review of asset inventory with a much deeper knowl-
edge of individual assets including asset tracking, As most people have moved their work off-premise
traffic pattern analysis, updating the assets, and rap- since COVID-19, experts conclude that there will be
id-response in the case of a cyberattack. a massive rate of cloud adoption during this period.
36 - August 2020 - CISO MAG Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 37
TABLE TALK
38 - August 2020 - CISO MAG Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 39
TABLE TALK
2. The latest Data Breach Investigation this year we see ransomware doubling up since Janu- 3. What else were the biggest takeaways 4. In the North American region, stolen
Report (DBIR) suggests a rise in attacks ary. We do expect financial motives to move upwards from the latest DBIR? Did any trends credentials account for over 79% of hack-
or hover around the same level. Another important in- from the report come as a shock to you? ing breaches with 33% of breaches being
motivated by financial gain, up from 71% sight to look at is the espionage related cases, which
in 2019 to 86% in 2020. With the world now associated with either phishing or pretex-
are very specific/targeted and are often under-re- I would not say shock, but it did come as a surprise as
dealing with the COVID-19 situation, do ported because most of the attacks are covert and ting. Why do you think industries are still
“Errors” definitely win the award for best supporting not evolved to handle this common threat
you feel the trend will only move upward? complex in nature. Due to the sheer number, most of “action”—refer to the schema of VERIZ (Vocabulary
What does that mean for the security the times, gullible users and companies are targeted for Risk and Incident Sharing) on Github—this year. vector?
with cyber extortion, ransomware, even card holder
community? data breaches. Looking at the current social-distanc-
They are now equally as common as social breaches
I wouldn’t say that this a crisis with every industry or
and more common than malware and are truly ubiqui-
ing scenario a lot of countries will be moving very tous across all industries. Only hacking remains high- company in North America, but yes, it is the problem
DBIR is an annual publication from Verizon with inci- swiftly towards digital currency, China being the first with the laggards. The laggards are still dependent on
dents and breach data from 81 contributors global- er, and that is due to credential theft and use, which
one to launch such state-run digital currency. With we have already touched upon. Misconfiguration er- single authentication, using passwords and usernames
ly. While the DBIR 2020 is based on a 2019 dataset, this development and forced digital shift for many to authenticate their users, which is just a basic hy-
we’ve already started seeing in recent months that rors have been increasing. This can be, in large part,
companies in the unplanned work-from-home situa- associated with internet-exposed storage discovered giene measure. We need to understand that just using
the phishing attacks are leveraging the COVID-19 tion, we can expect the number of cybercrimes in- credentials is not going to sufficiently secure your crit-
chaos and have increased significantly. With refer- by security researchers and unrelated third parties.
creasing as everything will start moving towards a While publishing errors appear to be decreasing, we ical systems or data. Also, some of the industries are
ence to the DBIR report from a financial gain perspec- digital world. The data today can live anywhere, in an still not regulated and the need to adopt stringent se-
tive, we can say that activities like ransomware, social wouldn’t be surprised if this simply means that errors
end-user system, data center servers or in the cloud. formerly attributed to publishing a private document curity controls is not felt by several companies. Having
attacks, malware were already on the rise in the past Hence, the cybersecurity community should be care- said that, I think the onset of the global legislations like
few years. We are observing a mix of trends with both on an organization’s infrastructure accidentally now
ful about implementing the data-centric perspective get labelled “Misconfiguration” because the system the GDPR and other data security and privacy man-
direct and indirect financial motive gains. Currently and not only be focused on the data center security. dates have started to make a difference.
admin set the storage to public in the first place.
40 - August 2020 - CISO MAG Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 41
TABLE TALK 5. DBIR also stressed that the on-going • Data Protection (CSC 13): Control access to sen-
patching has been successful against sitive information by maintaining an inventory of
sensitive information, encrypting sensitive data,
a lot of vectors with fewer than one in and limiting access to authorized cloud and email
20 breaches exploiting vulnerabilities. providers.
Should patching be the part that the in-
dustry should focus on? What else can be • Account Monitoring (CSC 16): Lock down user ac-
improved? counts across the organization to keep bad guys
from using stolen credentials. Use of multifactor
Security patching should be a part of a system’s ba- authentication also fits in this category.
sic maintenance procedure as there are numerous
amounts of vulnerabilities that get disclosed every • Implement a Security Awareness and Training
week. Patching helps in protecting where you are Program (CSC 17): Educate your users on mali-
completely exposed against known vulnerabilities. cious attackers and on accidental breaches.
Hence, patching should be a major focus and it should
be done on a timely basis as part of regular mainte- 6. The attacks on cloud continue. Now,
nance of a system/platform. But remember, patching small and medium business are becom-
would only help where the vulnerabilities are known, ing the biggest targets of the recent cloud
and the patches are available. Next level of maturity
attacks. How can you empower small and
comes when you start limiting your attack surface by
disabling services or features that are not required, medium business against cyberattacks?
disabling users that are not needed and hardening
systems with best-practice security benchmarks. There is an inherent problem seen in the way SMBs
handle cybersecurity. They do not have the same lev-
The focus would be the CIS Critical Security Controls el of management support and funding that you get
(CSC). Here are the top controls that our DBIR data to see in large organizations and if the SMB belongs
suggests will be worthwhile for most organizations: to one of the unregulated sectors, then even the worst
scenario can be expected. From that perspective,
• Continuous Vulnerability Management (CSC 3): the SMBs should at least follow the 80/20 rule, where
Use this method to find and remediate things like 80% of the protection can be built with just 20% of
code-based vulnerabilities; also great for finding the safeguards and with minimal financial invest-
misconfigurations. ments. These safeguards can be spread across the
three key focus areas, namely protect, detect and re-
• Secure Configurations (CSC 5, CSC 11): Ensure sponse. SMBs can also look at adopting “security by
and verify that systems are configured with only design,” which may not require very expensive tech-
the services and access needed to achieve their nology but can surely leverage inherent procedural/
function. governance security controls. Simple but effective
counter-measures such as, but not limited to imple-
• Email and Web Browser Protection (CSC 7): Lock menting robust security policy, segregation of duty,
down browsers and email clients to give your us- least privilege principle controls and not storing data
ers a fighting chance when facing the Wild West that is not needed, can go a long way in securing an
that we call the internet. SMB. They can also look at other emerging avenues
like cyber insurance where they can get some level of
• Limitation and Control of Network Ports, Protocols in-built security protection controls as part of the pol-
and Services (CSC 9): Understand what services icy coverage. SMBs should also leverage government
and ports should be exposed on your systems, provided cybersecurity expertise, public/private ex-
and limit access to those. pertise and evaluate some of the niche open source
security tools available in the market.
• Boundary Protection (CSC 12): Go beyond fire-
walls to consider things like network monitoring,
proxies, and multifactor authentication.
42 - August 2020 - CISO MAG Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 43
TABLE TALK
44 - August 2020 - CISO MAG Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 45
KNOWLEDGE
HUB
46 - August 2020 - CISO MAG Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 47
KNOWLEDGE
HUB
I
ndustries across the spectrum are em-
bracing the emerging possibilities of IoT
and the connected device ecosystem.
The benefits of IoT include unlocking the
potential of analyzing real-time, historical
behaviors of the edge devices for effec-
tiveness, better management, and pro-
ductivity by connecting edge traffic to
the cloud. The recent innovation in increasing the
“bandwidth of the pipe” has enabled bulk uploads
through networks and begins a new chapter in de-
ciphering the Internet of Everything. In the past,
the focus has been on enabling the faster move-
ment of edge data to the cloud, however, not much
focus has been laid upon two very important as-
pects of data: the quality of the data ingested and
the potential vulnerabilities that can present itself
as backdoors.
Critical Industrial Automation systems stand apart
in terms of the complexity, associated legacy
technologies, and the established governance
when it comes to monitoring and management.
Critical infrastructure grids such as utility, power,
and nuclear don’t push data at the same intervals
as other IoT systems do. Moreover, legacy
protocols are still in use for communication in
many industries, one example being the industrial
automation space where we grapple with ModBus,
ProfiBus, and Fieldbus communication technology.
This opens up a large surface for security attacks
across endpoints. The increasingly mandated
regulatory compliances for IoT security aim to
pre-empt the threats posed by cybercriminals who
take advantage of the legacy, siloed technology
stack, and protocols to launch network-based
endpoint attacks and threaten large asset bases
of organizations. IoT and connected devices need
to reassess methods by which the attack surface
can be minimized, which is the focus of the ISA99/
IEC622443 security standards for Industrial
Automation Systems.
Breaching IoT devices allows attackers to build
networks across an army of connected devices that
48 - August 2020 - CISO MAG Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 49
KNOWLEDGE
HUB
can be used to launch massive Distributed Denial-
of-Service attacks to bring down large omnichannel
platforms. The above example represents only the
tip of the iceberg in terms of the challenges that
IoT security practitioners face; creating the need
for all the associated entities in an IoT security data
chain to come together and build a robust security
infrastructure that reassesses North-South traffic.
The paradigm changes taking place in designing
an effective and secure IoT infrastructure has to
explore an IoT-native architecture and not merely
transpose tools from typical software architectures.
As an example, network firewalls are a critical
security gatekeeper in traditional infrastructures.
However, the same doesn’t hold true when we
explore the Industrial Automation devices or
Industrial IoT (IIoT). Connected devices in industrial
automation have been there for decades, however,
the know-how needed for managing completed
critical Infrastructure grids and nuclear installations
has been the responsibility of operational teams.
The IT and operational teams have been brought
together to build effective and high-response teams,
but they come with a price of negatively affecting
the decision-making of cybersecurity teams staffing
the security infrastructure and hence delaying
an effective response to the incoming attacks.
Management of the edge devices requires a different
approach that prioritizes securing each connected
endpoint, to protect against the possibility that the
breach of a single device opening a backdoor into
other systems.
Traditional designs of deploying a combination of
firewall policies, access control lists, and virtual pri-
vate network nodes complicates an IoT infrastruc-
ture, rendering it suboptimal. Excessively intricate
IIoT infrastructures with a dynamic network flow may
create additional junction points that necessitate the
deployment of additional firewall points, sometimes
numbering in the hundreds or thousands. A better
approach may be to explore endpoint segments and
access management.
The above scenarios call for better management,
mandates, and regulations to explore holistic design
and deployment.
50 - August 2020 - CISO MAG Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 51
KNOWLEDGE
HUB
54 - August 2020 - CISO MAG Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 55
KNOWLEDGE
HUB
5858
- August 2020
- CISO MAG - CISO MAG
- August 2020 Vol 4 - Issue
Vol 08 08
4 - Issue Vol
Vol44
- Issue 0808
- Issue August 2020 - CISO MAG - 59
T
he Internet of Things has Home users will find that popular devices come with remote devices that control water and electricity. Re- to current global cellular subscriptions but will in-
thoroughly permeated our known vulnerabilities. Items such as remote-con- mote Operational Technology devices pose signifi- crease as the networks expand. The devices on these
lives. This ever-expanding trolled door locks have been shown to allow attackers cant threat even while simply being turned off and networks will increasingly become vehicles, medical
attack surface presents to disengage the lock with fake credentials. In 2019, not producing readings. The research group called equipment, and remote sensors. Remotely controlled
some unique challenges the Ring doorbell company faced continuous scrutiny the X-Force at IBM have monitored attacks on indus- surgical procedures and medical devices create an
to security professionals. as videos of unsuspecting victims started to appear trial systems and report a 2000% increase since 2018. entirely new security concern. Autonomous vehicles
This secondary network online. Ring devices in people’s homes were hijacked In May of 2020, German officials claimed that a Rus- will use 5G to direct themselves on the road along-
has suffered the same remotely, and the attackers spoke to the homeown- sian hacking group had compromised the networks side human-driven vehicles. The blazing fast speed
neglect as our primary ers through their security systems. One disturbing of energy, water, and power companies in Germa- of 5G will enable hundreds of everyday items to be
devices when it comes instance saw an attacker trying to convince a child to ny by exploiting IT supply chains. The end game of digitally connected and monitored. Ericsson states,
to security and controlling risk. The devices lend leave their bedroom through the window, by speak- this type of infiltration is likely targeted at disrupting “5G is the foundation for realizing the full potential
themselves to poor security in both design and the ing to them through an IoT camera installed in the the functions of IoT devices in critical infrastructure. of IoT.” Attacks on these remote devices are sure to
way we use them. When you turn on your TV, you do bedroom. Always-on listening devices raise privacy Gaining a foot hold in an OT network can be difficult follow quickly. In our current pre-5G networks, at-
not wonder how secure it is; you just watch TV. The concerns, as smart speakers and televisions have for attackers due to heavy segregation present in tacks on these devices usually require close access
awareness of any security threat these devices may been shown to respond to incorrect commands and these networks but persistence and stealth can lead within the range of any radio frequency aspect of the
present is lacking because you do not see a comput- make recordings of conversations without the user’s to compromise that is not detected for years. device, such as Wi-Fi or Bluetooth. 5G will enable
er; you see a classic electronic device that has been consent. Inaudible commands have also been found similar attacks with a significant difference, a global
enhanced. Even in the industrial end of this market, to turn on some listening devices and enable func- The rise of 5G networks around the world will see reach through high-speed data networks. Developers
the devices are “set and forget” — you turn on a sen- tions to be executed without the owner’s knowledge. an explosion of connected devices, many of which and manufacturers have the chance to act now and
sor and if it doesn’t fail, you may never touch it again. Many consumers are still unaware of these risks. will not be cell phones (they could be sensors, for build security with these devices before something
As a consumer and a security professional, it is easy instance). Mobile device manufacturer Ericsson pre- catastrophic happens. Security will become a sales
to overlook the threat associated with an IoT device. The attacks that have grown out of this space are not dicts 550 million 5G subscriptions will be in place enhancement to these 5G connected products.
Unfortunately, malicious actors have realized that IoT simply a nuisance to home users. The most danger- by 2022. That number may seem small compared
devices are a prime target for some unique attacks. ous critical infrastructure attacks are focused on the
60 - August 2020 - CISO MAG Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 61
The rise of 5G
networks around
the world will see
an explosion of
connected devices,
many of which will
not be cell phones
(they could be
sensors, for instance).
RIPPLE 20 ADVISORY
A group of 19 vulnerabilities has been recently published describing a series of problems
lurking in a significant portion of the Internet of Things and remote device products on
the market today. The cybersecurity research group JSOF (https://www.jsof-tech.
com/ripple20/) based in Jerusalem, published their findings that covered a group
of zero-day threats and some further developed, but acknowledged vulnera-
bilities. While the CVE list is 19 items long, the name Ripple 20 comes from
the year 2020, and the long ripple effect expected from the supply chain
dispersal these vulnerabilities have enjoyed.
The vulnerabilities are found in the software code that controls how
many IoT devices communicate via TCP on the network. The origi-
nal code library was produced by the company Treck and is used
extensively as a code base for many different products. As the
code was passed around from various vendors and devices,
over the course of 20 years, the code library has found its way
into every industry sector. This code is present in Industrial
Control Systems, medical equipment, home use IoT devices,
critical civil infrastructure, and unfortunately, the list contin-
ues. The supply chain reusing this code makes sense. If you
have object-oriented software development and know the
TCP block works, why would you rewrite it? Reusing reli-
able code is standard practice, and Ripple 20 certainly will
not be the last example of how this practice could lead to
problems.
66 - CISO MAG
August - August
2020 - CISO2020
MAG Vol
Vol44
- Issue 0808
- Issue Vol
Vol 4
4 -- Issue
Issue 08
08 August
August2020
2020- -CISO MAG
CISO - 67
MAG - 67
REWIND << JULY
68 -- CISO
68 August 2020
MAG - CISO2020
- August MAG Vol
Vol44
- Issue 0808
- Issue Vol 4
Vol 4 -- Issue
Issue 08
08 August
August 2020
2020 - -CISO
CISO MAG
MAG - 69
- 69
REWIND << JULY
A
lthough metamorphically, many However, cybersecurity company Virus Total claimed
cybersecurity experts believe that that it had certain evidence which clearly points out
“there is a Snake under Honda’s hood.” that Honda’s internal server has been encrypted
Yes, you read it right! Operations of with Snake ransomware and the cybercriminals have
the Japanese automobile giant, Honda, demanded a ransom in exchange of the encryption
were reportedly disrupted in parts across Europe, key. At this point, it is unclear as to how many systems
Japan, and the U.S. due to Snake ransomware (also were exactly being affected, but Snake ransomware
dATA breach known as EKANS). operators are notoriously known to copy critical data
before encrypting it for leveraging negotiations with
A report from NBC News stated that the ransomware the victim.
attack was first discovered in the late hours of Sunday
IS THERE A “SNAKE”
night (June 7). Owing to the security crisis, the Earlier this year, a threat intelligence report from
operations on certain production units of Honda in security firm Dragos uncovered that the Snake is
Europe was put on hold. ransomware targeting industrial control systems
(ICS). Researchers said, Snake was the first of its
70 -- CISO
70 August 2020
MAG - CISO2020
- August MAG Vol
Vol44
- Issue 0808
- Issue Vol 4
Vol 4 -- Issue
Issue 08
08 August
August 2020
2020 - -CISO
CISO MAG
MAG - 71
- 71
REWIND << JULY
K
ELA, a darknet intelligence firm
discovered that a hacker group
“KelvinSecurity” compromised the
personal information of 384,319 BMW
customers in the U.K. and put them for
dATA breach sale on various darknet forums, SC Magazine reported.
T
hreat actors are finding innovative “Cofense observed the use of several compromised
methods to phish people into clicking/ accounts used to send this campaign. Using a
downloading malicious links or entering compromised real account originating from Office
sensitive information on fake forms. 365 allows the email to bypass email filters that rely
phishing In a recent security discovery, the
Cofense Phishing Defense Center (PDC) found that
on DKIM/SPF. The story in this phish is a version of
a classic lure: “suspicious activity on the user’s bank
cybercriminals are using calendar invitations to account.” This attachment, however, does not jibe
launch phishing attacks. with the ruse considering it’s a calendar invite. A
more fitting lure would have been something like: “I
Researchers at Cofense found a new phishing attached a meeting invite; can you please attend,” the
HACKERS HIDE
campaign to target enterprise email environments researchers said in a statement.
that deliver .ics calendar invitations, which contain
phishing links in the email body with the subject Google Calendar Scam
“Fault Detection from Message Center,” from a sender
PHISHING LINKS
named “Walker”. The hackers used a compromised Threat intelligence and cybersecurity firm Kaspersky
email account of a school district to bypass email stated that scammers made phishing attacks, by
filters. abusing Google Calendar services, to trick users into
giving away sensitive information like passwords,
INSIDE .ICS
The Phishing Page card details, and other financial data. Several
unsolicited pop-up calendar notifications were sent
The fake calendar invitation contains a malicious to Gmail users by cybercriminals as a sophisticated
URL, hosted on Microsoft’s SharePoint site, and also spam email attack. The calendar phishing emails
CALENDAR
displays another link that redirects the user to a exploit the automatic addition and notification of
phishing site. When a user clicks on the calendar calendar invitations feature for people using Gmail
invitation, it redirects them to a document hosted on their mobiles.
on the SharePoint site, which contains yet another
INVITATIONS
malicious link. In case the victim clicks on the second
link, they are redirected to a phishing website hosted
by Google that looks like a legitimate Wells Fargo
banking login page. The bogus page asks the users
to enter their sensitive information like login details,
account numbers, PIN, and email credentials. After
entering all the sensitive information, the user will
Rudra Srinivas be redirected to the actual Wells Fargo login page to
make the user believe that their account is secured.
Feature Writer, CISO MAG
S
ecurity researchers from cybersecurity
firm Wizcase discovered misconfigured
databases leaking millions of records
belonging to five dating service providers
in the U.S. and East Asia. Wizcase stated that
the leaky databases were hosted on the Elasticsearch,
MongoDB, and AWS bucket servers that are made
available online without password protection.
Breaches Found
A 17 MB database of the U.S.-based dating service
CatholicSingles.com exposed 50,000 user records
including names, contact details, email addresses, billing
addresses, age, gender, occupation, and education
details. Another U.S.-based dating site Yestiki exposed
43,000 records (352 MB) that contained users’ names,
contact details, addresses, GPS location data, user ratings,
and activity logs.
The South Korean dating app SPYKX.com leaked over
data breach 37,000 users’ records (600 MB) via an unprotected
Elasticsearch server. The exposed data included emails,
phone numbers, cleartext passwords, dates of birth,
gender, education, and location data. Japan-based dating
DATA
apps Charincharin.net and kyuun-kyuun.com owned
by the same company exposed 102 million user profiles
including users’ mobile device details, email addresses,
BREACH
and search preferences.
One more U.S.-based dating app Blurry leaked around
77,000 users’ private messages (3667 MB), including
MILLIONS
unsecured servers that contain information from different
dating apps and sites. However, the researchers stated
that the owners of the servers are yet to be found. “This
OF DATING
information could have been collected through a process
known as web scraping, but this could only explain some
of the data, as parts of it do not appear to be from internet-
facing web pages,” the researchers said.
RECORDS
Dating apps have been a prime target of hackers. A
research by Kaspersky Lab revealed that dating apps
transmit unencrypted user data over the insecure HTTP
protocol risking user data exposure. According to the
researchers, the reason for the vulnerability was because
the applications used third-party ready-to-go advertising
Software Development Kits (SDKs), popular among
advertising networks. Attackers also used dating apps
Rudra Srinivas to infiltrate smartphones used by military personnel.
Feature Writer, CISO MAG Earlier, hackers honey-trapped the U.K.’s Royal Air Force
(RAF) personnel by hijacking an RAF airwoman’s Tinder
profile. They also reached out to another RAF serviceman
to get details of the F-35 stealth fighter from him.
U.s. elections
Even though elections have been at the forefront
W
disruption or undermining trust, and more about
ith four months toward the cybersecurity positions with the State of Michigan, swaying individual voters and out-maneuvering a
Election Day, and several the Department of Homeland Security, and Ford campaign. One would hope that we don’t see this
state-sponsored cyberattacks Motor Co. Chang was a senior engineer on Hillary type of targeting between campaigns, as we have
already targeting the 2020 Clinton’s 2016 presidential campaign and worked enough to worry about from foreign actors”
election, cybersecurity for the Democratic National Committee’s voter
has taken the center stage. The presumptive protection team during the 2018 midterms. He added,“As for best practices, the most immediate
Democratic nominee for President, Joe Biden, hired step that needs to be taken is that state and federal
former White House cybersecurity official Chris “Biden for President takes cybersecurity seriously agencies and municipalities need to review their
DeRusha as the CISO for his election campaign and and is proud to have hired high-quality personnel processes and communication plans around a
Jacky Chang as Chief Technology Officer. with a diverse breadth of experience, knowledge, ransomware event, especially one conducted around
and expertise to ensure our campaign remains the election that could have an impact on voting. I
DeRusha is a credible cybersecurity executive secure,” the campaign said in a statement. “Jacky think State, Local, and Federal agencies need to
with experience in managing federal and state and Chris will be central to strengthening the be more strategic–resourcing their cybersecurity
government programs, coordinating cybersecurity infrastructure we’ve built to mitigate cyberthreats, teams more efficiently and more in-line with the
operations, and developing and implementing bolster our voter protection efforts, and enhance current threats, and leveraging technology that will
strategy and governance. Prior to this, he was the overall efficiency and security of the entire help buy back time for their security teams through
an advisor to the White House and also held campaign.” autonomous response and investigation.”
78 - August 2020 - CISO MAG Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 79
78 - CISO MAG - August 2020 Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 79
REWIND << JULY
I
n a lethal strike to Twitter, Bitcoin scammers
successfully hacked official accounts of many
known personalities and brands to scam people
into believing their money was soon going to
be doubled. As many as 300+ transactions were
recorded in the public ledger of bitcoin with the
address mentioned in the Tweets. This consisted of a
total transfer of 12 BTC that accounted for more than
$100,000 (1 BTC valued at $9,200, as of July 15, 2020).
Such online scams are commonly observed on
a daily basis, however, the extent of the number
Hack of accounts hacked and simultaneously used for
scamming people has not been seen earlier. The
list of individuals and brands whose official Twitter
accounts were hacked include:
• Jeff Bezos (Amazon CEO)
TWITTER ACCOUNTS OF •
•
Warren Buffet (Berkshire Hathaway CEO)
Barack Obama (The Former U.S. President)
wanted to make sure whether any additional user
information was compromised and if any backdoors
were created for future account takeovers. It has also
• Kanye West (Rapper) and wife Kim Kardashian – Satnam Narang, Staff Research Engineer at Tenable
(T.V. Celebrity) Satnam Narang, a Staff Research Engineer at Tenable,
• Wiz Khalifa (Rapper) said that this was probably much bigger than it’s
seen. He revealed that: “In separate but probably
• Apple (Corporate Account)
Mihir Bagwe related attacks, several notable Twitter accounts
in the cryptocurrency space were also hacked in a
• Uber (Corporate Account) and many more.
Technical Writer, CISO MAG mass coordinated attack. These included crypto
exchanges like Coinbase, Binance, Gemini, KuCoin,
Bitfinex, CEOs and founders like CZ_Binance,
Twitter was quick to follow-up on the incident and JustinSunTron, SatoshiLite, cryptocurrency accounts
tweeted that they were “aware of a security incident like TronFoundation, to promote a similar COVID-19
impacting accounts on Twitter” and were taking steps cryptocurrency giveaway scam.”
to fix it.
He further advised, “Users should never participate
As a temporary measure, Twitter had locked and in so-called giveaways or opportunities that claim to
suspended all operations of the affected accounts to double your cryptocurrency because they’re almost
investigate the cause and extent of the breach. It always guaranteed to be a scam.”
To stay updated on the ongoing investigation follow
the Twitter Support account.
80 -- CISO
80 August 2020
MAG - CISO2020
- August MAG Vol
Vol44
- Issue 0808
- Issue Vol 4
Vol 4 -- Issue
Issue 08
08 August
August 2020
2020 - -CISO
CISO MAG
MAG - 81
- 81
REWIND << JULY
G
oogle kicked off its virtual event Google Delivering the keynote address at Google Cloud Next
Cloud Next ’20: OnAir, a free, nine-week, ’20: OnAir, Thomas Kurian, CEO, Google Cloud said
in-depth digital event series, on July 14, Confidential Computing will ensure that Google’s
2020. The tech giant announced new customer data is not only encrypted at rest or in
solutions across its smart data analytics transit but also while it is being processed. Kurian
and security portfolios, to help accelerate customers’ said Google has also developed other solutions to
ability to digitally transform with cloud computing. protect customer data and to give threat visibility –
The announcements concerning cloud security and for intrusion monitoring and for zero trust access to
compliance include a new Confidential Computing apps that are web-based and which reside on Google
portfolio and Assured Workloads for Governments. cloud and on other clouds.
A major concern for enterprises is how to process Google is also introducing Assured Workloads
sensitive data while keeping it private. To get around for Government, which is currently in Private
this, Google Cloud encrypts data-at-rest and in-transit. Beta. Google says the product will help serve
But customer data must be decrypted for processing, government workloads without the compromises
opening up a possibility of a confidentiality breach. of traditional “government clouds.” This service
Technology That concern may have just been addressed with simplifies the compliance configuration process and
Confidential Computing, which Google believes is a provides seamless platform compatibility between
“breakthrough technology.” government and commercial cloud environments.
Google spokespersons said Assured Workloads
Confidential Computing encrypts data in-use — for Governments will first be launched for the
82 - CISO MAG
August - August
2020 - CISO2020
MAG Vol
Vol44
- Issue 0808
- Issue Vol
Vol 4
4 -- Issue
Issue 08
08 August
August2020
2020- -CISO MAG
CISO - 83
MAG - 83
REWIND << JULY
T
he world today is increasingly digital.
And with rapid digital transformation
and technology adoption, hackers are
misusing the situation with more targeted
attacks. A report from cyberthreat
intelligence provider Check Point Research stated
that threat actors exploited Google Cloud to host
malicious payloads and launch phishing attacks.
Technology “Investigating prvtsmtp[.]com showed that it resolved
The Google Cloud Phishing Journey
to a Ukrainian IP address (31.28.168[.]4). Many other
• A PDF was uploaded to Google Drive
TO LAUNCH PHISHING
Dropbox and Microsoft Azure to host phishing pages.
asharepoint-unwearied-439052791/index.html
• The user was then prompted with a popup to Precautionary Measures
ATTACKS
login with their Microsoft Office 365 credentials To stay protected against phishing attacks, Check
or organizational e-mail ID and password Point suggested the following practical precautions:
• Once the login credentials were entered, the user 1. Beware of lookalike domains and double check
was led to a real PDF report published by renowned spelling errors in emails and websites.
Pooja Tikekar global consulting firm. The final PDF left little or
no suspicion in the mind of the user because 2. Be cautious with files received via email from
Feature Writer, CISO MAG he was tricked into viewing useful information unknown senders, especially if they prompt for a
certain action you would not usually do.
Security professionals find it difficult to identify or 3. Do not click on promotional links or emails. Order
detect such phishing campaigns as they are hosted goods from authentic sources.
on public cloud services.
4. Beware of “special” offers. “An exclusive cure for
“During all these stages,the user never gets suspicious coronavirus for $150” is usually not a reliable or
since the phishing page is hosted on Google Cloud trustworthy purchase opportunity.
Storage. However, viewing the phishing page’s source
5. Do not reuse passwords between different
code has revealed that most of the resources are
applications and accounts.
loaded from a website that belongs to the attackers,
prvtsmtp[.]com:,” the report stated.
84 -- CISO
84 August 2020
MAG - CISO2020
- August MAG Vol
Vol44
- Issue 0808
- Issue Vol 4
Vol 4 -- Issue
Issue 08
08 August
August 2020
2020 - -CISO
CISO MAG
MAG - 85
- 85
STAY VISIBLE!
reach out to the ever growing
global infosec community
Advertise with us
86 - August 2020 - CISO MAG Vol 4 - Issue 08 Vol 4 - Issue 08 August 2020 - CISO MAG - 87
www.cisomag.com