Week 6_IoT Security Vulnerabilities
Week 6_IoT Security Vulnerabilities
Vulnerabilities
Dr. Hakan Kılınç
[email protected]
IoT Vulnerabilities
Vulnerability
• A software flaw in a system
• A hacker can exploit the flaw
• Gain unauthorized access to an asset
Architect
• Follow codes and standards
• Ensure safety for the client
However,
• Recent Testing
• 25% of devices tested had weaknesses
• Each device had approximately 750
exploitable flaws.
• It is not limited to a single vendor or
device
No Malware Needed
• Main Vulnerabilities
• Outdated firmware,
• Default username and password,
• Outward-facing
• Exposure to the Internet
• No firewall protection
No Malware Needed
Security Recommendations
• Resist attacks
• Have access control,
• Require data authentication
• Ensure confidentiality
Best Practices
• Make sure you have the latest firmware
• Block internet access to the device
Bugs and
Compatibility Issues
IoT Devices
• Small and simple,
• Unable to upgrade,
• Have outdated firmware,
• Unable to modify
Commonality
• If one type of a device is vulnerable, most likely
similar devices will have the same vulnerables
and can fall victim to the same types of
attacks.
Operating Systems
• Security patches and updates are not available
on many IoT applications
Device Life
• Simple IoT devices have a long shelf life and
may possibly outlive support for the device
Bugs and Compatibility Issues
IoT Bugs
• Disruptions in the way the device behaves
• It might not work properly, or shut down
unexpectedly
• Errors in the operating system, flaws in the code,
or even malware can cause erratic behavior
• The severity of failure due to these issues could
range from mild to significant
Bugs and Compatibility Issues
• Mirai Bot
• Weaponized millions of IoT
devices
• Launched a massive DDoS
attack at Dyn’s infrastructure
• Blocked legitimate users from
obtaining IP addresses
• Slowed Internet traffic to a
crawl
• Hackers have morphed the IoT
botnet Mirai to do bitcoin mining
• They infect the vulnerable devices
and send any bitcoin mining results
to the hackers.
Thanks