https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Why IoT Hacking Can Be Like Ocean’s 11

IoT security is not a game you are going to win. But if you don’t play that game, you also lose. The way forward is to think like a hacker, says visionary cybersecurity expert and innovator Pablos Holman, who is keynoting the IoT Emerge event in Chicago.
  • Written by Brian Buntz
  • 12th August 2016

If you build it, they will come.

There is a lesson to be learned from that line from Field of Dreams and the history of the Internet itself. If you create software and put it online, it could attract hackers eventually. The Internet of Things expands this principle, potentially giving hackers tens of billions of new targets.

But that shouldn’t deter companies from implementing IoT technologies, says noted hacker Pablos Holman (pictured below), who is speaking at IoT Emerge, scheduled for November 2-4 in Chicago. Because the potential business benefits of the IoT are substantial, taking a “sit and wait” approach to the technology can be fatal in this competitive marketplace. Instead, companies should map out a strategy that weighs the risks involved in being either too slow or quick in reaching the marketplace, Holman says. And instead of being fearful of hackers, they should study how they work. Cyberattacks are often as predictable as the plots of bank heist films. It turns out that there are only so many ways to launch a cyberattack, just as there are only so many ways to rob a bank.

Hacking Hackers

Businesses should come to view security as a game—one that often follows a limited number of scripts. Learning a hacker’s mindset—how to break into things as well as how to break them—can help you build better products and help you avoid being a victim.

While mainstream media tends to focus on the potential of destructive security breaches, few hackers would be interested in orchestrating such attacks. Most hackers are risk averse and would prefer to avoid doing anything that would expose their position. “Most sophisticated hackers are just going to hide and watch everything you do and learn as much as they can,” Holman says. “They are going to look for something you could use as a competitive advantage, or to know when to short your stock or something like that. They do not want to get caught.”

Hackers also tend to favor easier targets rather than go after specific individuals or companies—just as sharks look for weak prey. To illustrate this principle, Holman says that merely taking a Windows 98 computer and plugging it into the Internet will attract an attack. “It is going to get owned in 23 seconds by automated hacking robots that just look for these things. Hackers don’t care what is on that machine, but it is so easy to take over, it has become systematized,” he said. “They then can use use it to launch harder and more sophisticated attacks against Windows 9 machines that are on the same network.”

Hackers can use the same modus operandi with IoT devices. “You plug in a webcam—which is a good example of an early IoT device. It is going to get automatically owned by a robot,” Holman says. “And they then have something in their local network that they control and can start using that as a platform to start attacking other systems. They don’t even care what the video is showing.”

Putting Out Bait for Hackers

Holman recommends coming up with an active defense plan to thwart hackers. One example of that is the use of honeypots—fake targets that are easy to break into—to monitor when hackers try to break into your IoT network. “As soon as I see somebody get into it, I know it is an attacker, and then I can watch him,” Holman says. “Or I can put up a few fake security cameras with poor security and see what happens there. It’s bait.”

In the security camera example, you could assume that a fairly sophisticated hacker would want to overwrite its history and replace it with fake video footage. You could then monitor for anyone trying to do that. “This is what defense is about now,” Holman says. “Security guys know how to think through the threat model and what the problems are going to be and craft defense that is appropriate. It is a war of escalation. You are never going to be done.”

Why Watching Bank Heist Films Can Help You Understand Security

Hackers are relentless. But most cyberattacks follow scripts that are as predictable as Hollywood movies, Holman says. Even Stuxnet—a super-virus developed by Israel and the United States to destroy Iran’s nuclear centrifuges around 2010—was predictable in its own way.  “In some way, Stuxnet sounds incredibly sophisticated. But in the end, it is the same thing as the Italian Job or Ocean’s 11,” Holman explains. “It is the same thing as the bank heist that you have seen every year for your whole life.”

Stuxnet worked by recording normal activity from a nuclear facility. During the attack phase, in which it systematically attacked nuclear centrifuges, it replayed the normal log activity, to give operators the impression that nothing was wrong. “This is basically the same as those old heist movies where they plug a VCR into the security camera feed, so the security guard is watching a loop of nothing going on during a bank robbery,” Holman says. “That is what Stuxnet did. It recorded when everything was fine and then played that back when, on the back end, it was destroying centrifuges.”

While Stuxnet may be a unique example, there are a limited number of scripts that hackers follow. “If you know the script, you can guess where people are going and what they are going to try,” Holman says. “You can figure out what you need to monitor for to determine if somebody is trying to get into your network before they do.”

That doesn’t mean you should be afraid. “Nothing scares me anymore. That is what you learn. At some point, when you see someone launching a cyberattack, you recognize that you have seen that script before,” Holman says. “You have to play the game, and that game is pretty well defined. And that it is possible to make sure that you are not the low hanging fruit.”

Tags: Article Security Features

Related


  • Image shows welding robotics and a digital manufacturing operation.
    IoT Supply Chain Vulnerability Poses Threat to IIoT Security
    The supply chain provides building blocks for IoT but also vulnerabilities. IT pros need to ward against malicious attacks that exploit supply chain security gaps.
  • IoT Security Needs Pen Testing Approach
    IoT pen testing is a no-brainer, say experts. But don’t test everything.
  • Image shows a digital background depicting innovative technologies in security systems,
    Securing IoT Devices With Zero Trust Requires Mindset Shift
    Zero-trust approaches require a shift in mindset to ensure IoT devices have rigorous security policies applied — and the work is never done, say IT pros.
  • An Integrated Approach to IoT Security
    This e-book provides a comprehensive framework to help organizations reduce risk in IoT products and environments.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Common Internet of Things Security Pitfalls 
  • Can Privacy-Preserving Machine Learning Overcome Data-Sharing Worries?
  • Developing a Critical Infrastructure Cybersecurity Strategy
  • Addressing IoT Security Challenges From the Cloud to the Edge 

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

The eSIM Cookbook – Towards the Next Generation of Connected Devices

22nd February 2021

eSIM Delivers Greater Freedom for OEMs – by Beecham Research and Truphone

22nd February 2021

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

Weber’s Journey: How a Top Grill Maker Serves Up Connected Cooking

25th February 2021

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

IoT Remote Monitoring Helps Enterprises Traverse COVID-19 and Beyond dlvr.it/RtZ3K5 https://t.co/owJXYf1gkO

26th February 2021
IoTWorldToday, IoTWorldSeries

Securing the Industrial Internet of Things dlvr.it/RtYfYk https://t.co/khUn79dvQD

26th February 2021
IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD sponsor, @BluetoothSIG — the global standard for simple, secure wireless connections. ➕ Le… twitter.com/i/web/status/1…

26th February 2021
IoTWorldToday, IoTWorldSeries

How IoT Devices Can Enhance the Connected Customer Experience dlvr.it/RtPcvS

24th February 2021
IoTWorldToday, IoTWorldSeries

🤝 Meet #EIOTWORLD speaker Ingo Feldner, Project Lead for Virtual #Hardware Platforms at @RobertBoschGmbH 📅 Join hi… twitter.com/i/web/status/1…

24th February 2021
IoTWorldToday, IoTWorldSeries

Developing IoT Applications with Rust: Using a Rust Development Environment dlvr.it/RtNqrk https://t.co/wOmnoz2UVT

24th February 2021
IoTWorldToday, IoTWorldSeries

Chip-Enabled Edge AI Drives Next-Gen IoT dlvr.it/RtKcMQ https://t.co/dLjBzE6Qei

23rd February 2021
IoTWorldToday, IoTWorldSeries

The eSIM Cookbook – Towards the Next Generation of Connected Devices dlvr.it/RtG5bB https://t.co/5kXa8Pnv4T

22nd February 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X