https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
Banking Technology
  • NEWSLETTER
  • Home
  • News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webcasts
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Editorial Submissions
    • Advertise
    • Strategic Partners
  • IOT World Events
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Health Care
  • Retail
  • Analytics
  • Architecture
  • Engineering/Development
  • Security
  • Home
  • News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webcasts
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Editorial Submissions
    • Advertise
    • Strategic Partners
  • IOT World Events
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Health Care
  • Retail
  • Analytics
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Q&A: Cisco Exec Dishes on Industrial IoT Security and DeOS

A Cisco exec shares his thoughts on industrial IoT security and cyberattacks designed to destroy rather than extort.
  • Written by Brian Buntz
  • 11th July 2018

It’s ironic that, given the popularity of such concepts as smart manufacturing, IIoT and Industrie 4.0, that many industrial and enterprise organizations don’t have full visibility of the Internet of Things devices on their networks. A Ponemon Institute survey from earlier this year revealed that 44 percent of the respondents — hailing from a variety of industries — stated they had an inventory of IoT devices.

The lack of visibility is anathema from a cybersecurity perspective, but the situation is even more vexing in many connected industrial environments, where cybersecurity events can cause plant shutdowns, injuries or worse.

A considerable number of Cisco’s industrial customers request help getting visibility into their network environment and the connected devices within it, said Jon Stanford, principal for industrial security and IoT solutions at Cisco Advanced Services.

In the following interview, Stanford shares his thoughts on how the current state of industrial IoT security affects Industrie 4.0 adoption and dishes on what Cisco terms “destruction of service,” attacks, which are designed to not just extort money out of victims as is the case in ransomware, but also annihilate systems and data.

How do you see the current state of industrial IoT security impact adoption of smart manufacturing and IIoT in general?

A lot of your C-level folks [in the industrial space] still want to reach a starting point in cybersecurity before they greenlight investments [in IIoT and] before they start prioritizing security spend.

That’s significantly different from traditional IT environments?

In IT environments in your traditional enterprise space, most organizations have a pretty good handle on [conventional computing devices]. They know what they’re managing, what’s user-owned, what’s company owned. But when it comes to the broader IoT equation, it can be very much a different ballgame depending on the vertical a company sits in.

What can you tell me about destruction-of-service attacks?

We first mention destruction-of-service (DeOS) attacks in the Cisco Midyear Cybersecurity Report 2017. Destruction of service is an extension of traditional ransomware platforms. It seems to take your traditional ransomware malware packages and adds a malicious flavor to it.

Traditional ransomware bricks computers, but its objective is not destruction. It’s monetization. It extorts money.

This DeOS concept comes in and says: ‘Ransomware seems to work great to strong-arm a victim, but why don’t we amp that up? Instead of just extorting money, let’s create a platform for destructive intent. Our objective is to wipe you out.’

What changes do you see with IoT-based botnets since Mirai hit in 2016?

In 2016, Mirai was an eye-opener because of the extent and how it flooded the internet with traffic. Mirai was somewhat lightweight in the sense that it uses a password guessing algorithm.

What’s happened since then is we have seen some other botnet malware flavors come out like Reaper for example. Reaper comes along and says: ‘Well, we’ll do all [of what Mirai di], but we’ll use an active exploit component.’

We’re seeing botnet platforms evolve. We’ve got botnets like Satori and Hide-and-Seek that use a business-as-a-service model. Hide and Seek is a great example. This malware continues to get more advanced over time and [cybercriminals] are now offering these platforms in a pay-as-you-go arrangement. We see that this platform approach to botnets and even ransomware continuing. These bad guys are saying: ‘You know, I have invested all of this labor into building this thing. Why don’t I just lease it out and make money off of it?’

And IoT devices are helping fuel this pay-as-you-go type malware?

Regarding IoT, it takes on different flavors depending on what you are looking at specifically, but in general, there are so many IoT devices out there globally that are interconnected and also through the internet. That just makes them an easy target. That’s what it is helping drive the development of these platforms.

What role do you see IoT-based search engines like Shodan playing in the cybersecurity landscape?

Anybody can go to Shodan use it. It has a really easy-to-use, powerful query engine built into it. You can go out there and find any number of devices globally that are hanging on the internet. They can be dumb cameras, IP cameras. They can be smart or semi-smart devices on a home network or, heaven forbid, be something in an operations environment in a production plant.

I’ve seen some recent examples like live transportation system controls that are connected the internet that are discoverable through Shodan. These IoT devices are sitting out there that are part of operational functions. The devices themselves are typically pretty easy to exploit because they are not designed with security built into them. They are very often deployed with default passwords or easy-to-guess, passwords.

Is the business model changing for cybercriminals? You mentioned earlier that you are seeing several cases of as-a-service malware. The “as-a-service” trend is also gaining in popularity in the enterprise space.

I hesitate to call it a business model. But if you were someone who is motivated to, say, extort money from a particular organization, you’ve got a couple of choices. One is for you to invest in the malware development potentially or procure it. The alternative would be for you to go to some of these malicious actors that are standing services up on the dark web. You would say: ‘Here’s my target. Here’s what I want to do.’ You could find a platform to provide that service to you.

Time will tell whether that kind of platform approach will become prevalent. I think it’s too early to say at this point. But there are signs that it might be the model of choice going forward for bad actors that want to target specific organizations.

Tags: Security Q&As

Related


  • Image of a Digital security concept
    AWS Debuts IoT Security Managed Service
    News Briefs: Service aims to better secure connected devices; plus, Siemens acquiring Mendix, the FBI’s connected devices warning and more news.
  • Trust
    Siemens’ Strategy to Secure the Industrial Internet of Things
    At a cybersecurity-dedicated press tour in Germany, several of the company’s executives were on hand to discuss its strategy to make the industrial Internet of Things trustworthy.
  • Image shows malware and binary code concept security and malware attack.
    FBI Warning: Malware Targeting Routers
    News Briefs: What the FBI is recommending if you have a small business or home office router; and more news.
  • IoT Security
    A Human Prescription to Internet of Things Security
    Implementing an Internet of Things security strategy requires confronting cultural as well as technical challenges.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Bipartisan legislation aims to boost IoT security resources
  • Funding Available for Critical Infrastructure Security
  • AWS Debuts IoT Security Managed Service
  • How Siemens’ Charter of Trust Aims to Improve Industrial Security

News


How IIoT Can Fuel Business Model Disruption

31st January 2019

IoT World Announces the First Annual IoT World Awards

25th January 2019

Linux Foundation Creates Umbrella Group for Edge Computing

  • 1
24th January 2019
view all

White Papers


Sponsored Content

eBook: Transforming Manufacturing For Growth: Gaining a Competitive Advantage With IoT

13th February 2019
Sponsored Content

Digital Transformation: Moving from Preventive to Predictive Maintenance Models in Transportation, Field, and Industrial Environments

27th December 2018
view all

Special Reports


Making Sense of 12 Smart Building Technologies

26th December 2018
view all

Galleries


5 Considerations Before Flying Taxis Take Flight

28th January 2019

IoT Predictions for 2019: Less Hype, More Pragmatism

  • 1
12th December 2018
view all

Industry Perspectives


Sponsored Content

McObject wins IoT Vendor of the Year

1st December 2018
Sponsored Content

IoT is Changing our Lives: An Interview with Piotr Zajac, CEO, Untitled Kingdom

  • 1
9th May 2018
view all

Events


Data Center World

19th March 2019 - 22nd March 2019
Phoenix Convention Center, AZ

Container World

17th April 2019 - 19th April 2019
Santa Clara Convention Center, CA

Internet of Things World

13th May 2019 - 16th May 2019
Santa Clara Convention Center, CA

IoT World Europe

12th June 2019 - 13th June 2019
ExCel, London

Smart Cities Summit

31st October 2019 - 1st November 2019
Sheraton, Atlanta, GA

Industrial IoT World

31st October 2019 - 1st November 2019
Sheraton, Atlanta, GA
view all

Twitter


IoTWorldToday

The sprawling #IoT market has had more than 10 years to establish standards and best practices to move it forward.… twitter.com/i/web/status/1…

20th February 2019
IoTWorldToday

Until fairly recently, it seemed like relatively few industrial organizations suffered #cyberbreaches, see how it's… twitter.com/i/web/status/1…

19th February 2019
IoTWorldToday

Trusted #PlatformModules are poorly understood by many, well understood by few --> bit.ly/2GwmypT #IoTSecurity

19th February 2019
IoTWorldToday

The Impact of #IoT and #AI in the health care field --> bit.ly/2EcgQqF

15th February 2019
IoTWorldToday

Get your free pass to the world's largest #IoT exhibition → spr.ly/6019ErSm3 Join 12,500+ like-minded profe… twitter.com/i/web/status/1…

13th February 2019
IoTWorldToday

#IoT and #machinelearning in the retail industry --> bit.ly/2E6CnkJ #onlineshopping #ecommerce #AI bit.ly/2E5DgtV

12th February 2019
IoTWorldToday

Emerging technologies such as #AI and #IoT offer “endless” possibilities for industrial companies--> bit.ly/2teZYcx

8th February 2019
IoTWorldToday

RT @Nerdery: “A lot of innovators are trying to innovate on top of, but not with the healthcare value chain.” Director of Strategy @taqee h…

8th February 2019

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

IoT World Today

© IoT World Today 2019. All rights reserved.

  • About Us
  • Contact
  • Cookies Policy
  • Privacy Statement
  • Terms of Service

Follow us

Websites are now required by law to gain your consent before applying cookies. We use cookies to improve your browsing experience. Parts of the website may not work as expected without them. By closing or ignoring this message, you are consenting to our use of cookies.
X