Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users....

23
1 ©2019 Check Point Software Technologies Ltd. Joel Hollenbeck, Director of Engineering Office of the CTO Surviving the Digital Storm IoT Security DELUGE

Transcript of Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users....

Page 1: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

1©2019 Check Point Software Technologies Ltd.

Joel Hollenbeck, Director of EngineeringOffice of the CTO

Surviving the Digital StormIoT Security DELUGE

Page 2: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

2©2019 Check Point Software Technologies Ltd.

Shadow/ Unmanaged Devices

ENTERPRISE IoT/OT ENVIRONMENT HAS GROWN INCREASINGLY COMPLEX

Smart Building/Office Devices

Operational Technology (OT)

Medical Devices

General IoTMany types of devices & vendors

Different protocols and behaviours

YOUR ORGANIZATION

?

?

?

?

?

?

Page 3: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

3©2019 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees

Page 4: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

4©2019 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees

Page 5: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

5©2019 Check Point Software Technologies Ltd.

Page 6: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

6©2019 Check Point Software Technologies Ltd.

ATTACK LANDSCAPE

•Triton –Tampering with SIS systems (ME)

Dec/2017

•Industroyer –High voltage station shut down using backdoors and IEC protocol flaws (Ukraine)

2016

•Black Energy –Cut off electricity via HMI remote control (Ukraine)

2015

•Energetic bear – 3 SCADA software suppliers infected (US/Europe)

2014

•Stuxnet –Uranium production centrifuges sabotaged by compromising SCADA system (Iran)

2009

•Slammer –Attacks SIS in nuclear plant (US)

2003

Nation states heavily involved

Page 7: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

7©2019 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees

Page 8: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

8©2019 Check Point Software Technologies Ltd.

IoT/OT DEVICES ARE VULNERABLE AND EASY TO HACK

June 19: Attacker can remotely manipulate infusion pumps, either to withhold meds or dispense too much.

BD Alaris Gateway Workstation

Infusion Pump

Rockwell Energy Smart MeterFeb. 19: Power monitors used by energy companies worldwide can be remotely manipulated by hackers.

Industrial Smart Meter

Chinese-Made CamerasAug. 19: Millions Of Chinese-Made Cameras Can Be Hacked To Spy On Users.IP Camera

Page 9: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

9©2019 Check Point Software Technologies Ltd.

IoT/OT DEVICES ARE VULNERABLE AND EASY TO HACK

Weak Password

No Built-in Security

Difficult to Patch

Risk to IoT Devices Damage, manipulation, or Downtime

Risk to NetworksLateral movement infecting other systems

Page 10: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

10©2019 Check Point Software Technologies Ltd.

TRADITIONAL SECURITY SOLUTIONS DON’T CUT IT…

YOU CAN’T PROTECT WHAT YOU CAN’T SEE,

OR UNDERSTAND…

Limited Visibilityinto IoT devices and their vulnerabilities

of IoT device behavior and security Needs Insufficient Knowledge

IoT specific threat intelligence is missingNo Threat Prevention

Page 11: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

11©2019 Check Point Software Technologies Ltd.

IoT DEFENSESmart Security for Smart Devices

See All your Devices, their Attributes and Risk Level

IOT DISCOVERY & VISIBILITY

Minimize Attack Surfaces Without Disrupting Critical Processes

ZERO TRUST IOT

Block IoT Related Attacks

IOT THREAT PREVENTION

Page 12: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

12©2019 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees

DISCOVER DEVICES CONNECTED TO YOUR NETWORK

Smart Office

Printers TV VOIP Phone

Smart Building

IP Camera Smart elevatorSmart Thermostat

Operational Technology (OT)

HMI PLC Barometer

Healthcare

MRI Infusion Pump Patient Monitor

Page 13: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

13©2019 Check Point Software Technologies Ltd.

Dynamically Calculated Risk Score

[Internal Use] for Check Point employees

CLASSIFY DEVICESUSING UNIQUE IDENTIFIERS

Granular Device Attributes

Communication Patterns

Page 14: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

14©2019 Check Point Software Technologies Ltd.

Page 15: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

15©2019 Check Point Software Technologies Ltd.

Weak Password 1111

Functionality & SeverityCritical

Legacy Operating SystemWindows 95

CVECVE-2018-10601

Patient Monitor

No. Name Source Destination Service & Application Action

1 High Risk RISK=HIGH Any Any High Risk

2 Patient Monitor Patient Monitor External Zone Any Drop

IDENTIFY HIGH RISK DEVICES AND PROTECT THEM WITH RISK BASED ACCESS POLICY

Prevent From High Risk Patient Monitor To Communicate With The Internet

Page 16: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

16©2019 Check Point Software Technologies Ltd.

ONVIF Protocol VMS

IP Camera

Smart Office IoT

IDENTIFY AND CONTROLIOT/OT PROTOCOLS AND COMMANDS

ModbusProtocol

Limited to only 4 specific

CommandsSCADA Server/HMI

PLC

OT

DICOMProtocol

MRI

PACS

Medical Devices

Source Destination Service & Application

IP CAM VMS ONVIF protocol

Source Destination Service & Application

MRI PACS DICOM protocol

Source Destination Service & Application

HMI PLC Modbus protocol - read input register

Modbus protocol - read holding registers

Modbus protocol - write multiple coils

Modbus protocol - write multiple registers

Page 17: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

17©2019 Check Point Software Technologies Ltd.

A POLICY FOR EVERY IOT DEVICE ENTERPRISE IoT EXAMPLE

Application Authorized Traffic

IP Camera Video Management System

No. Name Source Destination Service & Application Action

1 IP CAM to VMS IP CAM VMS ONVIF Protocol Accepted

Page 18: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

18©2019 Check Point Software Technologies Ltd.

Virtual Patching 300+ IPS Signatures

against IoT related Threats

Powered by

PROTECT VULNERABLE DEVICES WITHOUT THE NEED FOR PHYSICAL PATCHING

Infusion Pump IP Camera PLC

Page 19: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

19©2019 Check Point Software Technologies Ltd.

Smart Office & Smart Building Protect your business from

corporate spying

IoT DEFENSENeeds to be Tailored to various IoT/OT Environments

Industrial Ensure Reliable and

safe operations

HospitalsEnsure patient safety and

data confidentiality

Page 20: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

20©2019 Check Point Software Technologies Ltd.

Page 21: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

21©2019 Check Point Software Technologies Ltd.

Page 22: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

22©2019 Check Point Software Technologies Ltd.

SECURITY GW

IP Camera

IDENTIFY AND BLOCK UNAUTHORIZED ACCESSTO AND FROM IoT DEVICES

BlockxServer Update

V Allow

Video Management Server

V Allow

Internet

Page 23: Surviving the Digital Storm - Cyber Summit USA · IP Camera Cameras Can Be Hacked To Spy On Users. ©2019 Check Point Software Technologies Ltd. 9 IoT/OT DEVICES ARE VULNERABLE AND

23©2019 Check Point Software Technologies Ltd.

POLICY ENFORCEMENT

zone 2zone 3

zone 1

§ Check Point security gateways are being deployed inside the network in order to enforce the IoT policy

§ Threat prevention engines including IPS, APPI and Anti-Bot are activated inside the security gateways in order to identify and block malicious traffic and malicious intents

North-south policy can be enforced through perimeter security gateway

East-west policy can enforced through internal segmentation security gateways