CyberWire Daily - The security implications of cloud infrastructure in IoT. [Research Saturday]

Episode Date: March 21, 2020

Cloud computing is now at the center of nearly every business strategy. But, as with the rapid adoption of any new technology, growing pains persist. The key findings in these reports shed light on se...curity missteps that are actually in practice by organizations across the globe. Joining us in this special Research Saturday are Palo Alto Network's Matthew Chiodi and Ryan Olson. They discuss their findings in two different threat reports.  The research can be found here: Cloud Threat Report IoT Threat Report Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyber Wire Network, powered by N2K. of you, I was concerned about my data being sold by data brokers. So I decided to try Delete.me. I have to say, Delete.me is a game changer. Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data privacy is protected. Delete.me's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life Thank you. JoinDeleteMe.com slash N2K and use promo code N2K at checkout. The only way to get 20% off is to go to JoinDeleteMe.com slash N2K and enter code N2K at checkout. That's JoinDeleteMe.com slash N2K, code N2K. Hello, everyone, and welcome to the CyberWire's Research Saturday.
Starting point is 00:01:36 I'm Dave Bittner, and this is our weekly conversation with researchers and analysts tracking down threats and vulnerabilities and solving some of the hard problems of protecting ourselves in a rapidly evolving cyberspace. Thanks for joining us. And now, a message from our sponsor, Zscaler, the leader in cloud security. Enterprises have spent billions of dollars on firewalls and VPNs, yet breaches continue to rise by an 18% year-over-year increase in ransomware attacks and a $75 million record payout in 2024. These traditional security tools expand your attack surface
Starting point is 00:02:19 with public-facing IPs that are exploited by bad actors more easily than ever with AI tools. It's time to rethink your security. Zscaler Zero Trust plus AI stops attackers by hiding your attack surface, making apps and IPs invisible, eliminating lateral movement, connecting users only to specific apps, not the entire network, continuously verifying every request based on identity and context, simplifying security Thank you. your organization with Zscaler Zero Trust and AI. Learn more at zscaler.com slash security. So one of the things that we've really observed over the last, let's say, year and a half is just this great shift in how organizations are building their cloud infrastructure. That's Matt Chiodi. He's chief security officer for public cloud at Palo Alto
Starting point is 00:03:32 Networks. Matt Chiodi is going to be discussing the cloud threat report from Unit 42. Later in the show, he'll be joined by Ryan Olson. He's VP of threat intelligence at Palo Alto Networks, and he leads Unit 42. He's going to Threat Intelligence at Palo Alto Networks, and he leads Unit 42. He's going to be discussing the Unit 42 IoT Threat Report. Here's Matt Chiodi on the Unit 42 Cloud Threat Report. So let me give you an example. So in the past, if I was a developer or if I was someone in IT, and I needed to go and provision cloud infrastructure, right? So think of, you know, to go and provision cloud infrastructure, right? So think of, you know, AWS, Azure, Google, in any one of those environments. In the past, I would have to go and manually create things, right? So I'd have to log into a cloud console. I need to, you know, click here to create a new server, click here to create networking, click here to create storage. Well, what's radically changed
Starting point is 00:04:21 is this move toward infrastructure as code or IAC, infrastructure as code templates. And it sounds fancy, but really all infrastructure as code templates do is they create the basic building blocks for how cloud infrastructure is largely now created. And that's a good thing. And that's a good thing. But what we found was we wanted to look at what are the security implications of moving towards this infrastructure as code. And again, all that means is that instead of me going out and manually creating cloud infrastructure, I now designed on a whiteboard, I put it into code, and I can now reuse that template as many times as I want. Now, the security implication comes here, is that what we've known from both past research and also from this most recent report is that poor cloud security practices are rampant. One of the headlines that we kind of found as we sifted through just petabytes of data
Starting point is 00:05:20 is that we found over 200,000 insecure templates in use. So again, these are those infrastructures, code templates. Some people might recognize the term like, for example, AWS has its own cloud formation templates. HashiCorp makes something called Terraform. Azure has ARM templates, right? Each one has their own proprietary template. What we found specifically was our research team went out and we did the first ever large-scale study of these templates. So what we did was we went out to GitHub, we used their searching API,
Starting point is 00:05:54 and we literally downloaded hundreds of thousands of these templates. And then we ran it through our Prisma Cloud API scanner, which looks at templates for common misconfigurations and vulnerabilities. And this is where we really started to get the data that we'll talk about here over the next couple of minutes. Now, when you say that these templates come with insecurities, I suppose there's a spectrum of seriousness to those issues, yes? Absolutely.
Starting point is 00:06:27 And so not everything that we found was a massive criticality. But in that 200,000 number, each of those templates had at least one or more medium or high severity vulnerability. So an example of a high severity vulnerability, what we would consider a high vulnerability, a high severity vulnerability would be, for example, if a template exposed a database to the public internet. That's an example of a template creating a high severity vulnerability. Another example could be a infrastructure as code template that exposes an S3 bucket to the public internet, right? And of course, there's pieces of it that also come into that as well. But those are just some kind of very high level examples of what we would consider a high or maybe even a medium
Starting point is 00:07:17 severity vulnerability. Of course, it depends upon the type of data that's also behind that, right? But from just analyzing just this massive number of templates, which has never been done before in the industry, we were able to kind of pull some of these statistics out. So let me give you another example of what we saw in there, right? We found that, again, by analyzing this massive number of infrastructure as code templates, we found that about 43% of cloud databases are not encrypted. This is important, right? Because unencrypted cloud databases can lead to data breaches, right? And MoviePass is a recent example of that. So there's just things that obviously,
Starting point is 00:07:59 even with not having databases encrypted, depending upon the nature of the data, there could be compliance issues there as well, right? Things like PCI and HIPAA all require encryption of that type of sensitive data. Yeah, one of the other key findings that you highlight here is that 60% of cloud storage services, they have logging disabled. That really struck me. What's behind that number? Well, obviously, I don't believe it's intentional, right? I think this is one of those things where
Starting point is 00:08:29 a lot of times you have developers that are creating these code templates, right? And they're creating it for development environments. They're trying to make sure things work. And when you do that in development, a lot of times, you know, you turn certain things off, right? Logging, although the cost in the cloud is very, very low compared to what it used to be on premise, there's still a cost with it. And so, you know, one of our things that, you know, we've kind of taken away from this is that probably it was left that way from development. And when it was then carried over into production, there was then no scrutiny as to, hey, we need to have logging enabled, right? Because obviously, when cloud logging is disabled, attackers could enter a cloud storage system
Starting point is 00:09:12 and an organization would never know. So think about if there was some type of data breach. If that would happen to an organization and they don't have cloud storage logging turned on, how would they be able to disprove or prove that there was or was not a breach? It's really important, and it's if not even impossible, to do any type of what we would call attribution if you don't have a record. And if you think about what a less maybe digital example
Starting point is 00:09:42 would be is, if you're entering, for example, a storage facility, when you walk in there from a physical security perspective, you have to typically log in, who it is, how long you were there. It's the same thing with cloud storage. If those services are disabled, you don't know who entered, who accessed, and it becomes really difficult to understand what has happened in your environment should there be any type of breach. Now, one thing that you're doing here that's quite useful to understand what has happened in your environment should there be any type of breach.
Starting point is 00:10:08 Now, one thing that you're doing here that's quite useful is you're tracking some of the changes that have occurred since the last time you reported on this. Can you take us through some of the things that you're looking at here? Absolutely, yeah. So I think, you know, one of the things that we try to keep consistent between the cloud throughout reports is what has changed, right? So we try to, you know, obviously look at some new angles like we did in this most recent spring 2020 cloud threat report, which was the big focus on DevOps practices and infrastructure as code. But certainly one of the things that we looked at as well, just, you know, how are things either changing, staying the same, or hopefully, you know, not getting worse. But what we found in this report was, so SSH, right? SSH
Starting point is 00:10:46 still remains the primary protocol by which administrators get into remote systems, right? So SSH operates on port 22. What we found from this research here is that about 76% of organizations are exposing SSH to the entire internet. That is not a best practice, right? Because in this case here, if I expose an SSH server to the entire internet, that means that anybody can attempt to access it. Anybody can attempt to brute force it. And in terms of trending, we found that this number was actually up by about 20% compared to our last report, which I believe came out in July of 2019. So unfortunately, the number around SSH is trending in the wrong direction. Now, SSH tends to be very much weighted towards Linux,
Starting point is 00:11:39 Unix-type systems. Certainly, there's ways to port it over to Windows. But from a Windows server perspective, Windows servers are typically, ways to port it over to Windows. But from a Windows server perspective, administration is typically done over RDP or port 3389. And when we looked at that statistic, we found, unfortunately, that's up even more. That's up about 30% compared to our last one. So just about 69% of organizations are exposing RDP to the entire internet.
Starting point is 00:12:06 So again, neither of those things are, we would call those worst practices. Those are things you should not be doing. Now, on a positive side, one of the things that we looked at in our 2019 report was the use of TLS or transportation layer security. And a lot of times, you know, if people aren't that familiar with it, it's usually if you look up at your browser, if you go to a bank site, you see that little lock. That's really what we're talking about there, that secure lock. What we had found was that we looked at the different versions
Starting point is 00:12:36 that are in use out there of TLS. And this is the good side of it. So we found that this time, only 27% of organizations are using outdated versions like TLS 1.1, right? So 1.1 was abandoned all the way back in 2008. What we found in this report was that number, thankfully, was down about 34%. So hopefully our goal is,
Starting point is 00:13:00 and hopefully this is what we'll see when we do our next report sometime in the fall, is we'll see that number hopefully be down in the teens, if not even lower. This is a really good thing, both from a customer security and a privacy perspective. When it comes to those numbers going up for your SSH and your RDP, do you have any speculation as to what would be driving such a noticeable increase in that? You know, I think all of these things, we like to really sit back and try to think,
Starting point is 00:13:33 okay, what could be the case? And I think that when we look at what has been put out there in terms of services by the cloud service providers, up until even just a few months back, there really wasn't any kind of commercialized offering ways to remotely administer your environment. And so I think a lot of organizations were really building their own, what we would call either a bastion host or a server where they can kind of get in and then access the rest of their environments. Why it went up from
Starting point is 00:14:01 the last report, I would say we don't have a really good view into that. But I do believe that what we're going to see to the next report, I think we're going to start to see these numbers go down. Simply because, for example, Azure came out with their Azure Bastion host service, which is now they're offering a secured lockdown way that they secure it.
Starting point is 00:14:21 They offer this as a service to their customers. And I think now we will hopefully see organizations start to move over to those services so they don't have to manage it themselves or not managing the patches and that. So our goal and our hope is that over the next couple months, organizations will begin to adopt these types of services and that should then have these numbers come down.
Starting point is 00:14:42 All right, well, Matt, stand by. I'm going to bring in Ryan Olson here. He is also from Palo Alto Networks from Unit 42. We're going to switch gears a little bit and talk about your 2020 Unit 42 IoT threat report. Let's start in a similar place here. What prompts the creation of this report? Yeah, so last year we acquired a company called Zingbox who is focused on IoT. What Zingbox does is identify network traffic and look at network traffic to try to identify the devices, the IoT devices that are actually creating that traffic. So they can look at packets that are passing by and say, this looks like a camera or this looks like a medical imaging device. this looks like a camera, or this looks like a medical imaging device. And then based on that information, they classify them and help their customers put them into the right security model
Starting point is 00:15:30 so they can say, hey, this is a device that doesn't necessarily need to go and talk to the entire internet and make changes in that way. We've been integrating Zingbox's technology into the Palton Network's next-gen firewall over the last few months. And what we decided to do was look at the data that they'd collected in 2019 from about 1.2 million IoT devices. There were in enterprises and a lot of them in medical situations and break it down to understand what kind of vulnerabilities do they have and really what kind of security posture are all these devices seeing inside these enterprise and hospital environments. Yeah, you've got some really interesting insights to share here. Take us through some of the key findings. Yeah, so a lot of the story around the current setup for IoT is things that are just insecure
Starting point is 00:16:16 by default. And in general, people who don't have good visibility into the devices they're actually deploying inside their network. So a couple of the stats that we found especially concerning, but shouldn't be super surprising to anyone, the biggest one was the number of devices that are now running out-of-date operating systems, especially in the IoT medical imaging world. What we found was 83% of medical imaging devices, these are things like CT scanners, MRIs, x-rays. 83% of them are now running an out-of-date operating system, an operating system that's no longer supported.
Starting point is 00:16:52 And that number kicked up massively by about 56% in January when Windows 7 went out of support. When that changeover happened, it meant that all these devices, which are running Windows 7, a lot of people don't really think about the fact that a medical imaging device or other kinds of IoT devices are really running. They're just little computers, sometimes big computers, and they're running normal operating systems, and they can interact with other network systems in the same way. By running this very out-of-date system, so out-of-date that it can no longer even get updates from Microsoft, it puts them at a significant risk. And there's a lot of reasons why they run these old operating systems, but the issue is just becoming larger and larger as more of them become out-of-date. Another interesting stat you shared is that nearly all of the IoT device traffic runs unencrypted.
Starting point is 00:17:46 Yep. So 98% of the traffic we identified was unencrypted, meaning it's not running over TLS like Matt was talking about before. And while you might not think about that being a big problem, presumably a lot of this traffic is just staying inside the network, so people aren't sniffing it like they might be banking credentials. All of it is potentially compromisable at that point. If someone was able to sniff it or someone was able to sort of become a man in the middle, they can make modifications to that traffic. I think it speaks more to the underlying development process
Starting point is 00:18:19 for these IoT devices. Most of the traffic we see across the internet is TLS encrypted at this point. But because the developers of these IoT devices aren't making that choice in the vast majority of cases, it speaks to the fact that they're not thinking necessarily about the security of these devices from the beginning.
Starting point is 00:18:39 That's obviously clear from running these old, out-of-date operating systems, but even more clear by the fact that they're choosing not to even offer this base level of encryption of the traffic. Yeah, one of the things that you track here in your research are the top IoT threats. I mean, take us through what you're seeing here. Yeah, so we see a lot of different threats impacting IoT devices, and it really comes down to either insecure operating systems and software, meaning people don't have things patched, they don't have updates being applied to them, or insecure configurations by default. So a lot of IoT devices also have insecure passwords by the way they're set up, wireless
Starting point is 00:19:20 routers, cameras, other kinds of devices you'll typically find in an enterprise. By default, they simply don't have a secure configuration initially. On the flip side of that, we're seeing attacks as well against these devices. And the kinds of attacks that you'd expect to see against normal computers, it's just impacting these IoT devices. So things like ransomware, backdoors that are being installed on the devices, malware that's being installed so it can be used for launching DDoS attacks, things that are being used to mine cryptocurrency. All of these threats that we generally think of applying just to computers, they also apply to these IoT devices that are deployed all over networks, oftentimes in larger numbers than actual computers inside an enterprise.
Starting point is 00:20:04 oftentimes in larger numbers than actual computers inside an enterprise. Where do we stand in terms of organizations having a good inventory of all these devices, what they have, and what's running on them? You know, that's actually the biggest challenge that most organizations are dealing with when they're starting to think about IoT. When I talk to a customer about their IoT security, oftentimes just having that inventory is the first step. And oftentimes they have an inventory, but it's an inventory based off of what they recorded at the time someone went and deployed it. So if the folks who are deploying these thermostats or cameras or IP phones, whatever they might be, if they record, hey, we've got this deployed, we've attached it to the network, then they have an inventory the same way that they're tracking how many cars
Starting point is 00:20:48 the company might own. But the problem with that is nearly anyone can find a way to add an IoT device to a wireless network, which means there's all these devices that are being added on a regular basis, which aren't being tracked by the IT folks. They don't know what exists. You don't have to go through the process of setting up a complicated network connection and getting a MAC address whitelisted. It's just attach it to the wireless network and suddenly it's part of your network. So the first step for everybody as they sort of start managing their IoT devices and the lifecycle of these devices is getting an accurate inventory and understanding what do you actually have inside your network. Well, Matt, I'm going to ask you to jump back in and join the conversation here. You all found some interesting crossover between these two reports. We did, yeah. And I
Starting point is 00:21:38 think what we all need to remember is that the vast majority, so IoT is made up of two different things, right? You've got the software that runs on the IoT device, and then you have the hardware. From a software perspective, most of that IoT software is being developed in the cloud, right? And the infrastructure, right? So if you have an IoT device, it doesn't matter what it is, like Ryan said, whether it's a thermostat, a camera, most of that data that's being transmitted is coming back to some type of cloud service. And that's really where that interchange is. So certainly the TLS traffic we were talking about,
Starting point is 00:22:15 there's an interplay right there. A lot of times some of these IoT devices, they don't have the same level of processing power that say a laptop or a server might have, in which case they may be using that lower level of encryption if they're doing it at all, right? And then in terms of the software that's being developed, a lot of that infrastructure is running on cloud. And so you have to look at this, not just at the device, but the entire ecosystem that's surrounding the IoT device, right?
Starting point is 00:22:45 So again, they have that backend cloud infrastructure. And from what we found, right, is also in the report was that, you know, organizations are just not yet embracing the concept of DevSecOps. So organizations have talked about it. We've talked about it a lot as an industry, but most organizations are still not to the point where they've truly wrapped security into the development process. Because if they did, we wouldn't be seeing these numbers
Starting point is 00:23:12 either on the IoT side or on the cloud side, right? And so it's our contention that when organizations, all they need to do from this perspective is, when you talk about even just starting building your cloud environment, organizations need to shift how they're doing things, right? And so we've talked about this whole concept of shift left, which is just kind of the very beginnings
Starting point is 00:23:33 of moving towards DevSecOps. And all we mean by shift left is literally about moving security to the earliest possible point of the development process. So this begins by empowering developers, giving them plugins that work directly in their integrated development environments so that if they are starting to create a piece of code,
Starting point is 00:23:54 whether maybe it's a new container they're creating, some type of new microservice, or whether it's a new infrastructure as code template that they're creating, that they get early feedback that, hey, you're introducing a new vulnerability, right? So that's kind of step one. And then obviously, as that software moves through the development lifecycle or through their CICD pipeline, that there are also other checks built in where IEC templates are being scanned, new containers that are being created are being scanned, new if they're using serverless, right? a lot of cases, it's not even containers anymore,
Starting point is 00:24:25 it's serverless. Making sure that there is scanning throughout that process and then making sure also that standards are being enforced, right? So anytime that an organization, whether it's a startup, right? A lot of times the IoT devices are being created by startups,
Starting point is 00:24:40 or whether it's an enterprise organization or a large government organization, enforcing security standards becomes extremely important. And anytime that you work at cloud scale, it requires that strict enforcement of standards. And so what we like to recommend, if an organization doesn't have a cloud security standard, that they check out what the Center for Internet Security, or CIS, has created. CIS has a benchmark available for all the major cloud platforms.
Starting point is 00:25:11 They have benchmarks available for multiple different operating systems. It's a great way to start. You know, Ryan, we often talk about defense in depth. And when I think about the interplay between IoT vulnerabilities and the cloud, it sort of strikes me as there's a potential there for a cascading vulnerability in-depth situation. Yeah, it certainly exists. So when you have devices
Starting point is 00:25:39 that are communicating with the cloud, if those get compromised, they may be a route into the IoT devices in the same way that compromising an IoT they may be a route into the IoT devices in the same way that compromising an IoT device may be a route further into the network. Once again, people not thinking about the fact that these are little computers that can run all sorts of code, whatever an attacker might want to, if they are inside your network and they're not isolated from other devices, that makes them a risk of coming into the network and being a route in, as well as being at risk from other things happening
Starting point is 00:26:07 inside the network, especially looking at the medical area. One of the things that we were investigating was the types of devices and what kinds of VLANs they're on inside of hospitals. So when you see things like medical imaging devices and infusion pumps, which are connected to the network because they're sending data back and forth and they're sending images and other things, if they're on the exact same VLAN as the doctor
Starting point is 00:26:30 who's sitting down at their computer and opening email and potentially clicking on phishing emails and opening malware, that's problematic. Because if their Windows or Mac computer gets infected with malware, it might be able to spread to those other devices in the network. And that's just completely unnecessary. These devices don't all need to be able to talk to each other all the time. And one of the stats we actually pulled for this report was the number of devices that are on separate VLANs so they can't communicate with each other. What we found was about 72% of the VLANs in healthcare environments in particular have a mixture of these IT and IoT devices, which means you do have that crossover between one device to another.
Starting point is 00:27:12 Based off of the data from this year's report compared to what we had looked at in the past, that is going down. We are seeing more and more VLANs. People are separating these devices in healthcare environments. VLANs. People are separating these devices in healthcare environments, but it's still not happening nearly at the level that it needs to because you simply don't need all these devices to be able to talk to each other in the same way that you might need other kinds of normal IT devices to do so. That's Ryan Olson. He's VP of Threat Intelligence at Palo Alto Networks. He also leads the group they call Unit 42. Our thanks to Matt Chiodi and Ryan Olson from Palo Alto Networks.
Starting point is 00:27:50 The research we discussed today was the Cloud Threat Report from Unit 42, as well as the IoT Threat Report, also from Unit 42. We'll have links to both in the show notes. And now a message from Black Cloak. Did you know the easiest way for cyber criminals to bypass your company's defenses is by targeting your executives and their families at home? Black Cloak's award-winning digital executive protection platform secures their Thank you. your executives and their families 24-7, 365 with Black Cloak. Learn more at blackcloak.io. The Cyber Wire Research Saturday is proudly produced in Maryland out of the startup studios of Data Tribe, where they're co-building the next generation of cybersecurity teams and
Starting point is 00:28:59 technologies. Our amazing Cyber Wire team is Elliot Peltzman, Puru Prakash, Stefan Vaziri, Kelsey Bond, Tim Nodar, Joe Kerrigan, Carol Terrio, Ben Yellen, Nick Valecki, Gina Johnson, Bennett Moe, Chris Russell, John Petrick, Jennifer Iben, Rick Howard, Peter Kilpie, and I'm Dave Bittner. Thanks for listening. Thank you.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.