IOT - RISE OF NEW
ZOMBIES ARMY
Muhammad Faisal Naqvi
CISSP, CISA, AMBCI, ITIL, ISO 27001 LA
ABOUT MYSELF
• Muhammad Faisal Naqvi
• CISSP, CISA, AMBCI, ITIL, ISO 27001 LA & MI
• MS (IT) E-Commerce (Gold medal)
• Over 19 years of Experience Including:
• Information Security Officer, Union Coop, UAE
• Manager, EY – Ernst & Young
• Discovered many Zero-day Vulnerabilities
• Author of ISACA Journal
• Author of Government Regulations
• Linkedin: www.linkedin.com/in/mfaisalnaqvi/
IOT
INTERNET OF THREATS
OR
INSECURITY OF THINGS
IOT – INTERNET OF THINGS
• Smart Devices
• Tiny card size
• Fully powered computers
• Connected to internet
• As cheep as $5
TYPICAL IOT EXAMPLES
• Home Appliances/
Tooth brushes
• Vehicles/ Parking
Spaces/ Signals
• Bulbs/ Switches
• Censors
• Animals Tracking
• Cameras
• Door Locks
• Medical Devices
• Billions of Devices
IOT SECURITY STATISTICS
IOT SECURITY STATISTICS (CONT.)
IOT ATTACKS
• Privacy Leakage
• Spam Mails
• Smart Meters Hacking
• IoT Ransomware
• DDoS
DYN DNS DDOS ATTACK
• Largest DDoS attack on Record
• Oct 2016
• Tens of millions of Zombies
• Magnitude of 1.2 Tbps
• Mirai Malware
• Twitter, Visa, PayPal, Amazon, BBC, CNN, Fox, HBO, Netflix, Swedish Govt., Verizon,
Business Insider, The Guardian, HostGator, NY Times, Playstation, Shopify, Starbucks,
Wall Street Journal, Xbox
FUTURE POSSIBLE IOT DDOS ATTACK
IoT DDoS
OWASP IOT TOP TEN
1. Insecure Web Interface
2. Insufficient
Authentication/
Authorization
3. Insecure Network
Services
4. Lack of Transport
Encryption
5. Privacy Concerns
OWASP IOT TOP TEN (CONT.)
6. Insecure Cloud Interface
7. Insecure Mobile Interface
8. Insufficient Security
Configuration
9. Insecure Software/
Firmware
10. Poor Physical Security
IOT ARCHITECTURE
IOT - MITIGATING RISKS
• Established, reputable
brands.
• Automatic updating
• Change passwords
immediately
• Network segregation
• Avoid free networks
• Disable UPnP Protocol
on Router
IOT SECURITY CHALLENGES
• Large Number
• Many Software/
Firmware/ Hardware/
Devices
• Lack of Standardization
• Less Resources for
Complex Encryption
• Can't install Antivirus/
Security Software
• Through 2018, over 50%
of IoT device
manufacturers will not be
able to address threats
from weak authentication
practices. Gartner
IOT PROTECTION BEYOND ENDPOINT SECURITY
• JS Challenge
• Device Fingerprinting
• Canvass Challenge
• IP Rate Limiting
• Human Interaction
Challenge
• Captcha Challenge
• Content Delivery Network
• Blacklisting by ISP
FINAL WORDS
THANK YOU
Muhammad Faisal Naqvi

IoT - Rise of New Zombies Army

  • 2.
    IOT - RISEOF NEW ZOMBIES ARMY Muhammad Faisal Naqvi CISSP, CISA, AMBCI, ITIL, ISO 27001 LA
  • 3.
    ABOUT MYSELF • MuhammadFaisal Naqvi • CISSP, CISA, AMBCI, ITIL, ISO 27001 LA & MI • MS (IT) E-Commerce (Gold medal) • Over 19 years of Experience Including: • Information Security Officer, Union Coop, UAE • Manager, EY – Ernst & Young • Discovered many Zero-day Vulnerabilities • Author of ISACA Journal • Author of Government Regulations • Linkedin: www.linkedin.com/in/mfaisalnaqvi/
  • 4.
  • 5.
    IOT – INTERNETOF THINGS • Smart Devices • Tiny card size • Fully powered computers • Connected to internet • As cheep as $5
  • 6.
    TYPICAL IOT EXAMPLES •Home Appliances/ Tooth brushes • Vehicles/ Parking Spaces/ Signals • Bulbs/ Switches • Censors • Animals Tracking • Cameras • Door Locks • Medical Devices • Billions of Devices
  • 8.
  • 9.
  • 10.
    IOT ATTACKS • PrivacyLeakage • Spam Mails • Smart Meters Hacking • IoT Ransomware • DDoS
  • 11.
    DYN DNS DDOSATTACK • Largest DDoS attack on Record • Oct 2016 • Tens of millions of Zombies • Magnitude of 1.2 Tbps • Mirai Malware • Twitter, Visa, PayPal, Amazon, BBC, CNN, Fox, HBO, Netflix, Swedish Govt., Verizon, Business Insider, The Guardian, HostGator, NY Times, Playstation, Shopify, Starbucks, Wall Street Journal, Xbox
  • 12.
    FUTURE POSSIBLE IOTDDOS ATTACK IoT DDoS
  • 13.
    OWASP IOT TOPTEN 1. Insecure Web Interface 2. Insufficient Authentication/ Authorization 3. Insecure Network Services 4. Lack of Transport Encryption 5. Privacy Concerns
  • 14.
    OWASP IOT TOPTEN (CONT.) 6. Insecure Cloud Interface 7. Insecure Mobile Interface 8. Insufficient Security Configuration 9. Insecure Software/ Firmware 10. Poor Physical Security
  • 15.
  • 16.
    IOT - MITIGATINGRISKS • Established, reputable brands. • Automatic updating • Change passwords immediately • Network segregation • Avoid free networks • Disable UPnP Protocol on Router
  • 17.
    IOT SECURITY CHALLENGES •Large Number • Many Software/ Firmware/ Hardware/ Devices • Lack of Standardization • Less Resources for Complex Encryption • Can't install Antivirus/ Security Software • Through 2018, over 50% of IoT device manufacturers will not be able to address threats from weak authentication practices. Gartner
  • 18.
    IOT PROTECTION BEYONDENDPOINT SECURITY • JS Challenge • Device Fingerprinting • Canvass Challenge • IP Rate Limiting • Human Interaction Challenge • Captcha Challenge • Content Delivery Network • Blacklisting by ISP
  • 19.
  • 20.