Ignore until sued

October 2016 News & Events

Recently, the world was witness to the largest distributed denial-of-service (DDoS) attack in history. Was this a nefarious plot against the world’s democracies? Perhaps a Western attack on a rogue nation? No, it was an attack on a web server belonging to Brian Krebs, security researcher and author. (You can find the story at https://krebsonsecurity.com/2016/09/the-democratization-of-censorship/.)

According to Wikipedia, “a denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.” (Read more at https://en.wikipedia.org/wiki/Denial-of-service_attack.)

The attack consisted of 620 Gbps being thrown at Krebs’ web server over a sustained period. The interesting and also frightening thing about the attack was that it was orchestrated with the help of a botnet – devices that have been compromised by malware. Krebs describes these as "Internet of Things" (IoT) devices, consisting of “mainly routers, IP cameras and digital video recorders (DVRs) that are exposed to the Internet and protected with weak or hard-coded passwords.”

We have mentioned IoT security in this column before, but it seems that many physical security companies are still living in a world where security is something they sell and not something they do. Not long ago we commented on the vulnerabilities in DVRs and cameras which had been used to launch attacks similar to this one – although not nearly on the same scale.

Well, it’s gotten worse. If your ISP provides you with a router, you can easily find the default passwords with a simple online search. The same applies to your surveillance camera and DVR and whatever ‘thing’ you have that has a password. Default passwords are a good thing. It allows installers to set up various devices easily and quickly, but they are meant as a starting point, not as an excuse for laziness.

(To be fair, I know that a few CCTV companies force you to change the default passwords when you install their products.)

I know passwords are a pain in the security, but they are there for a reason. Before the Internet you only had to worry about people on your network fooling around, today you have endless people making use of endless opportunities to hack. Whether it’s someone doing it for fun and just to see if they can, some teenager trying to prove how cool they are by breaking something, various layers of criminals looking for a quick buck (or to include you and yours in a botnet), or nation states spying on everything in existence because they can, you can no longer assume anything is secure. It is also incredibly naïve to think that if you are not famous nobody will try to take advantage. The Internet is the great leveller.

If a surveillance camera is a good enough target, so is your router at home and your CCTV camera and your cool gadget that switches the lights on when you’re close to home. When you take a step into the corporate world, things simply get worse. When your air conditioner is online so that a building management system can switch it on or off and save energy costs, will it be secured?

Insecure on demand

Like most people, I have a router at home that was supplied by my ISP. I use it to connect my computers and mobiles to the Internet, as well as cameras at home. I also use it to view the cameras in the complex I live in. Everything talks to everything very nicely.

I decided to see how secure my router was after reading this article. I shouldn’t have. I changed the default password as soon as my Internet was installed, much to the amusement of the technician who came to sort something out one day. Apparently that is seen as overkill by my ISP. Sadly, everything else is default and I can’t change it. I wouldn’t be surprised if the switches at my ISP had the username ‘admin’ as well as the password ‘admin’.

My router has no security. The default username and password to log into it remotely are hard coded (unchangeable). This is great if the original manufacturer in China wants to load the latest firmware onto the device (which of course they don’t), but the channel is there, wide open, it doesn’t even require an https connection – and you can’t change it to force https.

And by the way, the cameras and recorders in my residential complex are also set to their default passwords – and they are connected to the Internet. I was outvoted when I suggested changing them. Too much effort I guess.

Integration intershmashun

How often have you read about integration and the benefits of integrated security systems as opposed to standalone solutions? Hi-Tech Security Solutions has had its fair share of articles on this topic. We’ve even dared to speak about integration extending beyond the physical security market into the cyber security market. Next year we will get into that even more.

But I have to ask myself, which user, when purchasing an integrated solution of, for example, perimeter, intrusion and surveillance, thinks about whether the solution is secure from a digital perspective. Chances are the solution will be linked via an IP network and also connected to the Internet to allow the integrator or service provider to monitor the system’s health and the customer’s security in real time. Who else gets to have a peek?

Of course, the reason users rely on integrators and consultants is because they don’t have the knowledge to advise and design these systems themselves. The integrators and consultants are the ones who need to be aware of the dangers and advise appropriately.

The problem is the nature of the business where they want to get the job done and move on. Less effort means more profit. The bakkie brigade is renowned for this, but sadly, some of the more ‘respectable’ integrators follow the same process.

Viva users

Perhaps the solution to our lack of security is the user. They need to demand secure systems as part of their service-level agreement (SLA). This will terrify most integrators, but if there’s money at risk maybe they will pay attention to the basics. Changing the default passwords is not the ultimate security solution, but it makes it a bit harder for villains to control your devices. Taking care of other basic security processes will assist in making it even harder, and it will protect the customer from any backlash. The PoPI Act requires companies to make ‘reasonable’ effort to protect personal data, basic security processes are a huge step to such reasonable effort.

The idea of integration finds its Utopia in the IoT where everything is connected. The IoT will see the tiniest sensors sending and receiving data, as well as the largest things, like ships or planes (even more than they do today). It doesn’t require a doctorate in computer science to understand that the more connected devices there are, the more potential vulnerabilities there are. All it takes is one device, no matter how irrelevant, that is vulnerable and your whole network could be compromised.

Sadly, if the security industry’s performance to date is anything to go by, you don’t need to be a genius to find a physical security vulnerability, you can simply search for its default login credentials on the Internet and then access a device with administrator privileges. Leaving default passwords is akin to installing the latest security system in your car, arming it and then leaving the keys and remote on the roof.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
Continuum launches centralised access and identity management
News & Events Access Control & Identity Management Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
From prevention to protection
Securex South Africa News & Events Fire & Safety
The Western Cape’s varied landscapes and rapid urban development present a range of fire safety challenges, from densely populated city centres to remote industrial sites, and from heritage buildings to new high-rise developments.

Read more...
Workflow and asset management solutions
Asset Management News & Events
Zamatrack’s innovative workflow and asset management solutions feature the Worxit platform. This all-in-one solution allows businesses to streamline operations with real-time tracking, GPS data, and custom reports.

Read more...
SAQCC Gas awareness
Associations News & Events
SAQCC Gas will raise awareness within the gas industry by emphasising the importance of using registered gas practitioners and getting a Certificate of Compliance (CoC) for all your gas systems.

Read more...
Why Securex matters more than ever
Securex South Africa News & Events Fire & Safety Facilities & Building Management
Visitors will observe the application of integrated security solutions, including AI-enhanced surveillance, cloud-based access control, cybersecurity tools, and perimeter protection within residential, commercial, logistics, and industrial environments

Read more...
Fire Ops SA Partners with Matrix
News & Events Fire & Safety Residential Estate (Industry)
Fire Ops SA, a South African private fire and rescue service, has announced its partnership with Matrix Vehicle Tracking to launch FireStop, providing Matrix and Beame clients with direct access to a dedicated professional private fire service.

Read more...
SABRIC Annual Crime Statistics 2024
News & Events Security Services & Risk Management Residential Estate (Industry)
SABRIC has released its Annual Crime Statistics for 2024, reflecting a significant decline in financial crime losses, but also warning of the growing threat posed by artificial intelligence (AI) in fraud schemes.

Read more...
Adding AI analytics to security monitoring
SEON South Africa News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.