SlideShare a Scribd company logo
SECURING THE INTERNET
OF THINGS
Christopher Frenz
THE NEED FOR IOT SECURITY???
MIRAI BOTNET AND DDOS
ATTACK ON DYN
• 1.2 Tbps DDoS Attack
from 100K malicious
endpoints
• Brought down Twitter,
Netflix, Reddit, CNN,
Paypal, and others
• 145K domains affected
• Dyn lost 14.5 domains
as customers
Image –
downdetector.com
LOCALIZED TARGETS
IOT IN HEALTHCARE
PRIVACY ISSUES AS WELL
MIRAI
• What makes these attacks so scary is not the
level of sophistication of the malware itself, but
actually its lack of sophistication in how it gains
control of IoT devices.
• The source code or Mirai is available:
• https://github.com/jgamblin/Mirai-Source-Code
• Mirai and the related Bashlight malware make
use of default usernames and passwords
SCANNER.C
• This Mirai source code file scanner.c
lists a combination of 62 default user
names and passwords
• Sophos estimates that this simple list
of passwords is enough to
compromise hundreds of thousands
IoT devices
User Name Password User Name Password User Name Password
root xc3511 admin 1111 root zlxx.
root vizxv root 666666 root 7ujMko0vizxv
root admin root password root 7ujMko0admin
admin admin root 1234 root system
root 888888 root klv123 root ikwb
root xmhdipc Administrator admin root dreambox
root default service service root user
root juantech supervisor supervisor root realtek
root 123456 guest guest root 0
root 54321 guest 12345 admin 1111111
support support guest 12345 admin 1234
root (none) admin1 password admin 12345
admin password administrator 1234 admin 54321
root root 666666 666666 admin 123456
root 12345 888888 888888 admin 7ujMko0admin
user user ubnt ubnt admin 1234
admin (none) root klv1234 admin pass
root pass root Zte521 admin meinsm
admin admin1234 root hi3518 tech tech
root 1111 root jvbzd mother fucker
admin smcadmin root anko
OWASP IOT TOP 10
Vulnerability Rank Vulnerability Name
1 Insecure Web Interface
2 Insufficient Authentication/Authorization
3 Insecure Network Services
4 Lack of Transport Encryption/Integrity Verification
5 Privacy Concerns
6 Insecure Cloud Interface
7 Insecure Mobile Interface
8 Insufficient Security Configurability
9 Insecure Software/Firmware
10 Poor Physical Security
IOT CRUSHER
WHERE IS ALL MY DATA?
• Organizations should have a map of where all of their data assets are
and where their data flows to
• This effort needs involve more than just IT. A surprising amount of
sensitive data may not be under the control of IT (HR, Finance, etc)
• Finance sending data to an external vendor for revenue cycle
management or collections
• Paper based records such as a morgue logbook may still have PII
• Shadow IT, BYOD, etc
• This map should include data collected and distributed by IoT
devices like security cameras, medical devices, etc.
INTERNAL FIREWALLS, NETWORK
SEGMENTATION, INTERNAL IDS
• Traffic to and from IoT devices should be isolated as much as possible from the rest of
your network – VLANs, ACLs, etc.
• In healthcare it is becoming common to place a firewall in front of network enabled
medical equipment to restrict traffic flows
• IDS and threat detection is not just a good idea at the perimeter – it should be used to
examine internal traffic as well
ZERO TRUST
• With increasing virtualization of
servers and desktops security at
the virtual machine level should
not be ignored
• Software Defined Networking
and security products like NSX
and Hyper-V network
virtualization make approaching
zero trust networks more feasible
TOP 10 IOT SECURITY CONTROLS
FOR IOT DEVELOPERS
• No default passwords or hardcoded passwords post initial setup
• Account Lockouts after 3-5 failed logins
• Password complexity filters
• No unsecured connections
• No administrative access on internet facing interfaces
• Network level access controls
• Update Mechanisms
• Encryption at rest
• Differing account access levels
• Privacy by Design Principles
http://www.codeguru.com/IoT/
understanding-iot-security-for-
iot-developers.html
HOW DO WE GET
MANUFACTURERS TO CARE
• Consumers need to put economic pressure on manufacturers to produce
secure devices
• Customers need to vote with their wallet and not purchase products that
cannot be properly secured
• The average consumer does not know enough about security to make good
decisions as to which products are secure and which are not
IOT NUTRITION LABEL
Makes it easy for non-
savvy consumers to
compare the security of
IoT devices
If enough industry
backing can be gained
where the use of such
labelling becomes
commonplace vendors
will strive to eliminate red
Xs from their label
ENOUGH MOMENTUM?
QUESTIONS
• https://www.linkedin.com/in/christopherfrenz/

More Related Content

PPTX
Iot Security, Internet of Things
PPT
IoT Security by Sanjay Kumar
PDF
Internet of Things Security Patterns
PDF
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
PPTX
Privacy and Security in the Internet of Things
PPTX
Privacy and security in IoT
PDF
IoT Security, Mirai Revisited
PDF
Internet of Things - Privacy and Security issues
Iot Security, Internet of Things
IoT Security by Sanjay Kumar
Internet of Things Security Patterns
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Privacy and Security in the Internet of Things
Privacy and security in IoT
IoT Security, Mirai Revisited
Internet of Things - Privacy and Security issues

What's hot (20)

PDF
Security in the Internet of Things
PDF
Security challenges for IoT
PPTX
Internet of Things Security
PDF
Privacy & Security for the Internet of Things
PPTX
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
PPTX
IoT Security Middleware: evaluating the threats and protecting against them
PDF
IOT Security
PPTX
IoT Security Imperative: Stop your Fridge from Sending you Spam
PPTX
Internet of Things (IoT) Security
PPTX
IOT privacy and Security
PPTX
Iot(security)
PDF
Ryan Wilson - ryanwilson.com - IoT Security
PPTX
IoT Security Briefing FBI 07 23-2017 final
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
DOCX
Security and Privacy considerations in Internet of Things
PPTX
Security issues and solutions : IoT
PDF
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
PPTX
IoT security
PPTX
IoT Security Training, IoT Security Awareness 2019
PPT
IoT Security – Executing an Effective Security Testing Process
Security in the Internet of Things
Security challenges for IoT
Internet of Things Security
Privacy & Security for the Internet of Things
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
IoT Security Middleware: evaluating the threats and protecting against them
IOT Security
IoT Security Imperative: Stop your Fridge from Sending you Spam
Internet of Things (IoT) Security
IOT privacy and Security
Iot(security)
Ryan Wilson - ryanwilson.com - IoT Security
IoT Security Briefing FBI 07 23-2017 final
IoT Security, Threats and Challenges By V.P.Prabhakaran
Security and Privacy considerations in Internet of Things
Security issues and solutions : IoT
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
IoT security
IoT Security Training, IoT Security Awareness 2019
IoT Security – Executing an Effective Security Testing Process
Ad

Viewers also liked (17)

PPT
Pengetahuan Bahan Makanan
PPTX
місто Суми
PPTX
PPTX
clasificacion de las empresas
PDF
Green Man Gaming Overview - March 2017
PDF
Ejerciciosderefuerzodematematicas
PPT
Σχολικός Εκφοβισμός από την Ε' τάξη
PPT
Bhel( Bharat Heavy Electricals Limited )
PPTX
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
PPTX
Era cenozoica o terciaria
PDF
Leadership, Management & Innovation
PPTX
Question 1
PPT
Inquiry training model [compatible]
PDF
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
PPTX
Security in IoT
PDF
Newsletter n. 3
Pengetahuan Bahan Makanan
місто Суми
clasificacion de las empresas
Green Man Gaming Overview - March 2017
Ejerciciosderefuerzodematematicas
Σχολικός Εκφοβισμός από την Ε' τάξη
Bhel( Bharat Heavy Electricals Limited )
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Era cenozoica o terciaria
Leadership, Management & Innovation
Question 1
Inquiry training model [compatible]
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
Security in IoT
Newsletter n. 3
Ad

Similar to Securing the Internet of Things (20)

PDF
Cybersecurity
PDF
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
PPTX
It security the condensed version
PPTX
Lock it Down: Access Control for IBM i
PDF
Controlling Access to IBM i Systems and Data
PPTX
securing_information_systems_._lec6.pptx
PDF
Expand Your Control of Access to IBM i Systems and Data
PPTX
The Threat Is Real. Protect Yourself.
PDF
Cyber Security.pdf
PDF
Crush Common Cybersecurity Threats with Privilege Access Management
PPTX
Implementing security for your library | PLAN Tech Day Conference
PPTX
Security Testing for IoT Systems
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PDF
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
PPTX
The Internet of Everything is Here
PPTX
Cyber Security Overview for Small Businesses
PPTX
IoT DDoS Attacks: the stakes have changed
PPT
PDF
Track 5 session 1 - st dev con 2016 - need for security for iot
Cybersecurity
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
It security the condensed version
Lock it Down: Access Control for IBM i
Controlling Access to IBM i Systems and Data
securing_information_systems_._lec6.pptx
Expand Your Control of Access to IBM i Systems and Data
The Threat Is Real. Protect Yourself.
Cyber Security.pdf
Crush Common Cybersecurity Threats with Privilege Access Management
Implementing security for your library | PLAN Tech Day Conference
Security Testing for IoT Systems
IoT Security: Debunking the "We Aren't THAT Connected" Myth
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The Internet of Everything is Here
Cyber Security Overview for Small Businesses
IoT DDoS Attacks: the stakes have changed
Track 5 session 1 - st dev con 2016 - need for security for iot

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
KodekX | Application Modernization Development
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
cuic standard and advanced reporting.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
KodekX | Application Modernization Development
Understanding_Digital_Forensics_Presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The Rise and Fall of 3GPP – Time for a Sabbatical?
Reach Out and Touch Someone: Haptics and Empathic Computing
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
cuic standard and advanced reporting.pdf
Modernizing your data center with Dell and AMD
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Monthly Chronicles - July 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
20250228 LYD VKU AI Blended-Learning.pptx
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Securing the Internet of Things

  • 1. SECURING THE INTERNET OF THINGS Christopher Frenz
  • 2. THE NEED FOR IOT SECURITY???
  • 4. ATTACK ON DYN • 1.2 Tbps DDoS Attack from 100K malicious endpoints • Brought down Twitter, Netflix, Reddit, CNN, Paypal, and others • 145K domains affected • Dyn lost 14.5 domains as customers Image – downdetector.com
  • 8. MIRAI • What makes these attacks so scary is not the level of sophistication of the malware itself, but actually its lack of sophistication in how it gains control of IoT devices. • The source code or Mirai is available: • https://github.com/jgamblin/Mirai-Source-Code • Mirai and the related Bashlight malware make use of default usernames and passwords
  • 9. SCANNER.C • This Mirai source code file scanner.c lists a combination of 62 default user names and passwords • Sophos estimates that this simple list of passwords is enough to compromise hundreds of thousands IoT devices User Name Password User Name Password User Name Password root xc3511 admin 1111 root zlxx. root vizxv root 666666 root 7ujMko0vizxv root admin root password root 7ujMko0admin admin admin root 1234 root system root 888888 root klv123 root ikwb root xmhdipc Administrator admin root dreambox root default service service root user root juantech supervisor supervisor root realtek root 123456 guest guest root 0 root 54321 guest 12345 admin 1111111 support support guest 12345 admin 1234 root (none) admin1 password admin 12345 admin password administrator 1234 admin 54321 root root 666666 666666 admin 123456 root 12345 888888 888888 admin 7ujMko0admin user user ubnt ubnt admin 1234 admin (none) root klv1234 admin pass root pass root Zte521 admin meinsm admin admin1234 root hi3518 tech tech root 1111 root jvbzd mother fucker admin smcadmin root anko
  • 10. OWASP IOT TOP 10 Vulnerability Rank Vulnerability Name 1 Insecure Web Interface 2 Insufficient Authentication/Authorization 3 Insecure Network Services 4 Lack of Transport Encryption/Integrity Verification 5 Privacy Concerns 6 Insecure Cloud Interface 7 Insecure Mobile Interface 8 Insufficient Security Configurability 9 Insecure Software/Firmware 10 Poor Physical Security
  • 12. WHERE IS ALL MY DATA? • Organizations should have a map of where all of their data assets are and where their data flows to • This effort needs involve more than just IT. A surprising amount of sensitive data may not be under the control of IT (HR, Finance, etc) • Finance sending data to an external vendor for revenue cycle management or collections • Paper based records such as a morgue logbook may still have PII • Shadow IT, BYOD, etc • This map should include data collected and distributed by IoT devices like security cameras, medical devices, etc.
  • 13. INTERNAL FIREWALLS, NETWORK SEGMENTATION, INTERNAL IDS • Traffic to and from IoT devices should be isolated as much as possible from the rest of your network – VLANs, ACLs, etc. • In healthcare it is becoming common to place a firewall in front of network enabled medical equipment to restrict traffic flows • IDS and threat detection is not just a good idea at the perimeter – it should be used to examine internal traffic as well
  • 14. ZERO TRUST • With increasing virtualization of servers and desktops security at the virtual machine level should not be ignored • Software Defined Networking and security products like NSX and Hyper-V network virtualization make approaching zero trust networks more feasible
  • 15. TOP 10 IOT SECURITY CONTROLS FOR IOT DEVELOPERS • No default passwords or hardcoded passwords post initial setup • Account Lockouts after 3-5 failed logins • Password complexity filters • No unsecured connections • No administrative access on internet facing interfaces • Network level access controls • Update Mechanisms • Encryption at rest • Differing account access levels • Privacy by Design Principles http://www.codeguru.com/IoT/ understanding-iot-security-for- iot-developers.html
  • 16. HOW DO WE GET MANUFACTURERS TO CARE • Consumers need to put economic pressure on manufacturers to produce secure devices • Customers need to vote with their wallet and not purchase products that cannot be properly secured • The average consumer does not know enough about security to make good decisions as to which products are secure and which are not
  • 17. IOT NUTRITION LABEL Makes it easy for non- savvy consumers to compare the security of IoT devices If enough industry backing can be gained where the use of such labelling becomes commonplace vendors will strive to eliminate red Xs from their label