Nadir Izrael CTO & Founder

Nadir Izrael CTO & Founder

Nadir Izrael CTO & Founder ©2017 Armis Inc. - All Rights Reserved It’s 4 AM… 2 Who is your device talking to? ©2017 Armis Inc. All Rights Reserved. 2 Today’s Workplace ©2017 Armis Inc. All Rights Reserved. 3 Health Care ©2017 Armis Inc. - All Rights Reserved Manufacturing ©2017 Armis Inc. - All Rights Reserved Today’s Reality 40% 46% 280% 2015 2016 2017 Businesses can’t see 40% of 46% of US companies had a breach IoT attacks exploded by 280% the devices in their environment or security issue via IoT devices in the first half of 2017 June 2017 Armis Labs June 2017 IDC Aug 2017 TechRepublic/F5 ©2017 Armis Inc. - All Rights Reserved THE NEW ATTACK LANDSCAPE A New Type of Threat ©2017 Armis Inc. - All Rights Reserved A New Class of Threats – Airborne Internet URL Link Download Pair Device ©2017 Armis Inc. - All Rights Reserved New Attack Vector Identified • 5.3B Devices At Risk • Android, Windows, Linux, and iOS • 8 Vulnerabilities (4 critical) • Most serious Bluetooth vulnerability to date • Enables RCE and MiTM ©2017 Armis Inc. - All Rights Reserved Can Spread From Device To Device ©2017 Armis Inc. - All Rights Reserved What Systems Are Impacted • 1 Info Leak • 1 MiTM • 1 Info Leak • 1 RCE • Pre-iOS 10 • 2 RCE • 1 RCE • Pre- tvOS 9 • 1 MiTM • Google Pixel • Windows Desktops • Samsung Gear S3 • iPhone (Smartwatch) • Samsung Galaxy • Windows Laptops • iPad • Samsung Smart TVs • Samsung Galaxy Tab • iPod • Samsung Family Hub • LG Watch Sport • Apple TV (Smart refrigerator) • Pumpkin Car Audio System ©2017 Armis Inc. - All Rights Reserved How Many Devices At Risk? • 8.2B Devices • 2B Monthly Active Devices 2 Billion • 2B Devices Globally 2 Billion • 1B Active Devices (iOS, tvOS, watch OS) • 1B iOS Devices 130 Million • 130M pre-iOS 10 • Linux Is Unknown 1.2 Billion • 8B “Things” In Use Today (Gartner) Armis Estimate • 5.3B Devices At Risk (largest ever) 5.3 Billion ©2017 Armis Inc. - All Rights Reserved How Many Devices Unpatchable? Android Linux Patchable (240M) Patchable (900M) 20% 55% 45% Gingerbread Nougat Ice Cream Sandwich Marshmallow 80% Jelly Bean KitKat Lollipop Unpatchable (960M) Unpatchable (1.1B) ©2017 Armis Inc. - All Rights Reserved How BlueBorne Works High Privileges ©2017 Armis Inc. - All Rights Reserved How BlueTooth Pairs • Bluetooth is “on” and discoverable Bluetooth • User must find and proactively “pair” to the Speakers device ConnectedConnect • Some authentication or PIN to connect • Devices exchange keys, and auto connect without Device 1 Device 2 discoverable mode (Smart Phone) (Bluetooth Speakers) ©2017 Armis Inc. - All Rights Reserved How BlueBorne Works • Bluetooth is “on” Bluetooth • Attacker gets the MAC Bluetooth address 00:2b:09:6f:2b:01 • Attacker initiates Bluetooth RCE and attacks via using a MiTM BlueBorne vulnerability • No user interaction required • No pairing • No approval Attacker Target • Attacker can take over, create (Laptop) (Smart Phone) MiTM, get encryption keys, etc. ©2017 Armis Inc. - All Rights Reserved A BlueBorne Worm Attacker • Worm-like potential • Deliver ransomware • Spread botnet • Steal credentials • More… ©2017 Armis Inc. - All Rights Reserved Info Leak ©2017 Armis Inc. - All Rights Reserved Info Leak (To Desktop) Attacker Linux PC (Laptop) Target (Keyboard) • User connected to Linux desktop Attacker uses info leak to get encryption keys of the keyboard • Attacker intercepts keystrokes without running code or doing MiTM • Attacker can also inject keystrokes to the targeted device ©2017 Armis Inc. - All Rights Reserved Info Leak (Headset) Android (Smartphone) Attacker (Laptop) Target (Headset) • User connected to Android smartphone • Attacker uses info leak to get encryption keys of the headset • Attacker intercepts headset audio (eavesdropping on calls for instance) ©2017 Armis Inc. - All Rights Reserved Man in the Middle Attack ©2017 Armis Inc. - All Rights Reserved MiTM – WiFi Pineapple Corporate Network Internet IMPORTANT User Interaction Required – Users Select The Network WiFi Pineapple ©2017 Armis Inc. - All Rights Reserved MiTM – Bluetooth Pineapple Corporate Network Internet IMPORTANT No User Interaction Required Bluetooth Pineapple ©2017 Armis Inc. - All Rights Reserved Patches Update ©2017 Armis Inc. - All Rights Reserved A BROKEN SECURITY ARCHITECTURE ©2017 Armis Inc. - All Rights Reserved Traditional Approaches Are Insufficient Network NAC Endpoint Security Agent ©2017 Armis Inc. - All Rights Reserved Traditional Approaches Are Insufficient Visibility and control is the least where unmanaged device density is the greatest. ©2017 Armis Inc. - All Rights Reserved Air Gap Will Not Protect Us ©2017 Armis Inc. - All Rights Reserved A Device-Centric Approach Device Tracking Device Type Behavior Connections Reputation Version Data-at-Rest History ©2017 Armis Inc. - All Rights Reserved A Modern Architecture • Modernize, not rip & replace • Monitor from access layer up • Wired and wirelessly • See device behavior • Detect suspicious or malicious behavior ©2017 Armis Inc. - All Rights Reserved A Modern Architecture • Modernize, not rip & replace • Monitor from access layer up • Wired and wirelessly • See device behavior • Detect suspicious or malicious behavior • Must correlate higher in the network • Integration with existing packet capture or perimeter solutions ©2017 Armis Inc. - All Rights Reserved Key Elements of New Architecture No Device Behavioral Integrated Agent Centric Insights Solution ©2017 Armis Inc. - All Rights Reserved ©2017 Armis Inc. - All Rights Reserved.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    33 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us