Threats & Vulnerabilities

Threats & Vulnerabilities

1.0 About IoT Threat Detection

Why is IoT Threat Detection important?
  1. Exploitable devices open backdoors into your network
  2. By 2018, two thirds of enterprises will experience an IoT security breach
  3. 1 hacked device = potential data breach and a reportable incident
  4. New devices are added to your networks all the time, not just by your staff.  Hackers will find vulnerable devices within minutes of their being exposed.  You need to find and resolve the issues before someone opens the backdoor into your network.

What specific threats and vulnerabilities do you look for?
The list of vulnerabilities we look for is constantly evolving as more threats emerge, but a few of the items include:
  1. Default Passwords
  2. EternalBlue
  3. Unsecured Remote Desktops
  4. SSL Vulnerabilities
  5. VX Works Vulnerabilities

Securolytics identified a vulnerable device on my network.  What can I do?
If a vulnerability is found on your network, we will include a specific recommendation for actions to take.  The suggested action depends on the specific vulnerability found.

2.0 Threat Categories

2.1  Active Inspection

Threat
Port(s)
Description
Anonymous FTP Server
21
Identifies open anonymous FTP server. By default many FTP servers do not require a password.
Blacklisted IP

Identifies blacklisted IP addresses. IP addresses can be blacklisted for a number of reasons, including if you recently acquired an IP address that was previously used for nefarious activity.
Blue Keep
3389
Windows Remote Desktop vulnerability allows for the possibility of remote code execution.
Default Credentials
21
22
23
80
443
8080
Identifies Default Credentials on an exposed device. Many IoT devices like IP cameras, DVRs and routers have hard-coded default credentials (usernames and passwords) that are exposed when those devices are connected to a network.
EternalBlue Vulnerability
445
Detects if port 445 is subject to EternalBlue Vulnerability.  Ransomware and Malware can be be installed on machines that have this vulnerability. Billions of dollars have been lost due to this exploit.
Exposed LDAP Directory

389

686
Identifies open access to an LDAP directory. Companies open LDAP access to Active Directory when using cloud apps like Office 365, Google Apps and Citrix. Hackers look for these open connections and can use them to steal employee passwords.
Non-Encrypted Database Connection
1433
1521
2483
3306
Identifies open access to non-encrypted database ports. Database access open to external IP addresses should be encrypted. Non-encrypted connections can allow hackers to view traffic going to and from your database, including database authentication credentials.
Open Firewall

Inspects the firewall management console when accessible from a non-trusted public IP address. Firewall management consoles should only be accessible from inside the network or from trusted external IPs. Hackers search for firewalls where public management access (SSH or HTTPS) was left enabled.
Open Mail Relay
25
Detects corporate mail servers which accepts email for non-corporate domains. Hackers are consistently looking for mail servers that have not been properly configured, which allow them to blast out spam and viruses.
Open Remote Desktop

5900

3389
Identifies open remote desktop access (RDP or VNC) from public, non-trusted IP addresses. Remote desktop access should only be allowed from trusted external IPs. Hackers search for desktops publicly accessible and then attempt to login.
Open DNS Server
53
Identifies open DNS server exposed to the internet. Corporate DNS servers are designed for machines on your internal network. An overlooked firewall rule can allow hackers to stage attacks using your DNS server.
Public Video Feed
554
Identifies unsecured IP cameras  Hackers can remotely tap the video feeds on unsecured cameras and seize control of the camera systems.
SSL Drown Vulnerability
443
Identifies active Poodle vulnerability in the SSL library. Patches for Poodle are available for most SSL libraries. Heartbleed, Poodle and DROWN are attacks that allow hackers to steal confidential information from a server running vulnerable SSL software.
SSL Heartbleed Vulnerability
443
Identifies an active Heartbleed vulnerability in an SSL library. Patches for Heartbleed are available for most SSL libraries. Heartbleed, Poodle and DROWN are attacks that allow hackers to steal confidential information from a server running vulnerable SSL software.
SSL Poodle Vulnerability
443
Identifies an active Heartbleed vulnerability in an SSL library. Patches for Heartbleed are available for most SSL libraries. Heartbleed, Poodle and DROWN are attacks that allow hackers to steal confidential information from a server running vulnerable SSL software.
SSL Weak Diffie-Hellman Key Exchange
443
Detects weak Diffie-Helman Key exchange on port 443  T his may allow a man-in-the-middle attacker to downgrade the security of a TLS session to 512-bit export-grade cryptography, which is significantly weaker, allowing the attacker to more easily break the encryption and monitor or tamper with the encrypted stream.
Unsecure Document Access Vulnerability
80
8080
443

Identifies detected unsecure document access on a device.
Unauthenticated Access
5900
Detects if port 5900 is subject to exploit by Unauthenticated Access vulnerability.
VX Works Vulnerability

Vulnerabilities in VxWorks' TCP stack could allow an attacker to execute random code, launch a DoS attack, or use the vulnerable system to attack other devices.

2.2  Passive Inspection

Threat
 Description
Spyware
Malicious software that is designed to take partial or full control of a computer's operation without the knowledge of its user or  any software that secretly gathers information about a person or organization.
Botnets
A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection.
Malware
Malicious computer software that interferes with normal computer functions or sends personal data about the user to unauthorized parties over the Internet
IoT Malware
Traffic to an IoT malware command and control or distribution domain has been detected from an IoT device
Malicious Websites
A malicious website is a site that attempts to install malware that will disrupt computer operation, gather your personal information or, in a worst-case scenario, gain total access to your machine) onto your device. This usually requires some action on your part, however, in the case of a drive-by download, the website will attempt to install software on your computer without asking for permission first.
MegaUpload Malware
Traffic to seized Megaupload domains has been detected on an IoT device These domains has been seen directing devices to malicious sites.
Unwanted Software
Traffic to a number of domains associated with unwanted software has been detected from an IoT device. This indicates that the device may be running unwanted software, which could have performance and security impacts
MyBrowser Bar
Mybrowserbar.com uses adware to hijack your browser and installs advertising software without users knowledge
Auslogics PC Repair Adware
PUP.Optional.AuslogicsBoostSpeed is adware that promises to clean up invalid registry entries, however,  Microsoft strongly urges not to use this method.
Komodia SSL Hijacker
Komodia allows hackers to access data that was encrypted using SSL and perform on the fly SSL decryption. The hijacker uses Komodia’s Redirector platform to allow easy access to the data and the ability to modify, redirect, block, and record the data without triggering the target browser’s certification warning.
VoluumTrk Mobile Adware
Voluumtrk.com is a site that powers dangerous web advertisements. Voluumtrk adware floods victim’s computer screen with untrustworthy ads, which usually look suspicious at the first sight. Voluumtrk PUP mostly generates ads with such captions: “You have won!”, “You are the lucky visitor!”, “Please install to continue” and so on.
ShopAtHome Toolbar
ShopAtHome Toolbar Malware is a potentially dangerous program that shares a lot of similarities to an Adware virus. ShopAtHome Toolbar Malware has been known to make attempts to phish for user data, all kinds of scams and even installing additional viruses.
SaveFrom Downloader
SaveFrom Downloader is a potentially unwanted program that performs malicious actions once installed on the computer.
ReImagePlus Adware
The ReimagePlus.com virus alters a browser’s configuration by observing consumer browsing behavior and frequently targeting them with ads. Redirects and advertisements are two common symptoms of the Reimage virus. Some of the browsers the ReimagePlus virus can corrupt are Chrome, Firefox, Internet Explorer and Safari
PcKeeper Adware
This software was intentionally designed to invariably and ominously report that the consumer's PC needs repair and is at-risk due to harmful errors, privacy threats, and other problems, regardless of the computer's actual condition.
MacKeeper Adware
This software was intentionally designed to invariably and ominously report that the consumer's MAC needs repair and is at-risk due to harmful errors, privacy threats, and other problems, regardless of the computer's actual condition.
Smart TV DNS Hijacker

MindSpark Toolbar
PUP.Optional.MindSpark.A is deemed as potentially unwanted program that performs malicious actions once installed on the computer.
Proxy Avoidance
Proxy avoidance is a means by which Internet users are able to browse websites that may otherwise be blocked by a network administrator. The term is something of a misnomer, however, in that it is the use of a proxy that provides the very avoidance of the blocking mechanisms in place. So, in essence, a user isn't avoiding a proxy in as much as he is using a proxy to circumvent another means by which access to a specific website or service is being denied. In many cases, these blocking methods are yet another proxy or service.
Adult Content
Traffic to a number of domains associated with adult content has been detected from an IoT device.
Peer-To-Peer Activity
Peer-to-Peer (P2P) networking refers to networks in which peer machines distribute tasks or workloads among themselves. P2P networks are commonly used on the Internet to directly share files or content between two or more machines. Content shared via P2P applications is sometimes infected with malware, sometimes contains legally protected copyrighted material, or may sometimes contain personal data accidentally shared.
Palikan Browser Hijacker
Palikan is a home page hijacker that uses a custom built Chromium browser, which is the open source version of Google Chrome. This browser will display the Palikan.com home page when you open it and will also make all searches go through the Palikan.com site as well.
Cryptojacking
The unauthorized use of computing resources to mine cryptocurrencies

2.3 Common Vulnerabilities and Exposures (CVE)

New CVEs related to any devices on your network.