Running head: THE INSECURITIES OF HOME AUTOMATION DEVICES The Insecurities of Home Automation Devices Webster University CSSS 5000 1 THE INSECURITIES OF HOME AUTOMATION DEVICES 2 Abstract Since the inception of 802.11 in the 1980s, wireless technology has become an essential part of everyday life. This technology evolved to what now has become the interconnectivity of all devices, also called the “Internet of Things” (IoT) (Morgan, 2014). The concept behind an IoT is the ability to control and monitor everyday activities via the web. Retailers, such as BestBuy and Newegg, are selling these devices categorized under “home automation.” These devices include a mix of devices ranging from IP (Internet Protocol) cameras, thermostat controllers, Wi-Fi enabled outlets/lights, water/flood sensors, smart doorbells, smart smoke detectors, and smart door locks. The results have been very profitable as consumers are buying into home automation market, which is expected to produce about $78.27 billion by 2022 (Rohan, 2016). There is one significant issue with this new technology, which is a lack of security. In 2015, the Federal Bureau of Investigation (FBI) released a statement that declared “since the conception of IoT, we have seen several incidents that involved attacks on home systems and devices” (FBI, 2015). This statement should be alarming to consumers, as they are often unaware of the threats they face by using Wi-Fi capable devices. Despite the security risks facing an IoT in home automation, there are no signs of it slowing down. In response, tech blogs and cyber security specialists have published a plethora of online tutorials on how-to secure your home network and associated devices. These tutorials create a small layer of protection however, there are still significant risks associated with using web-enabled home automation devices. THE INSECURITIES OF HOME AUTOMATION DEVICES 3 Let's start off by saying that consumers should limit their use of home automation devices. The list of reasons range from potential security vulnerabilities, both hardware and software, that pose a risk to a healthy internet, as well as personal privacy. In 2016, The New York Times published an article that described a new weapon used by hackers to conduct cyberattacks (Perlroth, 2016). Surprisingly, the new weapon was the same as a web-enabled device purchased at any tech store. Hackers have used these devices to execute distributed denial-ofservice (DDoS) to attack several popular websites, such as Twitter, Netflix, Spotify, Airbnb, Reddit, Etsy, Sound Cloud, and The New York Times (Perlroth, 2016). To understand and effectively combat this new threat against the consumer and their web-enabled devices, it is imperative to know the concept of an IoT. Secondly, it is essential for consumers to understand the risks associated with the devices they are using. Some of these common, yet potentially harmful devices, including IP cameras, thermostat devices, smart door locks, and home routers. Protecting devices require user action. It is critical to take concrete steps to mitigate the risks associated with specific devices. If the consumer is unable to perform these steps, limiting the use of web-enabled devices entirely should be considered. What is IoT? “The IoT is a paradigm that is rapidly growing in the scenario of modern wireless communications” (Atzori, Iera, & Morabito, 2009). The basic idea behind an IoT is an interconnected world of electronic devices that can converse with one another across the Internet using an IP address – this can be an IPv4 or IPv6 address. An example is on a home network, if an IP camera is connected to a router via wireless or hard wired connection, and is inherently assigned an IP address, that device is now considered a part of the IoT. The IoT is currently THE INSECURITIES OF HOME AUTOMATION DEVICES 4 expanding in an overabundance of outlets including businesses, agriculture, energy, transportation, medical, and consumer markets (Rouse, 2016). Devices are being designed and programmed to automate, monitor, or capture data that was once manually accomplished. Figure 1 displays the breakdown of IoT and the complexity of interconnectivity between the various IoT markets. Figure 1. This chart shows the different sectors of the IoT infrastructure. Specifically, the consumer & home sector of the graph outlines some of the devices that interconnect with IoT. These devices include Network Access/Management, Security Alerts, and Home Automation Devices (Farnsworth, 2015). The IoT is what some consider the post-PC era (Gubbi, Buyya, Marusic, & Palaniswami, 2016). In this new era, smartphones and handheld devices outnumber desktop computers and THE INSECURITIES OF HOME AUTOMATION DEVICES 5 laptops. These devices are more consumer friendly, and they support applications that enable them to become portable smart devices. Smart devices have the capacity to connect to several web-enabled devices where they can control or monitor them at any given time (Gubbi, Buyya, Marusic, & Palaniswami, 2016). An example includes using an iPhone to operate an application that controls the locking mechanism to the doors of a home. Another example is using a tablet to control a thermostat in a home. Smart devices hold the potential of directing and monitoring every aspect of a home; however IP space is a major concern for the future as more devices continue to hit the market. In 2012, Cisco estimated that there were approximately 8.7 billion devices connected to the internet. Currently, there are an estimated 30.7 billion devices. This number has almost quadrupled in four years (Lucer, 2016). Unfortunately, this poses an issue for the future of IoT. Currently, many organizations strictly utilize IPv4, or Internet Protocol version 4 addresses. IP addresses are assigned to a Media Access Control (MAC) address of a physical device’s Network Interface Card (NIC). Depending on the year the device’s card was made, the NIC may only support an old IPv4 address. The downside to an IPv4 only infrastructure is that it only supports a 32-bit address. As a result, an IPv4 can only support 4.29 billion IP addresses at one time (Parr, 2011). In response to this problem, IPv6 addresses were developed. IPv6 addresses are a 128-bit that can support 2^128 internet addresses, which equates to approximately 340 undecillion addresses (Parr, 2011). The number of available IP addresses is crucial for the future of IoT because the number of web-connected devices is expected to reach 75.4 billion in 2025 (Lucer, 2016). THE INSECURITIES OF HOME AUTOMATION DEVICES 6 The demand for these devices is one of the many factors contributing to the growth of IoT devices. The problem for consumers is that the industries who are making these products are not necessarily concerned about their security. In 2016, the Broadband Internet Technical Advisory Group (BITAG) released a report titled the IoT: Security and Privacy Recommendations. In this report, they identified that there is currently a lack of security and privacy practices in the IoT consumer market (BITAG, 2016). Consumer product development suffers from several issues. These include lack of IoT supply chain experience concerning security and confidentiality, a lack of incentives to develop and release updates after the initial sale, and difficulty of security over the network upgrades. Additional problems include devices with limited security hardware, devices with constrained or limited user interfaces, and devices with malware inserted during the manufacturing process (BITAG, 2016). Every issue poses a new threat to consumers who are largely unaware that their devices have significant vulnerabilities. The first problem with IoT development is the industry’s lack of security and privacy practices and regulations when developing new products. The fact is there are no security regulations or standards for a company who produces such devices. Companies look for the cheapest, most practical components across a multi-national supply chain. Secondly, there is no incentive for a company to develop security updates after the initial release of a product. IoT devices are evolving at a fast pace which makes it difficult for a company to maintain product lines. It is also challenging for businesses to ensure security with over-the-network updates. By patching devices via the internet, they become susceptible to hijacking or malicious code. Some cheaply made devices have limited interface capabilities. The interface is what enables a consumer to manage the device and install firmware or software updates. The last issue is THE INSECURITIES OF HOME AUTOMATION DEVICES 7 devices that have malware installed during the manufacturing process. An example is as recent as November 2016, when nearly three million Android phones came with a pre-installed code. When executed, hackers gained full control of the device (Goodin, 2016). Consumers need to be aware that devices, especially those devices created by small third-party companies, are likely to be plagued with low quality, insecure components. Some IoT devices commonly used as home automation gadgets, which include IP cameras, thermostat controllers, smart door locks, and routers. These devices can simplify human interactions around the home by providing the capability of controlling or monitoring what is going on in other parts of the home without being physically present. One is also not charged with the responsibility of having to remember to carry around a key because the door lock is digitized. These devices are prone to several different types of backdoor cyber-attacks. Some of the more sophisticated attacks are malware botnets which enable hackers to gain control of the devices via malicious code. Other attacks can be as simple as brute forcing or cracking usernames and passwords to accounts. Either way, every device used around a home has vulnerabilities associated with them. Threats against IP cameras. IP cameras are the most invasive exploits a hacker can obtain if they were to gain control. It is invasive because once a camera is accessed either via malware or brute force attack, the hacker can watch whatever the camera is monitoring. In 2014, Network World reported that a site exposed nearly 73,011 unsecured security camera locations in 256 countries. The cameras, manufactured by the company TRENDnet, were designed with a feature that enabled them for public viewing unless the user checked a box to remove the setting. Unfortunately for THE INSECURITIES OF HOME AUTOMATION DEVICES 8 consumers, the general configuration was a default setting. Since most users failed to configure their devices, the site gained easy access to the camera by using default manufacturer username and passwords. Thus, TRENDnet received criticism for failing to recognize this as an apparent security flaw. Another, more recent example, occurred in November of 2016. The SEC Consult, a renowned IT security, and consultation firm, exposed The Sony Entertainment Company when reporting that there was a critical flaw in 80 of their SNC series IP cameras (Amir, 2016). The flaw exploited the cameras by enabling them to have backdoor accounts. An additional discovery identified that there is a CGI binary configuration that permits remote users to send a specially designed HTTP request that enables the Telnet service. Once Telnet is enabled, the hacker can login using default manufacturer username and password, unless the defaults change in the device settings (Amir, 2016). Now that the hacker can gain full control of a device, they can spy disrupt or manipulate the video. Hackers can also corrupt the network that contains the targeted camera. Threats against Wi-Fi thermostat devices. Aside from the potentially invasive threats of IP cameras newer technology, such as the Wi-Fi enabled thermostat devices, are also bringing new threats to consumers. In August of 2016, a news agency reported that white hat hackers showed off the first-ever ransomware that works against web-enabled thermostats (Lorenzo, 2016). The white hat hackers have no intention of releasing the code. Their intention was to make the point that IoT devices fail to take simple security precautions. The thermostats run largely on a Linux operating system, and they have an SD card that allows users to load custom settings and wallpaper (Lorenzo, 2016). Hackers could THE INSECURITIES OF HOME AUTOMATION DEVICES 9 release wallpaper for those devices that had malicious code hidden in them – this is called stenography in the cyber community. The Linux operating system does not check the files loaded into the SD card slot, and instead executes the code autonomously. The security loophole would give hackers full control of a home's thermostat system, as well as any other functionality the thermostat may have. An independent Black Hat research team at the University of Central Florida release a report about the NEST thermostat devices. In the report, they discovered that the complexity of the NEST infrastructure provided a breeding ground for vulnerabilities (Hernandez, Arias, Buentello, & Jin, 2014). They explain that while NEST has taken some steps to mitigate vulnerabilities, there are ways of gaining access to the device. Again, the devices were susceptible to loading malicious code via a USB stick. The problem with smart thermostat devices is that they lack the hardware to detect malicious firmware. Threats against smart locks. A presentation at a Def Con Hacking Conference identified that some smart locks can be hacked for under $100 (Rose & Ramsey, 2016). This alarming to consumers who rely on these locks to secure their homes and valuables. The smart lock devices rely primarily on a Bluetooth low-energy emitting signal or BLE for short. BLE technology is used by several companies including iBluLock, Quicklock, Noke, and Master Lock (Rose & Ramsey, 2016). It operates at the same frequency of a standard home wifi network, which is 2.4 GHz. Hacks are achieved by using devices that are programmed to discover these locks emitting a BLE signal. The scanners lock onto the locks physical address where it then emits a signal that unlocks the door. This hack is commonly referred to as wardriving. Wardriving is the act of scanning for wireless networks THE INSECURITIES OF HOME AUTOMATION DEVICES 10 in a moving vehicle using a computer or smart device. Anthony Rose, the presenter of this presentation at Def Con, reported that out of twelve companies they contacted to report these vulnerabilities, only one responded that they are looking for a fix (Rose & Ramsey, 2016). Threats against home routers. Routers are the tier two connection that enables home users to connect devices to the IoT. The problem facing the consumer market is that routers are compromised without the owner's knowledge. In 2016 PC World published an article on a security flaw found in several of Netgear routers. Netgear is one of the leading retailers of home network solutions. Netgear responded to the reports and discovered that almost every single one of their 2016 product line has this vulnerability. The vulnerability was reported by a cybersecurity researcher who goes by the name Acew0rm (Constantin, 2016). Acew0rm stated the following, “The issue stems from improper input sanitization in a form in the router’s web-based management interface and allows the injection and execution of arbitrary shell commands on an affected device.” (Constantin, 2016). With the ability to conduct shell commands give hackers complete access to the router. That is a major concern for consumers because once a hacker controls a router they can access, manipulate, and destroy any other device connected to the network. Another major concern for home routers is their use in botnet-based attacks. The concept of the botnet as defined by Kaspersky, a renowned cyber security company, as an interconnected network of computers and devices that are infected with malware without the user’s knowledge (Kaspersky, 2016). Figure 2 illustrates how malware enables hackers to transmit viruses, spam emails, or conduct various cyber crimes. Some of the more complex botnet attacks include the Mirai-Botnet attacks. The concept behind the Mirai-Botnet is that it infects routers and any THE INSECURITIES OF HOME AUTOMATION DEVICES 11 device connected to the IoT. The botnet uses those devices as robots, and under the hackers control they can flood websites, and virtually anything that connects to the internet with requests (Cimpanu, 2016). They use the Mirai-Botnet to conduct these attacks, which are called DDoS. Botnets effectively turn home routers into weapons of destruction. Figure 2. Botnet depiction from attacker to victim. This chart displays a visual representation of how a botnet attack works to conduct DDoS attacks on target systems (Anonomyous, 2016). What can be done to protect a home? Despite the significant vulnerabilities that plague home automation devices there are ways for consumers to mitigate risk. However, there is a much greater need for the industry developing these products to ensure their security as well. Several blogs and tech websites have outlined several different methods for suppliers and consumers to secure some of the devices. THE INSECURITIES OF HOME AUTOMATION DEVICES 12 For consumers, these steps include configuring each device connected to their home network. Each device has different settings and configurations that enable it to become more secure, while the industry needs to start giving consumers the hardware they need to provide more security. IP cameras, for instance, need to have default username and passwords changed. BITAG recommends that users use 12 digit complex passwords (BITAG, 2016). By failing to do this, the consumer is putting themselves at risk of having their cameras compromised by hackers. BITAG also recommended developers implement hardware that encrypts the IP traffic in either SSL or AES (BITAG, 2016). Encrypting would create a secure connection that would enable IP cameras to use HTTPS rather than unsecured HTTP. As for web-enabled thermostat devices, there is nothing the consumer can do to prevent an attack. The industry needs to develop a way to validate firmware before being installed. There is also a need for scanning the SD card to validate the wallpaper, and other settings that the nest can upload do not contain malicious code. Next, some smart locks do pose a threat that cannot be mitigated. Sources recommend that if a consumer wants to invest in a digital lock, they invest in one that has the ability for two-factor authentication, long 16-20 digit passwords, and proper AES encryption (Rose & Ramsey, 2016). Lastly, home routers, the backbone of a home’s network, need to have many settings configured properly provide a layer of security. There are many outlets online that consumers can go to, to get advice on how to secure their network. A more popular site, PC Mag, recommends consumers take the following steps to secure their wireless routers: change the password for the login, update the firmware, enable a specific range of IPs for DHCP, use static IPs, hide a router's SSID or wireless broadcast capability, and use complex passwords for the router’s wifi (Pacchiano, 2015). THE INSECURITIES OF HOME AUTOMATION DEVICES 13 In conclusion, this analysis of home automated devices sheds light on the need for the industry to focus on security rather than profits. It also displays the need for consumers to be more aware of the devices they are bringing into their homes. As the amount of IoT-connected devices increase over the next decade, it becomes more apparent that insecure devices are a threat to the existence of the internet. That is because botnet attacks such as the Mirai-Bonet are being implemented by using home automation, as well as the other spectrums of IoT, displayed in figure 1, to destroy the internet's foundation. Consumers need to be more aware of the vulnerabilities they face using these products, and take action by limiting the use or configuring them to be more secure. THE INSECURITIES OF HOME AUTOMATION DEVICES 14 References Amir, U. (2016, December 10). Nearly 80 Sony IP Camera Models Plagued with Backdoor Accounts. Retrieved from Hack Read: https://www.hackread.com/80-sony-ip-cameramodels-plagued-with-backdoor/ Anonomyous. (2016). Malware-infected home routers used to launch DDoS attacks. Retrieved from Help Security: http://www.helpsec.net/malware-infected-home-routers-used-tolaunch-ddos-attacks Anonymous. (2015, September 17). FBI Warns Public on Dangers of the Internet of Things. Retrieved from Trend Micro: http://www.trendmicro.com/vinfo/us/security/news/internet-of-things/fbi-warns-publicon-dangers-of-the-internet-of-things Atzori, L., Iera, A., & Morabito, G. (2009). The Internet of Things: A survey. Elsevier, 1-19. BITAG. (2016). Internet of Things (IoT) Security and Privacy Recommendations. BITAG. Cimpanu, C. (2016, December). Security Firms Almost Brought Down Massive Mirai Botnet. Retrieved from Bleeping Computer: https://www.bleepingcomputer.com/news/security/security-firms-almost-brought-downmassive-mirai-botnet/ Constantin, L. (2016, December 12). Nasty unpatched vulnerability exposes Netgear routers to easy hacking. Retrieved from PC World: http://www.pcworld.com/article/3149554/security/an-unpatched-vulnerability-exposesnetgear-routers-to-hacking.html THE INSECURITIES OF HOME AUTOMATION DEVICES 15 Farnsworth, C. B. (2015, February 13). Hacking the Internet of Things. Retrieved from IoT: http://www.greenbuildermedia.com/internet-of-things/hacking-the-internet-of-things Goodin, D. (2016). Powerful backdoor/rootkit found preinstalled on 3 million Android phones. Ars Technica. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2016). Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions. Australia: The University of Melbourne. Hernandez, G., Arias, O., Buentello, D., & Jin, Y. (2014). Smart Nest Thermostat: A Smart Spy in Your Home. University of Central Florida: Security in Silicon Labratory. Kaspersky. (2016). What is a Botnet Attack? - Definition. Retrieved from Kaspersky: https://usa.kaspersky.com/internet-security-center/threats/botnetattacks#.WFbZE_krKUk Lorenzo, F.-B. (2016, August 7). Hackers Make the First-Ever Ransomware for Smart Thermostats. Retrieved from Motherboard: http://motherboard.vice.com/read/internet-ofthings-ransomware-smart-thermostat Lucer, S. (2016). IoT platforms: enabling the Internet of Things. IHS Technology, 1-20. Morgan, J. (2014, May 13). A Simple Explanation Of 'The Internet Of Things'. Retrieved from Forbes: http://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanationinternet-things-that-anyone-can-understand/#3316af316828 Network World. (2014, November 6). Peeping into 73,000 unsecured security cameras thanks to default passwords. Retrieved from Network World: THE INSECURITIES OF HOME AUTOMATION DEVICES 16 http://www.networkworld.com/article/2844283/microsoft-subnet/peeping-into-73-000unsecured-security-cameras-thanks-to-default-passwords.html Pacchiano, R. V. (2015, November 2). How to Set Up and Configure Your Wireless Router. Retrieved from PC Mag: http://www.pcmag.com/article2/0,2817,2375207,00.asp Parr, B. (2011, February 03). IPv4 & IPv6: A Short Guide. Retrieved from Mashable: http://mashable.com/2011/02/03/ipv4-ipv6-guide/#TnlB4AQCqkqH Perlroth, N. (2016, October 21). Hackers Used New Weapons to Disrupt Major Websites Across U.S. Retrieved from New York Times: http://www.nytimes.com/2016/10/22/business/internet-problems-attack.html?_r=1 Quora. (2013, Jan 7). How Many Things Are Currently Connected To The "Internet of Things" (IoT)? Retrieved from Forbes: http://www.forbes.com/sites/quora/2013/01/07/how-manythings-are-currently-connected-to-the-internet-of-things-iot/#3b365d976379 Rohan. (2016, April). Home Automation System Market by Product (Lighting Control (Switch, Occupancy Sensor), Security & Access Control, HVAC Control (Pump & Fan, Control Valve), Entertainment & Other Controls), Software & Service & Geography - Global Forecast to 2022. Retrieved from Markets and Markets: http://www.marketsandmarkets.com/Market-Reports/home-automation-control-systemsmarket-469.html Rose, A., & Ramsey, B. (2016). Picking Bluetooth Low Energy Locks from a Quarter Mile Away. Las Vegas: Def Con Hacking Conference. THE INSECURITIES OF HOME AUTOMATION DEVICES Rouse, M. (2016). Internet of Things (IoT). Retrieved from Tech Target: http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT 17