The Six Cybersecurity Challenges of ESInet Cybersecurity for Public Safety Timothy Lorello - President & CEO Tim.Lorello@SecuLore.com A few things before we begin… This webinar is being recorded. You will receive a follow-up email with the webinar presentation and recording. Ask any questions you have to the Questions box, we will address them at the end. Optional polls will be asked throughout the presentation and your participation is greatly appreciated! 04/11/2018 2 Presenters Tim Lorello - CEO • • • • • • • Former CMO (TCS) 15+ years public safety 5+ years cybersecurity 30+ years telecomm Guidance to FCC BA Physics, MSEE 20 patents Sean Scott - CTO • • • • • • Former CEO, CTO Resilience 30+ years IT/cybersecurity HW/SW architect/designer Numerous cyber products Electronic warfare specialist Veteran, USAF 04/11/2018 3 Public Safety Infrastructure Faces Cyber Threats HIGH VULNERABILITY FIRST LINE OF DEFENSE 24X7 = HIGH VALUE • 80% are small centers • Many PSAPs have inadequate cyber infrastructure • Most public safety personnel are not cyber trained HIGH THREAT ~6000 PSAPs & Dispatch Centers HIGH RISK OF 9-1-1 DISRUPTION • Ransomware payments for 2017 have doubled to $2B (Bitdefender) • 206 incidents have affected public safety agencies in 46 states over the last 24 months • SecuLore helped local MD county with recovery from Thanksgiving Day ransomware attack 04/11/2018 4 Public Safety Is Being Targeted SecuLore has recorded a total of 206 State & Local incidents in 46 states in the last 24 months! 04/11/2018 5 Cyber Attack Profiles Phishing An email attack, intended to make the victim take an action that installs malware on the victim’s machine Web site drive by A technique that lures a victim to an infected web site, thereby installing malware on the victim’s machine Ransomware Malware which, once activated on a victim’s machine, encrypts data that can only be unlocked by paying a ransom Persistent threat Malware that hides on a system and which either slowly leaks information to the attacker or awaits activation Hacking A brute-force attack method by which an attacker identifies a system vulnerability and then directly exploits that weakness 04/11/2018 6 Analysis of the 206 Cyber Incidents Most preferred vehicle Phishing Web site drive by In fastest decline Ransomware Persistent threat Largest Most undocumented Hack Fastest growing 04/11/2018 7 Poll: Which Cyber Attacks Are Unique to NG911? 1. Ransomware 2. Phishing 3. Brute Force Hacking 4. All of them 5. None of them 04/11/2018 8 Poll: Which Cyber Attacks Are Unique to NG911? 1. Ransomware 2. Phishing 3. Brute Force Hacking 4. All of them 5. None of them 04/11/2018 9 So Isn’t This Bad for NG9-1-1: an All-IP Network? Sounds Logical ✓ Cyber attacks occur on IP networks ✓ NG9-1-1 is an IP network ✓ Therefore cyber attacks will occur on NG9-1-1 networks! Let’s compare ESInet vulnerabilities to today’s challenges 04/11/2018 10 Legacy Networks: The Illusion of Cyber Safety How can a PSAP or Dispatch Center get hacked if it isn’t connected to the internet? 04/11/2018 11 An Historical View of the PSAP & 9-1-1 Response Voice PSTN The Layering Begins! Call Takers Dispatchers Public Safety Answering Point Dispatch Center I Don’t Need Anything! Except This!! 04/11/2018 12 We Need the Street Address of the Caller Voice PSTN ALI Call Takers Dispatchers So Let’s Get a Dedicated Data Line Public Safety Answering Point Dispatch Center 04/11/2018 13 Great Brokered Content Becomes Available Voice PSTN ALI Call Takers Dispatchers Public Safety Datasets Logs And those logs should be connected Public Safety Answering Point Dispatch Center Might as well get an ALI connection Brokered Content 04/11/2018 14 In Counties & Cities – Add the Support! Voice PSTN ALI Call Takers Dispatchers Public Safety Datasets Logs Brokered Content IT Network Administrative Public Safety Answering Point Dispatch Center 04/11/2018 15 Those Damn Hackers – Cybersecurity Needs Voice PSTN ALI Call Takers Dispatchers Public Safety Datasets Logs IT Network Administrative Public Safety Answering Point Dispatch Center 04/11/2018 16 If Your IT Team Is Clever – Segment the Networks PSTN ALI Call Takers Dispatchers Public Safety Datasets Logs IT Network Administrative Public Safety Answering Point Dispatch Center 04/11/2018 17 But The Firewall Runs Out of Ports – Routers! PSTN ALI Call Takers Dispatchers Public Safety Datasets Logs IT Network Administrative Public Safety Answering Point Dispatch Center Result: interconnected network segments, multiple routers, no firewalls on internal traffic 04/11/2018 19 Introducing ESInets – Core to NG911 Services Note Firewall not in PSAP 04/11/2018 20 The Six ESInet Cybersecurity Challenges1 Threat #1: The Citizen 04/11/2018 21 Poll: Which Two Hacks Affect Every Computer? 1. Bonnie & Clyde 2. Petya & NotPetya 3. Spectre & Meltdown 4. Donald & Hillary 5. WannaCry & WannaMine 04/11/2018 22 Poll: Which Two Hacks Affect Every Computer? 1. Bonnie & Clyde 2. Petya & NotPetya 3. Spectre & Meltdown 4. Donald & Hillary 5. WannaCry & WannaMine 04/11/2018 23 Smartphones Have Been Compromised All Android Phones Vulnerable to “Cloak and Dagger” Full Device Takeover Attack May 2017 – The Hacker News Android Malware 'Judy' Hits as Many as 36.5 Million Phones May 2017 – Fortune 41 percent of Android phones are vulnerable to 'devastating' Wi-Fi attack October 2017 – The Verge Hacked Android APKs Using CoinHive’s Script to Mine Monero on Compromised Phones January 2018 – Cryptovest iPhone hack that threatened emergency 911 system lands teen in jail October 2016 – Ars Technica John Kelly's personal cellphone was compromised, White House believes October 2017 – Politico iPhone 7 Compromised Several Times at Hacking Event November 2017 – Softpedia News Apple confirms iPhone, Mac affected by Meltdown, Spectre flaws January 2018 – ZDnet 04/11/2018 24 Encrypted Citizen Data Passes Through Firewalls Threat #1: The Citizen All endpoints in an ESInet must implement media security with SRTP as defined in RFC 3711 and SDP Security Descriptions for Media Streams as defined in RFC 4568. SRTP Security must be requested in all calls originated within an ESInet. If a call is presented to the ESInet with SRTP, SRTP must be maintained through the ESInet13. Sandbox Talk to your vendor!! …meaning that the compromised picture would pass through ESInet firewalls …requiring a sandbox 04/11/2018 25 The Six ESInet Cybersecurity Challenges2 Other ESInets Threat #2: Other ESInets/networks Other Networks 04/11/2018 26 ESInets Should Be Thoroughly Firewalled Firewalls between services Firewalls between networks Firewalls between ESInets Recommended architectures address this 04/11/2018 27 The Six ESInet Cybersecurity Challenges3 Threat #3: The Internet [Legacy] 04/11/2018 28 CyberBenchmark Discovered ESInet Vulnerabilty Expected only US traffic Instead, saw two-way traffic to 23 non-US destinations And one-way traffic to others How could this happen? 04/11/2018 29 ESInet Focuses on Citizen-Originated Data ESInet addresses data/calls from citizen – it might not address data from other sources 04/11/2018 30 But Modern PSAPs Access Many Data Types NLETS Google Facebook Twitter City/County Network CJIS Body Cam CDC Misconfigured Internet Access And some of those sources could be compromised 04/11/2018 31 Monitoring the ESInet (from the Inside) ESInet can be broadly protected, identifying unwanted traffic 04/11/2018 32 The Six ESInet Cybersecurity Challenges4 Threat #4: The Internet of Things [Legacy] 04/11/2018 33 The Internet of Things – It’s BIG! 04/11/2018 34 The Internet of Things and Public Safety 04/11/2018 35 IoT Is Already Here – Printers Printers are commonly targeted And printer manufacturers are responding 04/11/2018 36 IoT Is Already Here – VoIP Devices This is NOT an analog device (anymore)! 04/11/2018 37 IoT Is Already Here - Detectors 04/11/2018 38 Public Safety IoT Being Directly Targeted Hackers use ransomware to hit [District of Columbia] police closed-circuit camera network (01/27/2017) Hackers took 70% of CCTVs offline using ransomware 04/11/2018 39 Poll: Which BotNet Fueled DDoS Attacks? 1. RoboNet 2. Mirai 3. Reaper 4. Kraken 5. Mr. Robot 04/11/2018 40 Poll: Which BotNet Fueled DDoS Attacks? 1. RoboNet 2. Mirai 3. Reaper 4. Kraken 5. Mr. Robot 04/11/2018 41 IoT Is Fueling DDoS Attacks Closed Circuit TV DVRs Other Devices Mirai Command & Control Server 1 Software Engineering Institute Carnegie Mellon: 1.7M compromised devices Build the BotNet Brute force password hack: • Factory settings • Password dictionary Release the Mirai virus! Target a system Rentable for $100/hr 2 Imperva Incapsula, 3/2017 04/11/2018 42 Continuous Monitoring Detects Unwanted Traffic 04/11/2018 43 The Six ESInet Cybersecurity Challenges5 Threat #5: The Staff Member [Legacy] 04/11/2018 44 Staff Members Will Make Mistakes Half of people plug in USB drives they find in the parking lot April 2016 – The ‘A’ Register Using personal devices on Center network Using Center devices on personal network 04/11/2018 45 The Six ESInet Cybersecurity Challenges6 Threat #6: The IT Network Segment[Legacy] 04/11/2018 46 Example: Web Permit Server Takes Out 9-1-1 Monitor inside traffic Alerts sent to SOC Web Rep Web Web Server Web Server Web Server Web Server AV AV Employee AV Email Firewall AV Email Antispam AV Router ISP for Web Server PSAP Network WS WS WS WS WS 4 Layers of Protection Web reputation Firewall Email antispam Workstation antivirus ISP for Network Mamba Phish Monitor outside traffic Full data capture 04/11/2018 47 Hackers Used the IT Network to Spread PSTN Call Takers Dispatchers Public Safety Datasets Logs A Lateral Attack! IT Network Administrative Public Safety Answering Point Dispatch Center 04/11/2018 48 Legacy Agencies Share Local Cyber Threats Typical county internet traffic Darker color indicates greater amount of traffic 04/11/2018 49 NG911 Promises a Safer Public-Safety Network ESInet can be broadly protected, blocking unwanted traffic Unwanted traffic can still occur because of malware on internal systems (IoT?) 04/11/2018 50 The ESInet Six Cybersecurity Challenges Two are unique to NG911 – Four impact Legacy E911 Malware from citizens needs vendor attention PSAPs will get data via methods beyond ESInets Internet of Things will bring internal attack vectors Hackers know how to exploit staff and IT network Continuous Monitoring Can Catch Bad Traffic Monitor – Visualize - Protect 04/11/2018 51 Next Webinar May 9th, 2018 at 2pm EST Secure Communications: The Hacker’s Dream Timothy Lorello – President & CEO Tim.Lorello@SecuLore.com (410) 703-3523 04/11/2018 52 Questions? The Six Cybersecurity Challenges of ESInet Timothy Lorello Sean Scott President & CEO CTO Tim.Lorello@SecuLore.com Sean.Scott@SecuLore.com 04/11/2018 53 Next Webinar May 9th, 2018 at 2pm EST Secure Communications: The Hacker’s Dream Timothy Lorello – President & CEO Tim.Lorello@SecuLore.com (410) 703-3523 04/11/2018 54