Lights, Cameras, Hack(tion) - Attivo Networks
Attivo Networks Blogs

Lights, Cameras, Hack(tion)

By: Jennifer Geisler, Vice President, Marketing, ForeScout Technologies, Inc.
Originally published: October 25, 2016

It had all the makings of a blockbuster horror movie: Malicious actors, ineffective agents and plenty of cameras. However, in last week’s hack through thousands of IoT devices, the carnage was real. The irony here is that the surveillance cameras companies use to monitor events within and around their buildings are the same systems responsible for rendering them helpless last week.

Although a scary phenomenon, the strain of Mirai malware that was used to hack CCTV video cameras, digital video recorders and other IoT devices isn’t innovative, nor is its mode of operation. I wish I could say that the massive Distributed Denial of Service (DDoS) attack that brought down large sections of the Internet came as a surprise, but at ForeScout, we’ve been warning enterprises and governments about the potential for threats like this one for some time now.

Clearly, many in the industry are shaken over this IoT attack. Security pundits are providing ideas about how it happened—and more importantly—how to prevent it in the future. Some believe the solution is to switch over to a backup DNS provider at the first sign of this kind of incident. Others believe device manufacturers should be embedding security. But a more practical approach is to use a network-based solution that doesn’t rely on agents to discover and classify the wide range of IoT devices and then manage access to the company networks. This approach can help secure networks against hackers who are using IoT devices, such as surveillance cameras, HVAC systems, video monitors, lighting systems and healthcare devices, as the new entry point to the enterprise.

These new security threats require a new approach using a solution that provides the ability to:

  • Discover IoT devices that don’t include traditional security management agents.
  • Determine with a high level of confidence the identity, type and location of each device.
  • Dynamically assign devices based on their identity to appropriate network segments.
  • Monitor device behavior and connections to recognize anomalous activity and alert, limit or block network access to quickly minimize damage and contain malware propagation.
  • Make third-party security tools aware of the device identity to implement identity-aware security policies across the enterprise and automate response actions.

Read more>>

Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise

RSS

Leave a Comment

Your email address will not be published. Required fields are marked *

three × one =

Ready to find out what’s lurking in your network?

Scroll to Top