What are the riskiest connected devices around us today, and how should we address the cyber risks they pose?

DS: A few examples include:

  • Using devices with their default configurations, which may include services that are not needed and weak credentials.
  • Granting too broad access to suppliers, integrators and other third-parties to perform monitoring, maintenance and configuration remotely.
  • Failing to maintain an automatically updated asset inventory, thus creating blind spots on the network.
  • Not including cybersecurity requirements in the acceptance tests when new assets are commissioned on the network.

Hacktivists usually target these devices as part of opportunistic campaigns where they define a broad set of targets (e.g. companies in a certain country), use tools that scan the Internet (such as Shodan, Censys and FOFA) to find exposed devices in those targets and do one of the following:

  1. Directly use exposed weak protocols such as Modbus to tamper with their parameters, hoping to cause a physical disruption.
  2. Manage to get access to their graphical interface – human-machine interfaces – and deface them or also tamper with settings.
  3. Cause denials of service to bring these devices offline.

DS: There are three main risk mitigation measures that we recommend to organizations:

  1. Harden connected devices by maintaining an accurate asset inventory, disabling unused services, patching known vulnerabilities and using strong credentials.
  2. Do not expose unmanaged devices directly to the internet, with very few exceptions such as routers and firewalls. Ensure threat the administrative interfaces in those devices are segmented behind access control lists and VLANs.
  3. Monitor the network for signs of intrusion to alert on known or suspicious malicious behaviour.