CLAIMS INVESTIGATIONS IN THE AGE OF THE INTERNET OF THINGS - LARRY DANIEL, ENCE, ACE, AME, CTNS, CTA, CWA, DFCP, BCE

Page created by Jimmy Ayala
 
CONTINUE READING
CLAIMS INVESTIGATIONS IN THE AGE OF THE INTERNET OF THINGS - LARRY DANIEL, ENCE, ACE, AME, CTNS, CTA, CWA, DFCP, BCE
CLAIMS INVESTIGATIONS IN THE AGE
OF THE INTERNET OF THINGS
LARRY DANIEL, ENCE, ACE, AME, CTNS, CTA, CWA, DFCP, BCE

                           © 2017 Envista Forensics
CLAIMS INVESTIGATIONS IN THE AGE OF THE INTERNET OF THINGS - LARRY DANIEL, ENCE, ACE, AME, CTNS, CTA, CWA, DFCP, BCE
Outline

 • Internet of Things                                       • Security Risks
          • What is it?                                        • Bugs (Undocumented Features)
          • History                                            • Hacking
 • Types of IoT                                                • Ransomware
          • Always on devices                               • Investigations
          • Smart home devices                                 •   When the data is created
          • Wearable technology                                •   Where the data is located
          • Vehicles                                           •   How the data is acquired
          • Industrial/Business applications                   •   How the data can be used

2 of 19                          © 2017 Envista Forensics
CLAIMS INVESTIGATIONS IN THE AGE OF THE INTERNET OF THINGS - LARRY DANIEL, ENCE, ACE, AME, CTNS, CTA, CWA, DFCP, BCE
Internet of Things (IoT)

 • What is the Internet of Things?
          • 1980’s
             • Carnegie Melon University
                 • Programmers would connect via the internet to
                   the Coke machine to see if a drink was available,
                   and if it was cold.

                                            © 2017 Envista Forensics
                                                                       https://www.cs.cmu.edu/~coke/history_long.txt
3 of 19
CLAIMS INVESTIGATIONS IN THE AGE OF THE INTERNET OF THINGS - LARRY DANIEL, ENCE, ACE, AME, CTNS, CTA, CWA, DFCP, BCE
Internet of Things (IoT)

 • What is the Internet of Things?
          • Any device with an on/off switch
            that is connected to the internet
             • The Internet of Things (IoT) is the
               network of physical objects—devices,
               vehicles, buildings and other items
               embedded with electronics, software,
               sensors, and network connectivity—that
               enables these objects to collect and
               exchange data

                                                                Petchatz.com

4 of 19                              © 2017 Envista Forensics
CLAIMS INVESTIGATIONS IN THE AGE OF THE INTERNET OF THINGS - LARRY DANIEL, ENCE, ACE, AME, CTNS, CTA, CWA, DFCP, BCE
Internet of Things (IoT)

 • Milestones
          • Barcode Reader
            • 1952
               • First ever built in a New York
                 apartment by Norman Joseph and
                 Bernard Silver
               • Ability to create and store data for
                 retailers, shipping, inventory
                 management…powerful when coupled
                 with RFID

5 of 19                            © 2017 Envista Forensics
CLAIMS INVESTIGATIONS IN THE AGE OF THE INTERNET OF THINGS - LARRY DANIEL, ENCE, ACE, AME, CTNS, CTA, CWA, DFCP, BCE
Internet of Things (IoT)

 • Milestones
          • RFID
            • 1990
               • Olivetti Badge System is invented to
                 track a person’s location.

6 of 19                             © 2017 Envista Forensics
CLAIMS INVESTIGATIONS IN THE AGE OF THE INTERNET OF THINGS - LARRY DANIEL, ENCE, ACE, AME, CTNS, CTA, CWA, DFCP, BCE
Internet of Things (IoT)

 • Milestones
          • Big Data / Cloud
             • 2008-2009
                • According to Cisco Internet Business
                  Solutions Group (IBSG), the Internet of
                  Things was born in between 2008 and 2009
                  at simply the point in time when more
                  “things or objects” were connected to the
                  Internet than people.
             • 12.5 billion connected devices in 2010
          • Why is needed
             • Ability to store and transmit massive
               amounts of data generated by devices,
               sensors, websites, applications, etc.

7 of 19                             © 2017 Envista Forensics
CLAIMS INVESTIGATIONS IN THE AGE OF THE INTERNET OF THINGS - LARRY DANIEL, ENCE, ACE, AME, CTNS, CTA, CWA, DFCP, BCE
Internet of Things (IoT)

 • Cellular Network
          • Big Data / Cloud
             • The company (Ericcsson) also expects IoT device shipments to swell from 4.6 billion in 2015 to 15.7
               billion in 2021, which represents a 22% six-year compound annual growth rate…This would mean that
               approximately 1.5 billion IoT devices would be connected to cellular networks by 2021.
          • Near global access
             • 90% of the world covered by cellular signal
             • LTE and Beyond

             http://www.businessinsider.com/cellular-networks-key-to-internet-of-things-2016-6
8 of 19                                               © 2017 Envista Forensics
CLAIMS INVESTIGATIONS IN THE AGE OF THE INTERNET OF THINGS - LARRY DANIEL, ENCE, ACE, AME, CTNS, CTA, CWA, DFCP, BCE
IoT Devices

 • Always on devices
          • Always listening…?
          • Data collection
          • Data stored on local devices
             • Cell phones, computers
          • Data stored in the cloud
             • Association accounts

9 of 19                           © 2017 Envista Forensics
CLAIMS INVESTIGATIONS IN THE AGE OF THE INTERNET OF THINGS - LARRY DANIEL, ENCE, ACE, AME, CTNS, CTA, CWA, DFCP, BCE
IoT Devices

  • Vehicles
           • Cellular connection
           • Autonomous
           • Semi-autonomous
              • Tesla “Summon”

10 of 19                           © 2017 Envista Forensics
IoT Devices

  • Wearable technology
           • Beyond fitness!
           • Medical
              • Athletic performance, medical
                analytics
           • Logistics
              • People movement, animal
                movement
                 • Livestock are one of the first uses
                   of IoT, including tracking movement,
                   fertility, behavior, lactation…
           • Government
              • Tracking, monitoring

11 of 19                              © 2017 Envista Forensics
Internet of Things (IoT)

  • What the Future Holds
           • Hyper-connection is the
             future, and it is coming fast.

12 of 19                           © 2017 Envista Forensics
IoT Devices

  • Garmin Fenix 5X
           • Tracks my performance metrics
             • Can keep history of my activity spanning
               years
             • Third party application integration

13 of 19                          © 2017 Envista Forensics
IoT Devices

  • Garmin Fenix 5X
           • Tracks my performance metrics
             • Daily steps and when they were taken

14 of 19                         © 2017 Envista Forensics
IoT Devices

  • Garmin Fenix 5X
           • Tracks almost everything about me
              • Heart rate throughout the day

15 of 19                           © 2017 Envista Forensics
IoT Devices

  • Garmin Fenix 5X
           • Tracks almost everything about me
              • Down to the minute heartrate tracking

16 of 19                          © 2017 Envista Forensics
IoT Devices

  • Garmin Fenix 5X
           • Tracks almost everything about me
              • Stress analytics based upon heart rate
                and HRV (heart rate variability)

17 of 19                            © 2017 Envista Forensics
IoT Devices

  • Garmin Fenix 5X
           • Tracks almost everything about me
              • Location activity, routes, maps, saved
                segments
              • Can contain maps inside the watch for
                almost the entire world

18 of 19                           © 2017 Envista Forensics
IoT Devices

  • Smart home
           • Next wave in home design
             • Convenience
                 • Automated HVAC
                 • Integrated multimedia
             • “Security”
                 • Video cameras
                 • Video doorbells and intercoms
                 • Smart locks
             • Accessibility
                 • Voice commands
                 • Scheduling tasks (lawncare, sprinklers)
             • Efficiency
                 • Auto shot off lights
                 • Smart appliances
19 of 19                                  © 2017 Envista Forensics
IoT Devices

  • Industrial Controls / Business Applications
           • Automation
           • Precision
           • Logistics
           • Data Analytics

20 of 19                      © 2017 Envista Forensics
IoT Security Risks

  • Ransomware
           • Will become more widespread
             • Greater probability of holding
               physical assets ransom

21 of 19                           © 2017 Envista Forensics
Ransomware

  • What is it?
  • How do you get it?
  • What is the purpose?
  • Best practices to remove?
  • Best practices to avoid it?

22 of 19                 © 2017 Envista Forensics
Ransomware

  • What is it?
           • Malware that locks computer in some way
             • Comes in different flavors

23 of 19                           © 2017 Envista Forensics
Ransomware

  • It comes in different flavors
           • The not good
             • User still has rudimentary control of system / popups, etc.

24 of 19                           © 2017 Envista Forensics
Ransomware

  • It comes in different flavors
           • The not good
             • User still has rudimentary control of system / popups, etc.
                • Fake Antivirus
                • Goal is to be very annoying and scare the user
                • Pay to go away

25 of 19                             © 2017 Envista Forensics
Ransomware

  • It comes in different flavors
           • Fake Antivirus

26 of 19                      © 2017 Envista Forensics
Ransomware

  • It comes in different flavors
           • Fake Antivirus
              • Not even the Macolytes
              • are safe!

27 of 19                          © 2017 Envista Forensics
Ransomware

  • It comes in different flavors
           • The bad
             • System locked

28 of 19                       © 2017 Envista Forensics
Ransomware

  • It comes in different flavors
           • The bad
             • System locked
                • Prevents access to computer files and programs
                • Typically, underlying files are left alone

29 of 19                            © 2017 Envista Forensics
Ransomware

  • It comes in different flavors
           • The really ugly
              • Encryption

30 of 19                       © 2017 Envista Forensics
Ransomware

  • It comes in different flavors
           • The really ugly
              • Cryptoransomware

31 of 19                           © 2017 Envista Forensics
Rise of the Ransomware

  • Ransomware Infections
           • Jan 2015 – Apr 2016

Symantec: An ISTR Special Report: Ransomware and Businesses 2016

32 of 19                                                       © 2017 Envista Forensics
Rise of the Ransomware

  • Ransomware type by year
           • Takeover of the ugliest

Symantec: An ISTR Special Report: Ransomware and Businesses 2016

33 of 19                                                       © 2017 Envista Forensics
Rise of the Ransomware

  • Ransomware infections by
    region
           • Jan 2015 – Apr 2016

Symantec: An ISTR Special Report: Ransomware and Businesses 2016

34 of 19                                                       © 2017 Envista Forensics
Rise of the Ransomware

  • Consumer vs. Organization Infections
           • Jan 2015 – Apr 2016

Symantec: An ISTR Special Report: Ransomware and Businesses 2016

35 of 19                                                       © 2017 Envista Forensics
Rise of the Ransomware

  • Infections by Organization
    Sector
           • Jan 2015 – Apr 2016

Symantec: An ISTR Special Report: Ransomware and Businesses 2016

36 of 19                                                       © 2017 Envista Forensics
Cryptoransomware Life Cycle

  • Typical Scenario
           • AKA Cryptware
             • Arrives as an email attachment
             • Looks innocuous
             • Cryptware Attached to a ZIP or
               other common file

37 of 19                         © 2017 Envista Forensics
Cryptoransomware Life Cycle

  • Typical Scenario
           • ZIP file

                        "UPDATED: All You Need to Know About CTB Locker, the Latest Ransomware Generation - Heimdal Security Blog." Heimdal Security Blog. N.p., 27 Sept. 2016. Web. 08 Nov. 2016.
38 of 19                                    © 2017 Envista Forensics
                         "Blocking the Locky Ransomware Virus - Update and Tips." Greenview Data Blog. N.p., 20 June 2016. Web. 08 Nov. 2016.
Cryptoransomware Life Cycle

  • Arrival and Infection
           • Fake document

                       "UPDATED: All You Need to Know About CTB Locker, the Latest Ransomware Generation - Heimdal Security Blog." Heimdal Security Blog. N.p., 27 Sept. 2016. Web. 08 Nov. 2016.
39 of 19                                  © 2017 Envista Forensics
                                                  "Blocking the Locky Ransomware Virus - Update and Tips." Greenview Data Blog. N.p., 20 June 2016. Web. 08 Nov. 2016.
Cryptoransomware Life Cycle

  • The Effect
           • Ransomware executes itself in “hidden” areas.
              • Memory
              • Registry
                                                         SysTracer, a utility tool that was
                                                         monitoring a computer when a
                                                         Ransomware .exe file was run

40 of 19                            © 2017 Envista Forensics
                              TrendMicroInc. "Ransomware 101: Digital Extortion in Action." YouTube. YouTube, 08 July 2015. Web. 08 Nov. 2016.
Cryptoransomware Life Cycle

  • The Effect
           • Ransomware executes
             itself in “hidden” areas.
              • Files appended
                  • encrypted

41 of 19                               © 2017 Envista Forensics
                                 TrendMicroInc. "Ransomware 101: Digital Extortion in Action." YouTube. YouTube, 08 July 2015. Web. 08 Nov. 2016.
Cryptoransomware Life Cycle

  • The Effect
           • Ransomware executes
             itself in “hidden” areas.
              • Files appended
                  • encrypted

42 of 19                               © 2017 Envista Forensics
                                 TrendMicroInc. "Ransomware 101: Digital Extortion in Action." YouTube. YouTube, 08 July 2015. Web. 08 Nov. 2016.
Cryptoransomware Life Cycle

  • The Effect
           • Ransom note displayed
             • In new window
             • Desktop wallpaper

43 of 19                            © 2017 Envista Forensics
                              TrendMicroInc. "Ransomware 101: Digital Extortion in Action." YouTube. YouTube, 08 July 2015. Web. 08 Nov. 2016.
Cryptoransomware Life Cycle

  • The Effect
           • Ransom note displayed
             • Example: Locky

44 of 19                              © 2017 Envista Forensics
                                Rogueamp. "Locky Ransomware Demonstration." YouTube. YouTube, 20 Feb. 2016. Web. 08 Nov. 2016.
Cryptoransomware Life Cycle

  • The Effect
           • Ransom note displayed
             • Example: Jigsaw

45 of 19                               © 2017 Envista Forensics
                                 ThePCSecurity. "Scariest Ransomware Ever? | Meet Jigsaw." YouTube. YouTube, 09 Sept. 2016. Web. 08 Nov. 2016.
Cryptoransomware Life Cycle

  • The Effect
           • Ransom note displayed
             • Example: Cryptolocker

46 of 19                            © 2017 Envista Forensics
                              PBSNewsHour. "Ransomware Attack Takes down LA Hospital for Hours." YouTube. YouTube, 29 Feb. 2016. Web. 08 Nov. 2016.
Cryptoransomware Life Cycle

  • The Effect
           • Scare tactics – or truth?
              • Yes, files are encrypted
              • Yes, there is a key to decrypt
                 • Some allow one file
                 • Some choose files at random
                 • Some allow you to choose files

47 of 19                                © 2017 Envista Forensics
                                  PBSNewsHour. "Ransomware Attack Takes down LA Hospital for Hours." YouTube. YouTube, 29 Feb. 2016. Web. 08 Nov. 2016.
Cryptoransomware Life Cycle

  • The Stickup
           • Deadline
           • Countdown timer
           • List of encrypted files
           • Explanation of private key encryption
           • Ransom amount
           • Payment instructions
           • Threat to user about trying to remove cryptware

48 of 19                        © 2017 Envista Forensics
Cryptoransomware Life Cycle

  • The Choice
           • User chooses between
             • Restore to a clean backup
             • Pays the ransom and hopefully receives private key
             • This is a business!
                • Help desks
                • FAQs

49 of 19                          © 2017 Envista Forensics
Cryptoransomware Life Cycle

  • The Aftermath
           • Assessing the damage
              • Once discovered, the damage is already done.
                 • What was effected?
                     •   LOCAL COMPUTER
                     •   EXTERNAL DRIVES
                     •   SHARED DRIVES
                     •   NETWORKED COMPUTERS
                     •   BACKUP SERVERS

50 of 19                                © 2017 Envista Forensics
Ransomware

  • The Aftermath
           • Data Recovery
             • Depends on cryptware used.
                • Fake antivirus / screen locker
                    • ROLL BACK TO LAST CLEAN BACKUP
                    • DELETE RANSOMWARE PROGRAM AND FILES
                • Cryptoransomware
                    • ROLL BACK TO LAST CLEAN BACKUP
                    • DECRYPTION TOOLS
                    • BRUTE FORCE TOOLS
                       • Some encryption types can be broken – but many cannot.

           • How the FBI fixes it…

51 of 19                              © 2017 Envista Forensics
Ransomware

52 of 19       © 2017 Envista Forensics
Cryptoransomware Life Cycle

  • The best defense
           • Prevention
              • Educate users in best practices
                 • Email attachments
                 • Trusted sources
              • Legitimate businesses almost
                never send attachments
                 • Airlines
                 • Banks
                 • Retail stores
              • When in doubt, pick up the
                phone and verify

53 of 19                               © 2017 Envista Forensics
Cryptoransomware Life Cycle

  • The best defense
           • IT protocols
              • Disallow some attachment types
                 • ZIP
                 • EXE
              • Protection software
                 • Antivirus
                 • Email scanners
              • Backup your data!
                 • Multiple locations
                 • Air-gapped

54 of 19                                © 2017 Envista Forensics
Next wave

  • Connected devices
           • Meeting you where you are at

55 of 19                       © 2017 Envista Forensics
IoT Security Risks

  • Hacking
           • Thousands or
             millions of insecure
             connected devices
           • Leaves critical
             systems and data
             around the world
             at risk

56 of 19                            © 2017 Envista Forensics
IoT Security Risks

  • Hacking
           • Connected vehicles

                                      https://www.envistaforensics.com/news/the-most-hackable-cars-on-the-road-1

57 of 19                          © 2017 Envista Forensics
IoT Security Risks

  • Hacking
           • Connected vehicles

                                      https://www.envistaforensics.com/news/the-most-hackable-cars-on-the-road-1

58 of 19                          © 2017 Envista Forensics
IoT Security Risks

  • Hacking
           • Connected vehicles

                                      https://www.envistaforensics.com/news/the-most-hackable-cars-on-the-road-1

59 of 19                          © 2017 Envista Forensics
IoT Security Risks

  • Hacking
           • Connected vehicles

                                      https://www.envistaforensics.com/news/the-most-hackable-cars-on-the-road-1

60 of 19                          © 2017 Envista Forensics
IoT Security Risks

  • Hacking
           • Connected vehicles

                                      https://www.envistaforensics.com/news/the-most-hackable-cars-on-the-road-1

61 of 19                          © 2017 Envista Forensics
IoT Security Risks

  • Hacking
           • MARAI Botnet
             • Largest DDOS (Distributed Denial
               of Service Attack) in history
               against the service provider Dyn
                 • Used an IoT Botnet
                 • Once computers were infected with
                   MIRAI they continually searched for
                   vunerable IoT devices using known
                   default usernames and passwords.
                   Devices like DVR players and digital
                                                                                 https://securityledger.com/2017/12/mirai-botnet-authors-plead-guilty/
                   cameras.
             • Took huge portions of the internet
               down including Twitter, The
               Guardian, Netflix, Reddit, CNN.
              https://www.iotforall.com/5-worst-iot-hacking-vulnerabilities/

62 of 19                                              © 2017 Envista Forensics
IoT Security Risks

  • Hacking
           • Cardiac devices
              • Early this year, CNN wrote, “The FDA
                confirmed that St. Jude Medical’s implantable
                cardiac devices have vulnerabilities that could
                allow a hacker to access a device. Once in,
                they could deplete the battery or administer
                incorrect pacing or shocks, the FDA said.
              • “The vulnerability occurred in the transmitter
                that reads the device’s data and remotely
                shares it with physicians. The FDA said hackers
                could control a device by accessing its
                transmitter.”

                https://www.iotforall.com/5-worst-iot-hacking-vulnerabilities/

63 of 19                                                © 2017 Envista Forensics
IoT Security Risks

  • Hacking
           • Owlet Baby Monitor
             • Alerts parents if baby is having
               heart trouble
             • Hackers coulc cause false
               signals or cause device to stop
               reporting

               https://www.iotforall.com/5-worst-iot-hacking-vulnerabilities/

64 of 19                                               © 2017 Envista Forensics
IoT Security Risks

  • Hacking
           • TRENDnet Webcam Hack
             • TRENDnet transmitted user login
               credentials in clear, readable text
               over the Internet, and its mobile apps
               for the cameras stored consumers’
               login information in clear, readable
               text on their mobile devices, the FTC
               said.
             • Allowed hackers to watch the video
               feed from the camera in real time.

               https://www.iotforall.com/5-worst-iot-hacking-vulnerabilities/

65 of 19                                               © 2017 Envista Forensics
IoT Security Risks

  • Hacking
           • Industrial Robot Arm
              • At the IEEE Security & Privacy
                conference later this month, they plan
                to present a case study of attack
                techniques they developed to subtly
                sabotage and even fully hijack a 220-
                pound industrial robotic arm capable
                of wielding gripping claws, welding
                tools, or even lasers.

             https://www.wired.com/2017/05/watch-hackers-sabotage-factory-robot-arm-afar/

66 of 19                                             © 2017 Envista Forensics
IoT Investigations
  • Data Repositories
           • Evidence collected from sensors and smart devices
              • Actual “smart” IoT devices themselves
           • Evidence collected between smart devices and outside world
              • Computer forensics, cell phone forensics, firewalls, IPS (Intrusion
                Prevention Systems), IDS (Intrusion Detection Systems)
           • Evidence collected from outside the network
              • Cloud data, social networks, ISPs (internet Service Providers), cellular
                providers, online application data

67 of 19                            © 2017 Envista Forensics
IoT Investigations

• Wearable Technology
       • Cell Phone Forensics
           • Data contained in apps themselves
       • Computer Forensics
           • Data contained in online accounts and
             local computer
       • Wearable Forensics
           • Data contained on actual wearable

68 of 19                         © 2017 Envista Forensics
IoT Investigations

  • Vehicle Forensics
           • In-vehicle infotainment
           • Vehicle telematics
  • Data types
           • 3rd part application data
           • USB, Bluetooth, WiFi connections
           • Call logs, contact lists, messages
           • Pictures, videos, social media feeds
           • Location data, navigation information
           • Event data with associated time and location

69 of 19                         © 2017 Envista Forensics
IoT Investigations

  • Vehicle Forensics
           • In-vehicle infotainment
           • Vehicle telematics
  • Connected devices

70 of 19                         © 2017 Envista Forensics
IoT Investigations

  • Vehicle Forensics
           • In-vehicle infotainment
           • Vehicle telematics
  • Track logs

71 of 19                         © 2017 Envista Forensics
IoT Investigations

  • Vehicle Forensics
           • In-vehicle infotainment
           • Vehicle telematics
  • Velocity Logs
           • Vehicle velocity and
             corresponding
             timestamp

72 of 19                            © 2017 Envista Forensics
QUESTIONS?

           Envistaforensics.com

73 of 19                          © 2017 Envista Forensics
You can also read