2020 Unit 42 IoT Threat Report
2020 Unit 42 IoT Threat Report
2020 Unit 42 IoT Threat Report
Threat Report
Table of Contents
Executive Summary 3
Step 1: Know your risk and discover IoT devices on the network 16
Best Practice 2: Expand security to all IoT devices through product integrations 20
About 21
Unit 42 21
Methodology 22
IoT devices are encrypted The internet of medical things (IoMT) devices
with the most security issues are imaging
and unsecured systems, which represent a critical part of the
98% of all IoT device traffic is unencrypted, clinical workflow. For healthcare organizations,
exposing personal and confidential data on 51% of threats involve imaging devices,
the network. Attackers who’ve successfully disrupting the quality of care and allowing
bypassed the first line of defense (most attackers to exfiltrate patient data stored on
frequently via phishing attacks) and these devices.
established command and control (C2)
are able to listen to unencrypted network
traffic, collect personal or confidential Healthcare organizations
information and then exploit that data for are displaying poor network
profit on the dark web. security hygiene
57% of IoT devices are vulnerable to 72% of healthcare VLANs mix IoT and IT
medium- or high-severity attacks, making assets, allowing malware to spread from users’
IoT the low-hanging fruit for attackers. computers to vulnerable IoT devices on the same
Because of the generally low patch level network. There is a 41% rate of attacks exploiting
of IoT assets, the most frequent attacks device vulnerabilities, as IT-borne attacks scan
are exploits via long-known vulnerabilities through network-connected devices in an
and password attacks using default attempt to exploit known weaknesses. We’re
device passwords. seeing a shift from IoT botnets conducting
denial-of-service attacks to more sophisticated
attacks targeting patient identities, corporate
IoMT devices are running data, and monetary profit via ransomware.
outdated software
83% of medical imaging devices run on IoT-focused cyberattacks are
unsupported operating systems, which is
a 56% jump from 2018, as a result of the
targeting legacy protocols
Windows® 7 operating system reaching its There is an evolution of threats targeting
end of life. This general decline in security IoT devices using new techniques, such as
posture opens the door for new attacks, peer-to-peer C2 communications and worm-
such as cryptojacking (which increased like features for self-propagation. Attackers
from 0% in 2017 to 5% in 2019) and recognize the vulnerability of decades-old
brings back long-forgotten attacks such as legacy OT protocols, such as DICOM, and are
Conficker, which IT teams had previously able to disrupt critical business functions in
been immune to for a long time. the organization.
High-profile, IoT-focused cyberattacks are forcing industries to recognize and manage IoT’s risks
to protect their core business operations. Markets such as healthcare are exposed to an amount of
risk that surpasses previous expectations. Some IoT vulnerabilities are life-threatening, while some
attack critical enterprise functions or exfiltrate confidential data.
1. “Gartner Says 5.8 Billion Enterprise and Automotive IoT Endpoints Will Be in Use in 2020,” Gartner, August 29, 2019,
https://www.gartner.com/en/newsroom/press-releases/2019-08-29-gartner-says-5-8-billion-enterprise-and-
automotive-io.
As these teams report to different parts of the organization, they have different ways to maintain
device security. Often, IT is more advanced in this respect because of the rapid evolution of personal
computers and server operating systems as well as their proactive security operations in contrast to
medical devices.
As a healthcare example, in hospitals, biomedical engineers know and maintain the medical
devices, but they don’t maintain the underlying operating systems that power the devices. As these
network-connected medical devices (such as X-RAY machines) often run end-of-life operating
systems with known vulnerabilities, they pose a high risk to the organization’s employees, patients,
computer systems, and—eventually—business operations.
44%
IP Phone 5%
18%
Printer 24%
9%
Intercom System
0%
5%
Consumer Electronics
7%
5%
Camera
33%
Other 5%
1%
Good news for IP phones: They account for 44% of all enterprise IoT devices but only 5% of all security
issues. Used across a wide range of industries, IP phones are often designed to be enterprise-grade in both
reliability and security.
Medical devices running outdated operating systems Security function missing in the organization
Due to their long lifecycles, medical IoT devices are Biomedical engineers who maintain medical devices
among the worst offenders of running outdated and, often lack training and resources to follow IT security
in many cases, end-of-life operating systems. These best practices to employ password rules, store pass-
devices are neither maintained by IT nor supported by words securely, and maintain up-to-date patch levels
the operating system vendors. on devices.
Infusion Pump
2%
44%
Good news: The National
16%
Cybersecurity Center of
Imaging System
51% Excellence (NCCoE) completed
Patient Monitoring 14% a medical IoT device security
26%
11% 86% project in 2019 called Securing
Point of Care Analyzer
1% Picture Archiving and Commu-
Nurse Call System 4% nication Systems (PACS) to
5%
provide guidance and reference-
4%
Medical Device Gateway
9% able architecture for securing
Medication Dispensing 3% the PACS ecosystem and to
1% include example solutions
2%
ECG Machine using existing commercial and
1%
1% open source cybersecurity
Defibrillator
0% products.
Other 1%
0%
0 10 20 30 40 50 60
2. "2019 Top Actions for Healthcare Provider CIOs: Summary and Retrospective View," Gartner, February 26, 2019,
https://www.gartner.com/en/documents/3903067/2019-top-actions-for-healthcare-provider-cios-summary-an.
Non-Medical Only
25%
Medical Only
3%
72% of healthcare VLANs house a mix of
medical IoT devices, generic enterprise
IoT devices, and IT devices. This lowers
the barrier for lateral movement. For
example, an infected laptop can easily
target surveillance cameras and DICOM
viewers found in the same network.
This is low-hanging fruit for healthcare
Mixed
organizations to address this year.
72%
2019 2017
0–9 31%
10–19 25%
threefold improvement 45%
adoption of network 4%
segmentation: 50-59 0%
0%
72%
such as peer-to-peer C2 communications and worm-like self-propagation.
41%
disrupt critical business functions or propagate throughout in the
organization.
Read on to learn more about our findings on top threats and attack
of attacks exploit
techniques.
device vulnerabilities
With the growing number of unpatchable devices, such as those running Windows 7, we’re not expecting
this trend to turn around unless more organizations follow the best practices in these materials.
Leaked IoT malware code fuels attack brought about by a Mirai botnet
new varieties
made much of the internet inaccessible
on the east coast of the US. Authorities
The leakage of the IoT botnet Mirai’s source code has initially feared this attack was the
fueled the birth of numerous Mirai variants in the past work of a hostile nation-state.
year. Adversaries have been building these variants in
a fashion similar to the way open source developers
fork new code versions from each other’s work.
Now, Mirai has grown into a framework to which developers can add new device exploits as new variants.
Zingbox alerted a customer participating in this research about a cryptomining code transfer
between an IT storage device and an OT device in its internal network. The IT team wanted to shut
down the device, but the OT team disagreed due to production safety concerns. While waiting for the
device to be allowed to go offline, the IT staff investigated the storage device as Zingbox continued
to monitor the network traffic for further malicious activities.
The next day, cryptomining code transfer was again detected on the network. Further investigation
identified the offending device as a server that hosted hundreds of VM guests on the OT network,
making the offending VM guest difficult to find. Continuous network traffic monitoring revealed
a twice-weekly scheduled data transfer. The regular pattern enabled the IT staff to identify the
offending process and offending VM guest, which they then removed from the VM host.
Intelligent device scanning and profiling enables IT security teams to have visibility of their
network-connected IoT devices, their risk profiles, and their network behavior when interacting
with other devices on the network. Today’s most advanced IoT security solutions, such as Zingbox,
use machine learning to identify even never-before-seen IoT devices and recognize malicious
network communication patterns before they cause damage.
Discovering IoT devices’ internet connectivity profiles is important. IoT devices with direct internet
access can carry higher risk profiles because internet connectivity allows exploits to move faster than
they can on devices that are only LAN-connected. Even so, purely LAN-connected IoT devices expose
a larger practical risk: These devices have been built with the assumption of safety behind a firewall.
Compared to internet-connected, SaaS-based assets, we're seeing more cleartext communication,
open ports, and weak credentials being used on these devices. A computer network in which
employees and such devices are mixed presents the challenge of user devices cross-infecting IoT assets.
As soon as IT discovers the devices and acknowledges their risk profiles, they can start the
remediation work.
After initial IoT device discovery, we recommend investigating the security posture of the top two
or three most abundant network-connected devices and working with their respective vendors on a
patch management strategy for routine maintenance moving forward.
72 3 3
According to our research VLAN use increased more than We found that only
% fold %
of healthcare VLANs don’t follow in 2019 compared to of healthcare VLANs exclusively
sound networking practices two years before host IoMT devices
3. “Predicts 2019: IoT Will Drive Profound Changes to Your Core Business Applications and IT Infrastructure,”
Gartner, December 13, 2018, https://www.gartner.com/en/documents/3895863/predicts-2019-iot-will-drive-
profound-changes-to-your-co.
In healthcare, close collaboration with the IT team enables biomedical teams to create best practice
guidelines for securely maintaining medical IoT devices. With the increase in devices running on
end-of-life OS, healthcare organizations must plan to employ these recommendations as early as
possible to help manage and secure their medical IoT assets.
High Risk
10%
Secure Optimize
Onboard
Manage
Identify Retire
Orchestrate
1. Identify: Be notified any time a new device is connected to the network. Identify the device, its
category, its risk profile, and usage statistics.
2. Onboard: Most IT teams architect their networks to dynamically onboard IT devices using
network access control (NAC), but this capability is not extended to IoT assets. Manual
onboarding of IoT devices is a challenge. Today, several IoT security solutions offer integration
with NAC and next-generation firewalls to consider a device’s identity, purpose, and risk profile
in its onboarding and network segmentation.
3. Secure: Unprotected, connected IoT devices pose high risks to all organizations. Traditional
endpoint detection and response (EDR) solutions cannot protect such assets since they
require software agents. IoT security solutions offer real-time monitoring of identified IoT
devices through network traffic. Via alerts and product integrations, they enable securing or
quarantining of devices.
4. Optimize: For expensive IoT assets, such as imaging devices in hospitals, deep statistics on
device utilization are important inputs for capital planning and asset optimization.
5. Manage: Real-time monitoring, reporting, and alerting are crucial for organizations to manage
their IoT risks.
6. Retire: Devices carry personal and confidential information and are subject to compliance
requirements in many cases. Retiring such assets becomes a managed and audited process.
Without IoT context, security solutions often misclassify IoT devices. Properly classifying IoT
devices ensures they are only granted access to appropriate resources and placed in the right
network segments, reducing the risk of threats to other resources and networks. IoT security
products bring in this context, enabling IT to channel this intelligence to existing security solutions
through product integrations.
At Palo Alto Networks, we recognize that to realize the full benefit of IoT
devices requires a revolutionary approach to performing and orchestrating
each phase of the device lifecycle. We recognize the importance of
traditional IT best practices as well as the positive business impact that OT
can have. To make IoT work well requires the unique blend of IT and OT
that we deliver. Our solution is unobtrusive, clientless, cloud-based, and
out of band. These capabilities are not simply the benefits of our solution—
they are the underlying principles.
Unit 42
Unit 42 is the global threat intelligence team at Palo Alto Networks
and a recognized authority on cyberthreats, frequently sought out by
enterprises and government agencies around the world. Our analysts are
experts in hunting and collecting unknown threats as well as completely
reverse-engineering malware using code analysis. With this expertise,
we deliver high-quality, in-depth research that provides insight into
tools, techniques, and procedures threat actors execute to compromise
organizations. Our goal is to provide context wherever possible, explaining
the nuts and bolts of attacks as well as who’s executing them and why so
that defenders globally can gain visibility into threats to better defend their
businesses against them.
Devices analyzed:
1,272,000
Network sessions analyzed:
73.2 billion
Device types analyzed:
8,355
3000 Tannery Way © 2020 Palo Alto Networks, Inc. Palo Alto Networks is a registered
Santa Clara, CA 95054 trademark of Palo Alto Networks. A list of our trademarks can be found at
https://www.paloaltonetworks.com/company/trademarks.html. All other
Main: +1.408.753.4000 marks mentioned herein may be trademarks of their respective companies.
Sales: +1.866.320.4788 Palo Alto Networks assumes no responsibility for inaccuracies in this document
Support: +1.866.898.9087 and disclaims any obligation to update information contained herein. Palo Alto
Networks reserves the right to change, modify, transfer, or otherwise revise this
www.paloaltonetworks.com publication without notice. 2020-unit42-iot-threat-report-030620