Unsafelok Threat Highlights It’s About Both IoT Devices and Applications

IoT devices and applications exist all over the place, and in high volume.  Today’s news brought yet another example of how the scale of IoT systems leads to the conclusion that their security is deeply dependent on automation.  Security researchers announced a hotel keycard hacking technique called “Unsafelok” which enables over 3 million doors worldwide to be opened by anyone.  This hack was specifically for Dormakaba’s Safelok RFID card access systems which are used in over 13,000 properties in 131 countries.  Yikes!

Making the exploit possible is that both the application (the software that programs the keycards and maintains connection to the door locks) and the devices (key cards and lock mechanisms) operate in a unique way.  Looked at individually, both the application and devices are secure.  But as researcher did, if you look at the combined system of application and devices you can then see that path to breaching IoT security and giving a malicious hacker the ability to open any door within that system. 

Key to this vulnerability is the combination of both IoT devices and the application that controls and manages them.  This is really the core of IoT security; IoT applications control and manage IoT devices in a tightly-coupled manner, and vulnerabilities can exist on both sides of that coupling.  In some cases, such as with Unsafelok, the vulnerability can only be exploited through a combination of application and device operations. 

This is why in addition to traditional IT security measures there needs to IoT-specific security solutions in order to stop threats such as Unsafelok.  Viakoo believes that to address IoT security there needs to be a highly accurate and automated method to establish a “dictionary” of IoT devices, ports, and applications in order to have the context and information to find and remediate such threats quickly.  Accuracy is especially important when it comes to defining those tightly-coupled relationships; inaccurate data causes a “garbage-in, garbage-out” problem where the real threats might be ignored while false threats are being chased.  The data accuracy needed requires a direct query of the IoT system to gain this information because other methods like network-based discovery are based on inference and guesswork. 

Concerned about this latest example of how insecure IoT applications and devices can be?  Using deadbolts and in-room safes when staying at a hotel using this access control system can help with the immediate issue presented here.  But the bigger issue of IoT security in the enterprise is where you should take action now to reduce your attack surface and organizational risk.  A good starting point is taking to one of Viakoo’s IoT security experts; click here to sign up for 30 minute Zoom call.  Already have an IoT security strategy in place but not happy with the results?  You’re in good company, as our recent survey found that while almost every company has an IoT security plan, more that 65% are not being successful with it (and 50% believe IoT security is the weakest part of their overall security).  Download a copy of our recent survey here; it can give you a sense of where your tech stack, governance, or other aspects of security can be improved. 

The post Unsafelok Threat Highlights It’s About Both IoT Devices and Applications appeared first on Viakoo, Inc.

*** This is a Security Bloggers Network syndicated blog from Viakoo, Inc authored by John Gallagher. Read the original post at: https://www.viakoo.com/blog/unsafelok-threat-highlights-its-about-both-iot-devices-and-applications/

Recent Posts

Bombshell in SSH servers! What CVE-2024-3094 means for Kubernetes users

On March 29, 2024, Red Hat disclosed CVE-2024-3094, scoring a critical CVSS rating of 10. Stemming from a The post…

16 hours ago

Critical Backdoor Found in XZ Utils (CVE-2024-3094) Enables SSH Compromise

The Mend.io research team detected more than 100 malicious packages targeting the most popular machine learning (ML) libraries from the…

20 hours ago

Cybersecurity Tabletop Exercises: How Far Should You Go?

With global cyber threats and other international tensions growing, what scenarios should state and local governments consider when conducting exercises…

22 hours ago

An Accidental Discovery of a Backdoor Likely Prevented Thousands of Infections

... Read more » The post An Accidental Discovery of a Backdoor Likely Prevented Thousands of Infections appeared first on Deepfactor.

1 day ago

What You Need to Know About the XZ Utils Backdoor

Understand how to respond to the announcement of the XZ Utils backdoor.

2 days ago

Understanding and Mitigating the Fedora Rawhide Vulnerability (CVE-2024-3094)

CVE-2024-3094 is a reported supply chain compromise of the xz libraries. The resulting interference with sshd authentication could enable an…

2 days ago