Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT...

47
CYBER SECURITY CONFERENCE June 25th to 29th 2018 Drones the new weapon of choice - also for hackers 09:30 - 10:15 By Dominique C. Brack

Transcript of Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT...

Page 1: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

CYBER SECURITY

CONFERENCE

June 25th to 29th 2018

Drones the new

weapon of choice

- also for hackers

09:30 - 10:15

By Dominique C. Brack

Page 2: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

About me…Info Sec Enthusiast

Page 3: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Cooperative

Drones

Page 4: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Non-

Cooperative

Drones

Page 5: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

My frame of mind…I am

playing

defence

To be good at

defence you

need to know

the attack

capabilities as

well.

Page 6: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Business/

Consulting

Perspective

Cyber/

Security

Perspective

Critical

Infrastructure

Perspective

My Goals for this talk

Knowing how to assess

risk and select

appropriate

countermeasures for

your critical

infrastructure. Know the

CBRNNE threats. Identify

areas of weak defence.

Knowing what

implications drones will

have on you. Knowing

the relevant attack

vectors for your context

(Bank, Factory,

Datacenter, City Planer

etc.).

Developing drone

based business/

consulting skills. To

be able to define

drone based

services (audit,

testing, sensors, etc.)

Page 7: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

How did the drones topic find me?

Critical infrastructure provider was looking for solutions.

eHealth provider (hospital) asked about risk mangement.

Government asked specifically about drone capabilities.

And maybe

you in the

future

Page 8: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Your worst enemy

handling drone risks

is called

Innovation

Page 9: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Why are drones an Infosec topic?And why this is definitely the right place for it.

Infosec as in

Information

security and not

just IT security.

Page 10: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Drones an Infosec topic

YES!

▪ Drones are the worst

flying IoT device you

can imagine

▪ To successfully working

drone based risks

Cybersecurity must

join Physical Security

"CyPhys" or "Phycy" ?

Page 11: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

About DronesUAV'sRPAS

▪ 0-100 Km/h: 3 seconds

▪ Stopping distance: 5m

▪ Max. speed: up to 185 Km/h

▪ Altitude (DJI Phantom4): 3'799Meters

▪ Flight times: up 45 minutes or more

▪ Payload: up to a person

▪ Reach: with 5G or GSM worldwide

▪ Costs 100$ - 20'000$ or more

▪ GPS, GALILEO and GLONASS

2.4 GHz (2400-2483.5 MHz), 5.8 GHz (5725-5875 MHz)

Beyond Visual Line of Sight (BVLOS), Visual Line of Sight

(VLOS), First Person View (FPV),

Some Drone Basics

Page 12: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Regulation

▪ https://www.easa.europa.eu/easa-and-

you/civil-drones-rpas

▪ https://www.geoportail.gouv.fr/donnees/

restrictions-pour-drones-de-loisir

▪ https://www.federation-drone.org/les-

drones-dans-le-secteur-civil/la-

reglementation-francaise/

▪ https://www.les-

drones.com/reglementation/

Regulation never

stopped actual

criminals, terrorists

or ill advised

people. You need to build

you defence capabilities yourself.

Page 13: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Paris Geomap

Page 14: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Drones are a

FUD

topic

Page 15: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Fear

Uncertainty

DoubtCircus

Low maturity topic

Innovation topic

Start-up mentalityThis means you have to test & verify all the way!

Page 16: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

WhyTesting

?

Some product promisesare like unicorns walkingover rainbows (test & verify).

Page 17: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Drone Risk Methodology and Strategy Development

Collection of drone based incidents and verification

of plausibility based on reputation of source.

Based on experience the development of the Drone

Threat Catalogue including the categories.

Definition of the Drone Threats and Drone

Countermeasures based on current technology.

Governance: building a Threat Radar

Page 18: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Drone Threat Catalogue

Page 19: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Highlights from the Catalogue

(140 Risks)

Espionage (Spying)

Shoulder Surfing through Windows/ Rooftops

Eavesdropping with Drone Mounted Laser

microphone

Privacy Intrusion

Behavioral/ Habitual Analysis

Sexual Preferences

Health Condition/ Status

Computer Systems Hacking (Intrusion)

Hacking of a Person's Medical Equipment

Kinetic (Just the Drone)

Destroy the one in 10 Years Flowering (Amorphophallus titanum)

Chasing Animals to exhaustion

Economic

Create disproportionate reputational damage (Political)

Constant provocations (restricted no fly zones) requiring

constant attention

Intrusion/ Trespassing

Evidence & Crimescene Destruction/ Tampering/ Alteration

Theft: Tangible items i.e. plans, maps, jewelry, art objects (statues), Laptops,

Mobile Phones etc.

Abductions: Children or pets

Page 20: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

11 Drone Attack Vectors

Drone Threats

Payload Attacks Comp. Sys. Hacking

Kinetic Attacks

Privacy IntrusionSignal Hacking

Espionage (Spying) EconomicCivil Disobedience

Insider Threat

SurveillanceIntrusion/ Tresp.

> Icons copyright © Reputelligence 2017

Page 21: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

6 CBRNNE Threats

CBRNNE Threats(Payload Subgroup Defence specific)

Chemical Biological Radiological

Nuclear Narcotics Explosives

> Icons copyright © Reputelligence 2017

Page 22: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Geofencing Collision

Payload

Catching

Predator BirdMissile Projectiles

Jamming No-fly zones

EMP

Shutters

12 Drone Countermeasures

Drone Threats Countermeasures

Cyber

> Icons copyright © Reputelligence 2017

Page 23: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Threat RadarThe Drone Guard drone threat radar is a management tool for assessing specific risks. The radar presents a current view on the specific risks and the expected future development of the specified risks if no actions are taken. It helps to prioritise and agree on the development of risks. The

sectors are actors from where the specified risk will most likely arise. Each threat on the radar is explained in detail.

Page 24: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

▪ Drone Guard Threat Radar

07-2017

▪ 11 Identified threat

groups (detailed

description available)

▪ 5 defined sectors (actors)

▪ Presentation for selected

groups possible

▪ Strictly internal

Page 25: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Some Payload ExamplesFor testing purposes

we mounted a DJI

Phantom 2 with a

payload device.

The device can be

remotely dropped.

It can be filled with

anything you want.

You can also drop memory sticks, fake access points, tracking devices etc.

Page 26: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

So

me

Pa

ylo

ad

Ex

am

ple

s

Page 27: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Movie time!

Page 28: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions
Page 29: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Primary/ SecondaryPrimary Risks are the risks

directly caused by the drone

like physical damages to

facilities, injuries to spectators

and athletes.

Secondary Risks are the risks

caused by a drone like mass

panic, damages to the

reputation, liability and

copyright issues, cancellation

and delay of activity and

political implications.

Page 30: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Drone Threats Countermeasures Assessment

What works best?

Page 31: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

The 5 Assessment

Criteria's

▪Effectiveness

▪Safety & Risk

▪Public acceptance

▪Legality

▪Costs

Page 32: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

GeofencingCollisionPayloadCatchingPredatorMissile Projectiles Jamming No-fly zonesEMP Shutters

Effectiveness

Safety

Public

Acceptance

Legality

Costs

Cyber

1-10 (most)

1-10 (best)

1-10 (most)

Regulated –

non-regulated

1-10 (highest)10 7 8 9 7 5 6 7 8 2 2 6

8

reach

automatism

reach

5

Limited reach

8

collateral

8

Agility, speed

7injuries

hit rate

4reach

3

hit rate reach

7

hit rate

5 If not

tampered

9

organizational

2

policies

9

collateral

2

Less collateral

4

GPS, Galileo

9

application

5 7 6

collateral

3 8

collateral

3

GPS

8

GPS, FIrmware

8 6

Not

appropriate

2

dangerous

3Widely

accepted

9

damages

5

Friendly, injuries

8 7 3Less

destructive

8 6 9 8 7

Cracking WPA legitimization

asymmetric overshooting GLONASS Crash landing Sec. landing Crash landing target aquis. Remote ctrl Vendor controlled Limiterd scope

disproportional

Eco. nonsense Destruction of

property

Non threatening

to public

Destruction of

property

Destruction of

property

Destruction of

property

Regulated

-Defence

-Military

Private/

Gov:

Regulated

Others: non-

regulated

Fobidden

by FCCfcc.gov/general/j

ammer-

enforcement

Non-

regulated- Appropriate-

ness of

counter-

measures

Non-regulated Non-

regulated- Appropriate-

ness of

counter-

measures

Non-

regulated- Appropriate-

ness of

counter-

measures

Data

protection

act

Non-

regulated- Appropriate-

ness of

counter-

measures

Regulated

https://www.bakom.admin.ch/bakom/en/homepage/equipments-and-installations/particular-equipment/jammers.html

Regulated

-DJI etc.

- Firmware

- SW updates

- Flight ctrls.

Non-

regulated

- - Private

policies

22 19 34 27 29 22 15 30 24 28 20 28

A AIA AA A A A AI PI PIA

Page 33: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Effectiveness

Safety

Public

Acceptance

Legality

Costs

1-10 (most)

1-10 (best)

1-10 (most)

Regulated –

non-regulated

1-10 (highest)

Jamming

8

Limited reach

8GPS, Galileo

9

Widely

accepted

9

GLONASS

Fobidden

by FCCfcc.gov/general/j

ammer-

enforcement

34

A

Predator

7

Agility, speed

7injuries

7

Friendly, injuries

8

Sec. landing

Non threatening

to public

Non-regulated

29

A

Cyber

7

reach

7

8

Less

destructive

8

Cracking WPA

Remote ctrl

Data

protection

act

30

A

Geofencing

2

If not

tampered

9

GPS

8

9

Regulated

28

PI

Shutters

6

policies

9

6

7

Limiterd scope

Non-

regulated

- - Private

policies

28

AI

EMP

9

collateral

8

application

5

damages

5

Crash landing

Destruction of

property

Non-

regulated- Appropriate-

ness of

counter-

measures

27

A

Page 34: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

What's left?▪A two step approach is

recommended:

1.) Detection, Recording and

Triangulation (Forensic Grade)

2.) Active Defence Mechanism's,

Take Down and Block Starting

GeofencingShuttersCyber

Today

Regulation changes quite

regularly check back often.

Page 35: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Drone Detection is not Drone Defence!

Page 36: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Data collection with drone detection sensors installed in our locations (over IoT cloud).

Example Manual Forensic

Page 37: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Detection Log

Forensic sound, court admissible log file of drone detected.

Page 38: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

The PhotoA particular press photo caught the attention…

The city is a no-fly zone. This photo was suspect in regards

to the angle taken and the person looking up.

Page 39: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

With the help of

google Street view

the place the photo

was taken could be

investigated.

Correlation of the

drone detection log

and the picture from

the press leads to a

high likelihood that

the photo was taken

by a DJI Mavic Pro.

OSINT

To be affirmative the drone should be seized and the pictures EXIF'd.

Page 40: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Testing is Dangerous and expensive

Lucky it was not

my wife's car…

Page 41: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Beware!

Fish gills…

There is such a thing as a

typical drone injury…

You may look away

Page 42: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Upping safety!

Page 43: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Never!Ever!

Do!

This!No 10 finger typing anymore…

Page 44: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Do! This!

Always!

Page 45: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

Movie time!

Page 46: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions
Page 47: Drones the new weapon of choice - also for hackers 09:30 ... · Drones are the worst flying IoT device you ... the expected future development of the specified risks if no actions

The End