34c3 intro Herald: So, to our next talk... Sit and relax, you know what that means. Glass of wine or mate, your favorite easy chair, and of course your latest WIFI enabled toy compromising your intimate moments. Barbara Wimmer, as free author and journalist, will tell you more about the Internet of Fails, will tell you more about where IoT goes wrong. She's a free author and journalist at futurezone.at, (DORF?), and will in the near future release one or two public stories and a book. Applause! applause Barbara Wimmer: Hello everybody. I'm waiting for my slides to appear on the screen. Where are my slides please? That's not my slides. Oh, thank you very much. So welcome to the talk Internet of Fails when IoT has gone wrong. This is a very negative topic title actually and you're getting a lot of negative stories in this next hour but I don't want to talk only about negative things so you can see "FAIL" as a "first attempt in learning". So actually at the end of the talk I want to talk about solutions as well and I don't want to provide only bad and negative examples because that's what we hear every day. And this is perfect for the congress motto "tuwat" because this is all about let's tuwat together. So nobody, most of you in this room don't will not know me. So I'm going to introduce myself a little bit and why I'm talking to you about this topic, because that's probably what everybody asks me when I appear somewhere and say oh I give talks about IoT. And so actually I work as an IT journalist for more than 12 years. And I got in contact with internet of things in 2014 when I talked to the local CERT.at team in Austria. I'm from Vienna. And they first told me that the first refrigerator was caught that was sending out spam mails and that was in 2014 and actually that was really a funny story back then and we were laughing about it but at the same time we already knew that there is something coming up which is quite going to be a huge development and so from back then I watched the whole IoT development in terms of security and privacy. And in the next 45min you will hear a lot of stuff about IoT, and where the problem with IoT is currently and examples of fails in terms of security and privacy. But like I mentioned before I wanna talk about solutions and when we talk about solutions it will not be like only one side, like only the consumer, only the IT-security, only developers. Actually what I'm going not to provide is detailed IT-security stuff. So if you wanna focus more on any story that I'm talking about I'm mentioning most of the the sources in the slides and if you really wanna know this example got up, please look it up if you're really interested deeply into it. I'm a journalist and not an IT-security person so please don't expect me to go into details in this talk. Thats why it's also in the ethics talk - ethics section of the congress and not the security part. So coming to the internet of things I want to start with a few numbers because these numbers show the development of IoT. In 2016 we had 6.3 billions of devices out there. This year we already had 8.3 billion of devices and in 2020 we will - we are going to have 20.4 billion connected devices out there. So the numbers are from Gartner Institute from January and I have one more slide with more accurate data from June this year and actually this slide shows that the development is actually really growing. 17% more compared to the previous year. And by 2021 global IoT spending is expected to reach about 1.4 trillion dollars. So maybe some you are asking yourself: What is the internet of things? Maybe some of you expected I'm only talking about a smart home, because IoT is often related to the smart home. And we're having all the smart devices that we put into our living rooms, but that's actually not the main focus because it's more about the connected everything. Which means toys, sex toys, home automation, lightbulbs, surveillance cameras, thermostats, but also digital assistants and wearables. So I wanna start with a few examples of classical internet of things stuff which is actually a smart coffee maker. That's ... so what is smart about a coffee maker? It only gets ... it doesn't get smart when you regulate your coffee machine by app because what's smart about that? You can just press the button on the machine. But when you connect your coffee machine with fitness and sleeping trackers the coffee machine already knows when you get up if you need a strong or soft coffee in the morning and so that might sound comfortable for some of us, but it also has a lot of dangers inside, because you never know that the data is really safe and only stays with you. Maybe your insurance company get them one day. So you all know Cars -probably-, the film, and this is McLightning Queen and it got a toy nowadays which is sold for 350 dollars - no sorry, euros - and this car is able to sit next to you and watch the film with you and is going to comment the film. laughter And it is - this sounds very funny - but - and it is funny - but it means that it has a microphone integrated which is waiting for the terms in the film on the right stories and then it makes comments. And the microphone can only be turned off by app so there's no physical button to turn it off and actually another thing is when you first ... when you actually got this present for Christmas, which is a really expensive present with 350 euros, it's actually first updating for more than 35min before you can even use it. The next example - you're already laughing - is internet of ... I call it internet of shit because you can't say anything else to that example. It's a toilet IoT sensor which is actually a smart, small little box which is put into the toilet. And this box has sensors. It's an Intel box but I don't know and this box has sensors and these sensors help analyzing the stool. And this data that is collected is going to send into the cloud. And actually this could be very useful for people who are having chronical diseases like Colitis Ulcerosa or other chronical diseases with the digestion stuff but it is mainly designed for healthy people who want to make better nutrition and reduce their stress levels with the stool analysis. And maybe it sounds good at the beginning but this data that is collected could also be used for other things in the future. So it's a perfect example for internet of shit. But there is another internet of shit which is a twitter account that collects all these funny little stories. It's not from me, so I'm not behind that. I tried to reach the person but I never got a replay so I can't tell you anything about them but they collect examples - if you don't follow them now and are interested in this topic you might do after this talk - so after presenting a couple of IoT examples with the good and a bit of the bad sides I first wanna focus a little bit on the problem because as I said before you might now think that everything is nice, comfortable, why shouldn't we do that and stuff like that. So the problem is that most of the vendors that are doing IoT stuff now, that start to connect everything, they are creating manually operated devices without connectivity for long years and they had a lot of knowledge in terms of materials, ergonomics, mechanical engineering but almost zero in the fields of IT security. Actually I don't say that without having talked to vendors that have said exactly that when I interviewed them. Like there was a lightbulb vendor from Austria who is a really big vendor who is making lightbulbs for years and years and years and actually they started to make connected lightbulbs in 2015 and when they did that they ... and I asked them "Oh how big is your IT security department?" "1 Person". So they didn't actually have the knowledge that IT security might be more important when they connect - when they start to connect things. And actually the result is that these vendors are making the same sort of security errors than the high tech industry was dealing with 15 years ago. So the early 2000s called and want their web security, their lack of security back. So there are all kinds of problems we already know from past: hardcoded passwords, unsecure bluetooth connections, permanent cloud server connections and a lot of other stuff. So we're going to have from all these 20 billion devices out there, there will be a lot of unsecure devices and the problem is that they are collecting to a botnet and are starting DDoS attacks and we are going to have internet outages. For those who are not familiar with the terms I made a really really really short explanation so that you are also understanding what I am talking about. A botnet is a network of private computers infected with malicious software and controlled as a group without the owners knowledge. Like the example of the refrigerator that was sending out spam I told you about earlier. This refrigerator sent out ... one refrigerator was sending out 750.000 spam mails by the way. So the botnet, that has a botnet owner of course, because it's not only a zombie botnet, and the botnet owner can control this network of infected computers by issuing commands to perform malicious activities like DDoS attacks. So DDoS is a distributed denial of Service attack and actually that's an attempt to stop legitimate users form accessing the data normally available on a website. And this actually can lead to completely shutdown of a service. And we had this already so I'm not talking about something in the far future but we had this in 2016 and most people already recognized it but it didn't recognized why - their twitter accounts did not work, they couldn't use Reddit, or Spotify, or they couldn't pay with PayPal at the moment. And behind that attack was Mirai so several other major services were offline because an infrastructure provider was attacked by zombie IoT devices. And this was one year ago and now one year later Mirai botnet infections are still widespread so not every zombie device is already secured so there are still some around and not so little and actually there is a study saying that every unsecured - no every botnet infection that's there - every security hole thats there is staying there for at least 7 years which means that all the unsecure devices which are out now could get infected and could stay infected for 7 years. So that's why it's very important that we are going to do something really quickly and not starting like in 2020. So Mirai was supposed to continue in 2017 and actually a lot of DDoS attacks similar attacks like Mirai happened in 2017. This as an example could unleash at any moment which was in November one few days later exactly this attack was unleashed, so it happened. In 2017 we also had a huge increase in DDoS attacks 91% increase from Q1 and it's going to increase more. I have to take a short sip, sorry. Now we're coming back to examples. One really good example is the university that was attacked by it's own vending machines and smart lightbulbs and 5000 other IoT devices. This was very very difficult to get fixed because they couldn't get the university network down so they had to find a really difficult solution to get it back up. And actually how did they even notice about it? Because the students complained that the internet was going so slow. Another example which has nothing to do with DDoS attacks anymore but with IoT sensors - actually - in a fishtank in an American casino - north American casino there were sensors measuring the temperature of the aquarium and the fishtank - that the fishes didn't die - and these sensors were sending the data to a PC of this casino and this PC was the same - was using the same network than the sensors so actually the cybercriminals could access to this data of the casino and were stealing them and sending them to their own servers in Finland. And the amount was about 10GB of data. Another example which is actually one of my most - I don't know why but it's the example I personally like most of the whole examples that are collected in 2017. So there was a surveillance camera bought by a netherlands woman. Actually she wanted to surveil her dog when she was out at work but what did this camera do? It did surveil the dog when she was out at work, but when she was at home the camera followed her through the room and was watching her all over the place. And it had a microphone integrated and one day it started to talk with her and it said "hola señorita". And this woman was so frightened that she actually started to record that because she thought that nobody will buy this story. All will think I’m crazy but this camera actually did not surveil the dog but was hacked and surveiled her. And it was a very cheap camera by the way. She bought it in a supermarket but we don't know the name of the vendor in this case. So coming for a very cheap camera to a very hightech camera the cameras you see here is one that is actually build in a lot of companies and there was a security hole found by some Vienna security specialists from SEC consult and actually they demonstrated me how they could actually hack into this camera and how they could make it possible that this camera shows pictures of an empty room in a bank so the pictures from the empty room in the bank were shown to me and in reality the bank was robbed - ok, not in reality. But it could have been robbed. So thats actually sounding a little bit like a movie scene and actually this camera which is sold as a security camera is kind of useless when it doesn't have security and it doesn't really show the picture. And the problem with this camera was hardcoded passwords. And the hardcoded password got fixed after so it was responsible disclosure process and this camera is safe now. So I'm coming to a different example now. And this now finally explains why this toy is sitting here. Before my talk everybody was telling me "Ah, you brought your favorite toy, to protect you during your talk." and I was laughing "Oh no. No no no no, it one of the most unsecure devices out there." But before we come to this in special I'm going to talk a little bit about connected toys. So the Germany Stiftung Warentest had made a study regarding connected toys. The people were testing them and actually all of their tested bears, robot dogs and dolls were very very unsecure and some of them were even critical and are extremely critical and others were critical. And actually what was the problem with the toys and also with this? They were using - they are using bluetooth connections. And these bluetooth connections are not secured by a password or a PIN code. So every smartphone user close enough could connect to the toy and listen to children or ask questions or threaten them and another problem are the data collecting apps related to this stuff. So actually this little unicorn has an app where you can send the messages. So what does this actually? It can play messages and you can - as a child you can record messages and send it to you mom or your dad. And when you play messages you never - the heart blinks. So actually there's a message waiting for you now. And I'm not sure if it's the same that I recorded earlier before. Maybe now it is, maybe at the end of the talk when I press the button again it might not be. And so everybody can - so this - err sorry - This device does have an app where you can send the message to. And it also has a children interface and where you are using the children interface you're seeing that there are ads integrated. And in the children's interface there were ads for porn and ehm... ...other stuff, which are not really in the best hands of a child. And this is also what Stiftung Warentest has actually - yeah has actually found out. The data is also used to send to third party companies and they put trackers to control the online behavior of their parents. This is also done with this device. So the Stiftung Warentest advises a not connectible dumb teddy might be the smarter choice in the future. And before I finally press this button - you're probably curious now - but first I'm going to talk a little bit about Cayla. You probably have heard of Cayla as a very unsecure doll. Actually it got forbidden in Germany by law. It is judged as a prohibited broadcasting station. And parents who do not destroy it will be actually fined. And I tried to buy Cayla in Austria and didn't get the doll. So actually it should be really off the market in the German speaking area. And actually that is also a result of a campaign from Norway called Toyfail, which is a Norwegian consumer organization who are actually - this is Cayla. You can see her now. Which is actually going to the European Parliament to make them understand how unsecure toys is doing a lot of harm and how we should put more security into toys. And I've brought a short little video and I hope we can hear the audio here as well. We will see. No. You don't hear anything. But this doesn't matter because they have... Sign Language Interpreter: subtitles Barbara: subtitles. Person (Video): There's not added any kind of security. With simple steps I can talk through the doll and listen to other people. Person through doll (Video): No one wants others to speak directly through the doll. Barbara: He's speaking now at the moment. Doll: inaudible Person: And you may think... [see video subs] ... Cayla, can I trust you? Doll: I don't know. laughter applause Barbara: Yeah and we don't trust Cayla and we also don't trust our little unicorn. button clicking laughter crying baby in background Barbara: Ok, somebody has hacked it. laughter Yes. Unicorn Toy: Hello, Chaos Communication Congress. Barbara: Ok, that's what I recorded earlier. But there is some time left. Maybe, maybe... but you're all sitting too far actually and nobody of you brought your computer, so... but we will see, we will try it later on. So but actually you shouldn't trust this unicorn, because this unicorn is from the company called Cloudpets, which is a - no sorry It's a toy called Cloudpet and the company is Spiraltoys from the US. So this is Cloudpet and there are cats and dogs and unicorns and it's very ugly but it's a unicorn. And actually now I'm already talking a lot about this. Why I'm explaining you now. There already was a data breach with this toy so the children's messages in Cloudpets data actually was stolen and was public on the internet. 2 million voice messages recorded on the cuddly toys has been discovered free on the internet. And actually Spiraltoys say that there was no data breach but the data was there, so... Thats also why I brought this, it was still very easily available and actually as I said before the app for child the interface shows porn ads, so I would not recommend that for your child. Actually there are already a lot of institutions out there which are warning for connected toys also the consumer group Which? which actually did a study about this and other like also the Furby connected they analyzed, the German Stiftung Warentest, the Austrian Verein für Konsumenteninformation, the Norwegian consumer council, and the FBI. The list is to be continued. So consider if you really need a connected toy for your child or yourself because the next section is about sex toys. laughter applause squeaky horn more laughter and applause I am not... It's not necessary say a lot about this example. It's actually a connected vibrator that has a build-in camera and this camera is very very very unsafe. Also this toy is really expensive, so you can't say "Eh, it's only the cheap stuff that is so unsecure." Also the high- tech stuff can be really unsecure. I mean this vibrator costs 250 dollars so it's very expensive and it has a build-in web- connected endoscope and they found out that it's massively insecure. The password of this... And if you forgot to change it it's a few more players than expected that might be watching your newest video about your private sex adventures. There was another example actually in this - sorry go back one more time to this example - there's a very funny video on it on youtube about it, maybe you wanna watch it. I didn't bring it because I couldn't reach the makers of it. So I'm going to the next example which is about a case of sex toy company that actually admits to recording users remote sex sessions and it called it a "minor bug". It was this love sensor remote app you can see the icon here and actually this is a vibrator and an app and the vibrator controlling app was recording all the sex sounds, all the sounds you're making when you're using this vibrator and stores them on the phone without your knowledge. And the company says that no information or data was sent to the servers so this audio file exists only temporarily and only your device. And they already had an update so actually this is not as funny as the other story but still it's an example of how unsecure sex stuff can be. So there are lot of lot of more sex examples out there. One you should actually definitely search for after - please don't search for now, but after this talk. You could google or duckduckgo or whatever you use the terms "blowjob injection". And please add "security" because otherwise you will land on other sites. laughter And this was a female security expert who was doing this research about a device which actually was supposed to your girlfriend could make you a special blowjob program, your special blowjob and this could be hacked so somebody else's blowjob might appear instead your own. laughter So there's also a story about a map of buttplugs in Berlin that are unsecure. Also if you're interested in that please also search for that story. Because it's funny to talk about this, but I also wanna talk little bit about things that we could actually do. And one of the projects in this part is actually doing something thats called the "internet of dongs project - hacking sex toys for security and privacy". And as you can see it's supported by PornHub, which in this case means that they get money from PornHub that they can buy sex toys for their research. So PornHub is sponsoring them. Actually I did for talk to the guy who is behind this project. He's called Randomman. That's a render of him and this is the website by the way. So he told me he's currently - they're currently a team of about 15-20 people out there that are doing their security research in their own spare time. And they are not getting any money for it and they also don't want to get any money but they are already looking for more security experts that wanna join the team and also they have also an ethical codex and stuff like that and actually one of the most important things that he was telling me is that he doesn't want that you should stay off connected sex toys at all, but to find the security holes that we are all able to use them if we want without any fear. So yeah, you can get in contact with him if you're interested. Coming to a different section now. You can see I'm switching from security to security and privacy and now I'm landed on the privacy section. This is Google Home. And we all know that there is also Amazon Echo and digital assistants are also smart IoT devices and this is why I wanna talk a very very short time about them because I'm sure a lot of people got those devices for Christmas. Actually there was a big increase of digital assistants in the last year int this quarter 3 of 2016 there were only 900.000 of such devices sold and in the quarter 3 2017 we had more than 7.4 million of those devices sold. So there's a huge increase and we don't even have the numbers of the Christmas time. Yeah you have seen it. so why I wanna talk about it, because when you put this kind of stuff in your home it might be very comfortable at the beginning because you don't have to look up the weather information you can - you don't have to read your emails you can make the device read your own emails you can use them to program your list of what you're going to buy and stuff like that but that's how they learn a lot about the users habits and their personalties and those devices will learn more and more information about you and this information does not stay in your own home it actually is going to send to the servers of amazon and google and I don't need to tell you what amazon an google are doing with this data. current at least currently they are only collecting it but that's very valuable and they turn around and use it or sell it in various ways to monetize that information in one of the future days. So all digital assistants send the voice controls that are made after "Ok, Google" or "Alexa" to their servers and the data will be saved there and it was not possible for me to find out for how long and at which servers. It's not in their terms of conditions and I couldn't find it anywhere. So also the German data privacy delegate Andrea Voßhoff didn't find this information. She criticized that "It is not easy for users to understand how, to what extent and where the information collected is processed. Also, it is not clear how long the data will be stored." So if you still want those devices in your home now there are at least physical mute button with google home and amazon echo and you can also change the settings to control the data so all the data that is collected is regulary deleted from the servers but of course you never know in how may backups it's collected as well. So yes it's only recording after this voice control but both devices already got hacked and yeah I didn't amazon echo got hacked in 2016 and google mini got hacked in 2017 of course both problems got fixed and when I say got hacked it means that the devices in your home were listening to the conversations all the time. So I'm coming - unfortunately the funny examples are over. I'm coming to the part where I wanna speak about what we can do against the lack of security and lack of privacy with the internet of things. So we are currently having the status quo where we are having an information asymmetry between the vendor and the customer. Currently the manufacturers do not need to provide a sample information but(?) how security of a device such as how long it will receive security updates. so when we buy a device we never know... oh is it going to be safe or not. So what we need ... actually what we need. I did write a couple of things - I write down a couple of things here which are partly stolen by the green MEP Jan Philipp Albrecht from his program because he's dealing a lot with that kind of question what we can do with his work and I'm also - I also was stealing some of those suggestions from the Renderman from the Internet of Dongs project, he also had some helpful tips. And I also stole some of the information from security experts I talked in interviews all of the time because we never talk only about the bad things we always - we all want to get the internet of things safer at the end. So some of them suggested that we could need an security star rating system similar to the energy labeling. And when we talk about security star ratings that could mean that we use a label. When a device gets security updates for free for the next five years it gets the A++ label, if it's no updates at all and it stays unsecure it gets the baddest rating or such things. Actually vendors should also be forced to close security holes instead of ignoring them. And they should provide the security researchers with email addresses where we can easily report security flaws because sometimes the hardest part of the game is to actually find the right contact to send out the information about what is unsecure and what's not. What we also need is a mandatory offline mode for electronical devices so this device at least has a button where you can turn it off. so it doesn't listen to you permanently. And we need that for all devices - all connected devices. Also an airbag and seatbelt for the digital age and we also have to talk about product liability and a clear update policy. so there are also good examples that we are having now. Actually all what I was talking about here is regulation. Regulation that is not existing at the moment. But there is some regulation that is existing in the kind of data which is the GDPR the General Data Protection Regulation which is coming up in May 2018 and it has included some really really really helpful things: privacy by design and privacy by default. And more possibilities for law enforcement. And this is very very important because it doesn't say that because we are going to have a regulation about privacy by design and privacy by default this is really done by the vendors. Actually when is was interviewing some of them they already told me that it's not their plan to integrate that in their products they are going to wait until they are sued. They say "Oh, we don't need it. why should we do it worked now - nope." So that's why the law enforcement comes into place and maybe some of you know Max Schrems, he's also speaking here in two days about something else though and he a data protection activist. And he says that everything that goes will be done in this phase we are now, but if vendors won't observe the law we have to remind them to do it. So this is how he looks like and he says that with this new regulation we can, as a customer, ask for compensation when data breaches occur. We couldn't do that so easily now but with this new regulation it will get a lot of easier. And if 4 billion people sue a company and ask for compensation that could be a bit expensive at the end. So if you are not able to sue anybody yourself, which is not cheap so nobody - not everybody will secure companies you can support organizations that help you with that like the new organization from Max Schrems called "None of Your Business" maybe you have seen this already, I'm not saying that you should support especially (???) this organization but his plan is to actually do that stuff I explained earlier: sue companies that are not abiding to the law. So if you wanna visit the website they currently collecting money. What else can consumers do? That are no easy tips but we can't do much except a few easy things. Does this product really need an internet connection? Is it possible to turn it off? Is it still working after that? What do we find about it on the internet? Can we reach the vendor? Does the vendor reply when I have a question? Do we get more information? Sometimes also clicktivism helps to stop vendors making stupid decisions. Here is another example from the vacuum robot cleaning machine Roomba who wanted to sell the data that is collected from the home from the vacuum cleaner and actually there was a huge huge huge shitstorm after he was announcing that - the CEO that was announcing that. And after the shitstrorm the CEO said "Ok, no nono. We're not collecting. We're not selling your data. No no." So sometimes this helps as well and of course follow the basics in IT-security please update everything that has updates, separate networks from IoT products and use safe passwords, support open hardware, open software, products where the data is stored locally is always better than in the cloud and if you're tech savvy enough start - which I think you are here - start building your own tools. Because you have the control. And what can developers do? Support privacy by design, security by design, think about it from the beginning because you can change it and take responsibility. And IT security can also do some stuff or continue to do some stuff. Point the vendor to the problems, make helping IT security stronger, keep reporting the flaws, publish your research, help develop standards, labels and seat belts and support each others work to a stronger voice about this. So I'm coming to the end of my talk now and to the topic back to the internet of fails: How many must be killed in the Internet of Deadly Things train wrecks? This is actually an article I was reading with a huge interest myself because it was starting to deal with making comparisons to the great age of railway construction that was likewise riddled with decades of disasters before the introduction of effective signaling and failsafe breaks. And it was also comparisoned with the automotive industry where the mandatory fitting of seatbelts designing the bodies of cars to reduce injury to pedestrians, airbag and measures to reduce air pollution were not introduced not early enough. So this guy was asked: Do we really need to kill a few people first? And he said: Unfortunately that will happen. So he says: Safety and security standards for the internet of things can't come soon enough. I agree with that. With that we need standards really soon. So I am at the end of my talk and if we have some time left I'm waiting for your questions, ideas, and input now. Otherwise I will thank you very much for your attention. applause Herald: Thank you Barbara. A very warm applause. So a small information: If you want to exit the room please exit the room to your left over there. So, questions? I see one question from the Signal Angel. Q: Hello, ok. The internet wants to know, well those companies don't have any IoT security whatsoever or basically none, so what can we do to make them have more? B: What we as who, as consumers? Q: Yeah, basically. B: Yeah, actually I would - what I said was I would write them and ask for standards. I would - I think it can be the first step that we can write emails or call them and say "Well, what kind of security is build in this device, can you tell me? Otherwise I won't buy your product." Herald: Thank you. Any other question? Ok, in this case again: Thank you Barbara for your nice talk. applause A very warm round of applause. Thanks. 34c3 outro subtitles created by c3subtitles.de in the year 2018. Join, and help us!