OpenDNS 2015 IoT Report
OpenDNS 2015 IoT Report
About OpenDNS
OpenDNS is a leading provider of network security and DNS services, enabling the world to connect to the Internet
with confidence on any device, anywhere, anytime. The Umbrella cloud-delivered network security service blocks
advanced attacks, as well as malware, botnets, and phishing threats regardless of port, protocol, or application.
Its predictive intelligence uses machine learning to automate protection against emergent threats before they can
reach customers. OpenDNS protects all devices globally without hardware to install or software to maintain. For
more information, please visit: www.opendns.com.
OpenDNS Security Labs authored this report. Any questions about the methodology
should be addressed to Andrew Hay, Director of Security Research, OpenDNS,
[email protected].
More information about the core values and beliefs of OpenDNS Security Labs can be viewed on our blog at
https://labs.opendns.com/about-us/.
We acknowledge that security research is often loaded with fear, uncertainty, and doubt (FUD). This report is about
visibility into IoT communications and highlights potential problems before the connected landscape becomes
unmanageable. This report is NOT FUD.
Visibility is a foundation of security and is critical in understanding the organization’s security posture and overall
risk profile. One cannot measure risk without first having visibility into what is happening.
Privacy Statement
Due to the size of the data, with often more than 70 billion daily DNS queries, OpenDNS Security Labs chose
to limit the scope of research by performing statistically relevant sampling of the data at regular intervals on the
15th day of February, March, and April in 2015. All data was meticulously sanitized so as not to reveal client IP
addresses or individual company names. Should you have any concerns regarding the privacy or security of the
analyzed data or employed methodology, please email [email protected].
Vendor Outreach
During our research we reached out to several vendors to foster an environment of sharing and collaboration.
Unfortunately, Western Digital and ioBridge did not return our calls, emails, or acknowledge our social media
outreach attempts. Axeda, a PTC company, and mnubo, however, were far more open to working with us on our
findings. It should be noted, however, that no new exploitation details for the surfaced vulnerabilities have been
released that have not otherwise been published previously.
The rise of IoT has catalyzed the creation of myriad surveys, expert predictions, and conference presentations about
the potential impact on enterprise security. While some IT leaders claim to be prepared for the march of a growing
number of Internet-connected devices onto their networks, others report having no plan at all. In addition, the lack
of concrete data has made the industry discussion largely speculative. Security and IT professionals–whether they
acknowledge it or not–face a cloud of obscurity in attempting to protect employees and customers from attack without
knowing exactly where and how IoT devices expose their networks to costly attacks.
Leveraging a data-driven methodology, this report explores the potential security risks surrounding IoT devices
connected to enterprise networks. The aim of our research is to heighten the awareness of IoT devices in business
network environments and the possible security threats they may pose to privacy, national security, and economic
stability. What follows is the analysis of our unique IoT viewpoint through a global DNS infrastructure.
This report covers our methodologies of data discovery, red flags for IT professionals regarding the security of IoT
devices, key takeaways, and suggestions for how to manage IoT deployed in an enterprise environment. It also
includes a contextual survey with responses from more than 500 IT and security professionals.
Our findings indicate that most company leaders, including the IT and security professionals charged with protecting
valuable and confidential information, are not fully aware of the scale of IoT presence within their networks. This
lack of awareness may also be fueling a misunderstanding or underestimation of how insecure IoT devices are. It is
imperative for IT security professionals to know which devices are unsafe, how to manage and patch them, and how
to prevent them from visiting harmful or malicious network infrastructures. However, many IT professionals do not
even seem to have a clear definition of what constitutes an IoT device.
Our findings uncover the extent to which IoT permeates nearly every major market vertical including energy
infrastructure, healthcare, education, consumer electronics, manufacturing, defense, government, financial
institutions, and retail, among others.
It’s worth noting that the intention of this report is not to scare or shock the public. It is meant to provide an
unprecedented data-driven view of IoT based on real data that security professionals can use to gain better
understanding, help educate company business decision makers, and to plan for an IT security future that includes
ubiquitous IoT devices.
For more information on how we defined IoT and its devices for this report, see the methodology section.
Though our report discovered an extensive number of concerning and important findings, the following seven are
the most significant.
1. As stated in the summary, IoT devices are actively penetrating some of the world’s most regulated industries
including healthcare, energy infrastructure, government, financial services, and retail.
2. Our analysis identified three principal risks that IoT devices present in protecting network environments with IoT
devices: (1) IoT devices introduce new avenues for potential remote exploitation of enterprise networks;
(2) the infrastructure used to enable IoT devices is beyond both the user and IT’s control; (3) and IT’s often
casual approach to IoT device management can leave devices unmonitored and unpatched.
3. Some infrastructures hosting IoT data are susceptible to highly-publicized and patchable vulnerabilities such as
FREAK and Heartbleed.
4. Highly prominent technology vendors are operating their IoT platforms in known “bad Internet neighborhoods,”
which places their own customers at risk.
5. Consumer devices such as Dropcam Internet video cameras, Fitbit wearable fitness devices, Western Digital
“My Cloud” storage devices, various connected medical devices, and Samsung Smart TVs continuously beacon
out to servers in the US, Asia, and Europe–even when not in use.
6. Though traditionally thought of as local storage devices, Western Digital cloud-enabled hard drives are now
some of the most prevalent IoT endpoints observed. Having been ushered into highly-regulated enterprise
environments, these devices are actively transferring data to insecure cloud servers.
7. And finally, a survey of more than 500 IT and security professionals found that 23 percent of respondents have
no mitigating controls in place to prevent someone from connecting unauthorized devices to their company’s
networks.
OpenDNS is able to handle this amount of traffic due to its large, geographically diverse network of 25 global
data centers. More detailed information about the location of OpenDNS’ data centers is available at https://www.
opendns.com/data-center-locations/.
Due to the size of the data, with often more than 70 billion daily queries resulting in more than 10TB of data each
day, OpenDNS Security Labs chose to limit the scope of research by performing statistically relevant sampling
of the data at regular intervals on the 15th day of February, March, and April in 2015. All data was meticulously
sanitized so as not to reveal client IP addresses or individual company names.
android- client.
fitbit.com
fitbit.com
client.fitbit.com api.fitbit.com
The complete list of parent domain names used for this research project are available in Appendix A: Index of
Assessed Companies. A number of FQDNs will be highlighted throughout this report. Some of the researched FQDNs,
however, have direct association with specific OpenDNS customers and their internal users. OpenDNS Security Labs
has chosen not to publish FQDNs for IoT devices that directly identify individuals, in order to protect their privacy.
The list of queried FQDNs were enriched with intelligence from OpenDNS, SHODAN, and MaxMind’s respective
data repositories.
Though our logging is extensive, research for this report required only a few elements of the DNS query logs–the
client IP address, the organizational identifier (OrgID), the FQDN, and the total number of queries for the client
IP address and FQDN combination. We used the OrgID to help subset the query log information to differentiate
between OpenDNS customers with paid and those with unpaid accounts.
We then enriched the data from paying customers (including those engaged in an active trial) by mapping the OrgID to
the registered company, its employee count, and industry vertical in which it operates. To pinpoint focus on SMB and
enterprise customers, we removed premium home users and other non-customer servicing industries from the data set.
Leveraging these intelligence repositories, OpenDNS was able to add context from our proprietary reputation,
predictive intelligence, and threat model data. We also combined OpenDNS business intelligence data such as
company name, industry vertical, and company size with geographic IP location, reported vulnerabilities and
exposures, and IoT infrastructure operating system information from external partners.
SHODAN
SHODAN is a search engine used to discover specific computers (routers, servers, etc.) using a variety of filters.
Some have also described it as a public port scan directory or a search engine of “banners” (metadata that the
server sends back to the client). This metadata can be information about server software, what options the service
supports, a welcome message, or anything else that the client needs to know before interacting with the server.
Observed IoT FQDNs were checked against the SHODAN API. From the resulting JSON data, we choose to utilize
several features for our research. These features are detailed in Appendix B: SHODAN Data Features Utilized.
This research includes GeoLite2 data created by MaxMind, available from http://www.maxmind.com, to add IP-
based geolocation information for client queries and IoT targets.
OpenDNS Security Labs leveraged the GeoIP GeoLite2 database to provide relatively accurate geolocation data for
both client IP addresses and IoT infrastructure. As there was some overlap between the GeoIP GeoLite2 database
and SHODAN results, we chose to assign geographic-to-IP mapping authority to MaxMind’s database.
The disparity could also, however, be more representative of regions where enterprises are allowing, or at least not
discouraging, penetration of IoT devices into corporate networks.
Figure 3 - Client FQDN Queries For Enterprise Customer Data Population (n = 68,044)
CATEGORY TYPE
ll Fitness
ll Toys
Personal Electronics
ll Gadgets
ll Other
ll Large Appliances
ll Small Appliances
Consumer Appliances
ll Entertainment
ll Other
ll External Home/Office
ll Power Management
Home/Office Automation
ll HVAC
ll Other
ll Audio/Video
ll Physical Locks
Security & Monitoring ll Alarm System
ll Environmental Monitors
ll Other
Every effort was made to fit a device and associated domain into an appropriate category and type for the purposes
of this research. Typical IT and consumer equipment that relies on Internet connectivity to function properly were
not classified as IoT devices, for purposes of this analysis. These non-IoT devices include servers, PCs, tablets, and
smartphones, to name a few.
There were 56 distinct industry verticals identified in our data set in addition to an “Other” category for industries
that our business intelligence team didn’t have a 1:1 mapping for.
Higher Education: Colleges not only use IoT devices and applications to change campus life and learning, but
students and faculty are also developing innovative IoT applications that will help other industries. For example,
colleges use software to manage campus-wide emergency communication, students use smartphones to check
whether washers are free in dorms, and biology labs use apps to track freezer temperatures and the status of
experiments.
Managed Service Providers: Managed Service Providers deploy and make use of IoT devices to manage and
monitor clients’ hosted environments. For example, security systems, webcams, video monitoring systems, TVs,
etc. are now IoT enabled.
Healthcare: Healthcare providers leverage IoT devices to make patient health monitoring, diagnostics, and care
more timely and convenient. For example, MRI machines, ambulance equipment, and even pacemakers are
now IoT enabled. There are also new inventions like connected pill bottles to help ensure patients take their
medications.
The total query counts by industry vertical is detailed in Table 2 - Top 3 Industry Verticals by Total Query Count.
Healthcare 5,557
Many other verticals including retail, financial services, hospitality, and energy infrastructure use IoT to
increase efficiency and visibility into business operations. For example, there are now applications to track
water consumption, technologies to wirelessly power IoT devices, and IoT enabled devices such as door locks,
thermostats, mini-fridges, and light switches.
Due to the number of queried FQDNs, combined with the limited chart width available, Figure 5 - Queried FQDNs
With A Query Count >= 100 shows the FQDNs with a total query count of 100 or more.
The majority of queries originated from Samsung, Fitbit2, Dropcam, Nest, Logitech, and Axeda Machine Cloud
devices.
2 The majority of Fitbit queries appeared to be originating from desktop software or synchronized mobile devices uploading fitness information to
the Fitbit cloud infrastructure. Due to the nature of Fitbit devices and our desire to focus on non-mobile IoT traffic, we will not be covering the
devices in this report.
“Please be aware that if your spoken words include personal or other sensitive information, that
information will be among the data captured and transmitted to a third party through your use
of Voice Recognition.”
In a written response from Samsung–added as an update to the Harris article–the company stated that voice
recognition which allows the user to control the TV using voice commands is a Samsung Smart TV feature, which
can be activated or deactivated by the user. Samsung noted that the TV owner can also disconnect the TV from
Wi-Fi. As removing the Smart TV from the network defeats the purpose of having a Smart TV, we suspect that few
organizations follow this particular recommendation.
In an effort to focus our research on Samsung Smart TV-related domains we decided to obtain a TV (model
UN32H5203AF) and test. The software running the Smart TV was version 1117 which was the most current as
of the date of testing (05-May–2015). This configuration is representative of the 2014/2015 Samsung Smart TV
lineup.
As one might expect, the device’s default configuration regularly updates installed applications to ensure content is
fresh (latest videos, most recent application, etc.). To examine the initial hypothesis that a typical Smart TV actively
beacons (or calls out to external addresses) without user interaction, we conducted a step-by-step examination of
the network traffic.
3 http://www.samsung.com/sg/info/privacy/smarttv.html?CID=AFL-hq-mul-0813-11000170
4 http://www.thedailybeast.com/articles/2015/02/05/your-samsung-smarttv-is-spying-on-you-basically.html
5 https://web.archive.org/web/20150210055437/http://www.samsung.com/sg/info/privacy/smarttv.html?CID=AFL-hq-mul-0813-11000170
We discovered this pattern by observing communications with each Smart TV related domain on a minute by
minute basis. The query volume associated with this FQDN is depicted in Figure 7 - OpenDNS Investigate DNS
Queries for xpu.samsungelectronics.com.
The FQDN is closed to the outside world, as seen in Figure 8 - Scan Results for xpu.samsungelectronics.com,
and likely is used solely for a statistical IP-based check-in running count, or it relies on earlier queries in the
sequence to grant access for a particular IP address.
Another curious finding was continued queries to infolink.pavv.co.kr, depicted in Figure 10 - OpenDNS Investigate
DNS Queries for infolink.pavv.co.kr, which follows the same query pattern as xpu.samsungelectronics.com.
Samsung is headquartered in South Korea. As such, it should be no surprise that its software may beacon out
to FQDNs associated with that country. However, we suspect that individuals with Samsung Smart TVs would be
surprised by the rate and volume of these queries.
According to a Wikipedia article6, in the years from 2007 to 2010 Samsung debuted a service called Internet
TV, then renamed or altered the service to various new names, including new functions along the way. In 2009
Samsung developed the Power Infolink service, and the latest iteration of connected TV was named Internet@TV in
2010. The service allows users to download applications from an app store, among other connected functions.
A Google search for “samsung infolink” returns about 428,000 results. Unfortunately, all of the Samsung hosted
links no longer point to live content. A search on the Samsung site7 for “infolink” returns only 2 pages - both of
which are press releases from June8 and August9 in 2010.
6 http://en.wikipedia.org/wiki/Samsung_Electronics
7 http://www.samsung.com/us/search/espsearch.us?keyword=infolink
8 http://www.samsung.com/us/news/newsRead.do?news_seq=19705
9 http://www.samsung.com/us/news/newsRead.do?news_seq=19722
Whether Infolink is a remnant of previous releases or not, OpenDNS Security Labs decided to look deeper into the
FQDN due to the number of automated queries observed.
The infolink.pavv.co.kr FQDN has only 3 ports open, as seen in Figure 11 - Scan Results for infolink.pavv.co.kr,
with HTTP and HTTPS open to the world.
10 https://support.mozilla.org/en-US/kb/connection-untrusted-error-message
<clipped>
It is our opinion that the average user does not expect their Smart TV to make incessant external calls to various
services without any interaction. The fact that a Smart TV does so almost every minute it’s powered on–even
without user interaction–is concerning because it makes the use of these devices much easier to determine from
outside a corporate network.
Dropcam cameras provide live, streaming video accessible through a web app and mobile apps for iOS and
Android11. Video streams are encrypted and private by default, but users can also make video streams public.
In June 2014, Dropcam was acquired by Nest Labs. In September, Dropcam joined the Works with Nest program.
As part of this integration, when the Nest Protect alarm goes off the associated Dropcam camera records a clip of
the smoke or carbon monoxide event and saves it, regardless of whether the customer pays for Cloud Recording12.
Nest Labs is a home automation company headquartered in Palo Alto, Calif., that designs and manufactures
sensor-driven, Wi-Fi-enabled, self-learning, programmable thermostats and smoke detectors. On January 14,
2014, Google acquired Nest Labs for US$3.2 billion13.
NEST
Extensive research on Nest devices has been performed previously14. From that research, several observations
have surfaced. The Nest does frequent DNS lookups for a FQDN matching XXXX.transport.nest.com. Then it
makes a TCP connection to port 9543 which it seems to hold open. Nest communicates with the server over 9543
as does the web client.
“It is our opinion that the average user does not expect their Smart TV to make
incessant external calls to various services without any interaction. The fact
that a Smart TV does so almost every minute it’s powered on–even without user
interaction–is concerning because it makes the use of these devices much easier to
determine from outside a corporate network.”
11 http://en.wikipedia.org/wiki/Dropcam#Products
12 http://en.wikipedia.org/wiki/Dropcam#Products
13 http://en.wikipedia.org/wiki/Nest_Labs#History
14 https://learn.sparkfun.com/tutorials/nest-thermostat-teardown-
When not actively controlled by an end user, the Nest appears to be offline. The device does not
respond to ICMP Echo Requests, yet responds immediately to cloud-based temperature control
changes. TCP keep-alives are sent to transportXX.transport.nest.com:9543 every two minutes.
This will keep the [Port Address Translation] PAT entries updated to prevent a home router from
dropping the connection. Investigation of the file system shows utilities responsible for waking up the
wireless LAN controller based on the presence of packets originating from Nest transport servers or
when the motion sensors are triggered.
In order to perform a port scan against the thermostat, it is required that the thermostat be “awake.”
By interacting with the thermostat or triggering the motion sensors, persistent connections can be
made to the thermostat. However, no TCP or UDP ports appear to be open, in contrast to some of the
expectations based on Linux startup utilities.
Since the above research was performed, Nest has changed its FQDN format. Figure 15 - January 14, 2014
nslookup for transport.nest.com shows the original lookup response as performed and documented by Andrew
Hay at http://www.andrewhay.ca/archives/2419.
$ nslookup transport.nest.com
Server: 208.67.222.222
Address: 208.67.222.222#53
Non-authoritative answer:
transport.nest.com canonical name = transport.production.nest.com.
transport.production.nest.com canonical name = transport-service-production-909910888.us-east-1.
elb.amazonaws.com.
Name: transport-service-production-909910888.us-east-1.elb.amazonaws.com
Address: 107.20.222.81
Name: transport-service-production-909910888.us-east-1.elb.amazonaws.com
Address: 54.243.109.243
15 http://www.burrough.org/Documents/Thermostat-final-paper.pdf
$ nslookup transport.nest.com
Server: 127.0.0.1
Address: 127.0.0.1#53
Based on DNS query results observed in our research, a new format for the transport FQDNs has emerged (with
some slight variations):
transport[01:04]-rts[01:12].iad01.transport.home.[ft].nest.com
It should be noted that 60 distinct variations of the new FQDNs were seen in the 879 DNS observed queries.
Examples of two of the domains are the following: transport01-rts08-iad01.transport.home.nest.com and
transport01-rts01-iad01.transport.home.ft.nest.com.
The results of an nslookup on both FQDNs can be seen in Figure 17 - May 10, 2015 nslookup For Two Nest
Transport FQDNs.
Figure 17 - May 10, 2015 nslookup For Two Nest Transport FQDNs
$ nslookup transport01-rts08-iad01.transport.home.nest.com
Server: 127.0.0.1
Address: 127.0.0.1#53
Non-authoritative answer:
transport01-rts08-iad01.transport.home.nest.com canonical name = ec2-54-161-73-145.compute-1.
amazonaws.com.
Name: ec2-54-161-73-145.compute-1.amazonaws.com
Address: 54.161.73.145
$ nslookup transport01-rts01-iad01.transport.home.ft.nest.com
Server: 127.0.0.1
Address: 127.0.0.1#53
Non-authoritative answer:
transport01-rts01-iad01.transport.home.ft.nest.com canonical name = ec2-54-221-75-69.compute-1.
amazonaws.com.
Name: ec2-54-221-75-69.compute-1.amazonaws.com
Address: 54.221.75.69
home.nest.com home.ft.nest.com
The two FQDNs differ considerably, however, in several other areas, as shown in Table 5 - Comparison Between
home.nest.com and home.ft.nest.com Traffic. Traffic volume and consistency are obvious with regards to home.
nest.com. Counts peak at more than 110,000 queries and follow a clear diurnal pattern, with weekday/weeknight/
weekend spikes and troughs. The other FQDN, home.ft.nest.com, has a much more flat query pattern that floats
on either side of the 500 query mark -- with some obvious spikes. A matching diurnal pattern does not materialize
for the home.ft.nest.com FQDN.
home.nest.com home.ft.nest.com
home.nest.com home.ft.nest.com
The requester geo distribution differs quite a bit between the FQDNs, as seen in Table 7 - Comparison Between
home.nest.com and home.ft.nest.com Geo Distribution. The first FQDN, home.nest.com, has a fairly even
distribution across numerous countries. The second, home.ft.nest.com, only shows queries from US (87.14 %),
CA (4.29 %), GB (2.86 %), FR (2.86 %), and IE (1.43 %).
home.nest.com home.ft.nest.com
ENDPOINT FEATURE
Another Nest-related domain observed in our research was weather.nest.com which is used to sync local weather
information to Nest thermostats. A consistent and high query volume was observed for the FQDN as depicted in
Figure 18 - OpenDNS Investigate DNS Queries for weather.nest.com.
DROPCAM
Dropcam devices have three distinct types of FQDNs. Those related to the API (e.g. nexusapi.dropcam.com), those
related to the video camera communication initiation (e.g. nexus.dropcam.com) and those related to the video
camera streaming platform (e.g. oculus10-vir.dropcam.com).
The nexusapi.dropcam.com FQDN is the primary API for interacting with the Dropcam service. Documentation is
sparse with the exception of the beta API announcement in June 201416. The API can provide information about
Dropcam devices, their configuration, and activity associated with those devices. The API is RESTful and uses
HTTP verbs, with all endpoints and API communication over HTTPS. The requests and responses are delivered in
JSON format.
16 http://blog.dropcam.com/dropcam-api-beta-program/
Figure 20 - OpenDNS Investigate DNS Queries for nexusapi.dropcam.com depicts the total amount of traffic
observed across the OpenDNS global infrastructure for the nexusapi.dropcam.com FQDN - with queries following a
clear diurnal pattern and peaking at more than 36,000 queries.
17 http://aws.amazon.com/solutions/case-studies/dropcam/
According to the blog posts, most of the device’s messages (sent using the “Droptalk” protocol), contain protocol
buffers which can be decoded. The nexus.dropcam.com server always replies with a redirect to an “oculus”
server. The client then connects to the “oculus” server and sends another HELLO packet. Most of the configuration
options in the Dropcam web interface correspond to Droptalk messages that are sent to the camera. When the
server is ready to receive data, it sends a START_STREAM message with some video parameters in it. Video data is
sent from the camera in RTP Droptalk messages containing RTP formatted video data20.
Looking at Figure 22 - OpenDNS Investigate nexus.dropcam.com, we notice a more consistent DNS query pattern
that doesn’t follow a typical diurnal pattern. This pattern appears to be more consistent with a steady transfer of
real-time video traffic from deployed cameras to Dropcam’s cloud infrastructure.
18 http://blog.includesecurity.com/2014/03/Reverse-Engineering-Dropcam-Communications.html
19 http://blog.includesecurity.com/2014/04/reverse-engineering-dropcam-rooting-the-device.html
20 http://blog.includesecurity.com/2014/04/reverse-engineering-dropcam-rooting-the-device.html
Like other Logitech software, installing LDM is optional, and opting out won’t affect the functionality of the Logitech
peripherals. LDM is typically included with most versions of Logitech’s proprietary hardware and software.
The primary FQDN polled by LDM is updates.logitech.com. DNS queries for the FQDN can be seen in
Figure 26 - OpenDNS Investigate DNS Queries for updates.logitech.com.
21 http://www.navisite.com/about-navisite
22http://www.marketwired.com/press-release/navisite-partners-with-edgecast-networks-deliver-next-generation-cdn-offerings-new-content-nasdaq-
navi-1243926.htm
Amazon 23,181
Fastly 5,208
A graphical depiction of the top 10 hosting providers for IoT vendors is depicted in Figure 29 - Top 10 IoT
Infrastructure Hosting Providers by Total Query Count.
The second finding was that E.I. du Pont de Nemours and Co., more commonly known as DuPont, was the target
of 1,634 queries. The majority of these queries were related to Samsung mobile platforms, but we also observed
queries from Dropcam and IoT platform provider Thingworx.
Autonomous Systems
Autonomous system (AS) is a collection of connected Internet protocol (IP) routing prefixes under the control of
one or more network operators on behalf of a single administrative entity that presents a common, clearly defined
routing policy to the Internet. A unique autonomous system number (ASN) is allocated to each AS for use in BGP
routing. AS numbers are important because the ASN uniquely identifies each network on the Internet23.
Looking at our data, the top five autonomous systems hosting IoT infrastructure sites are AS36351 (Softlayer
Technologies, Inc.), AS16509 (Amazon.com, Inc.), AS702 (Verizon Business/UUnet Europe), AS14618 (Amazon.
com, Inc.), and AS54113 (Fastly). The total query count by AS is shown in Table 10 - Top 5 IoT Infrastructure
Autonomous Systems by Total Query Count.
AS36351 15,992
AS16509 11,361
AS702 11,121
AS14618 10,607
AS54113 2,513
23 Source: http://en.wikipedia.org/wiki/Autonomous_system_(Internet)
The least active IoT infrastructure hosting country observed was Egypt, with only 1 query (0.0015% of total query
count), followed by Iceland and Thailand with only 2 queries (0.003%) for each country. This isn’t surprising given
the cost of IoT devices, their relatively new availability in global markets, and the absence of inexpensive hosting
infrastructures in the aforementioned countries.
15,591
The total number of malicious
domains observed sharing
infrastructure with legitimate IoT
product vendor’s infrastructure.
Organizations need heightened awareness around IoT vendors’ choice of network neighborhoods, and how sullied
those neighborhoods are. It’s far easier for an upstream ISP, or even one of your own firewall administrators, to block
access to an IP address or subnet than to explicitly block a list of malicious domains. If not carefully scrutinized,
your ISP or firewall administrator could prevent your IoT device from communicating with its cloud or hosted service.
Similarly, IoT vendors should understand the quality of Internet neighborhood before “moving in” with their platform.
They may unwittingly find themselves guilty by association with malicious neighbors and therefore blocked.
CVE-2014-0160 - HEARTBLEED
Only one FQDN was found to be susceptible to the attack vector detailed in CVE-2014-0160. The vulnerability,
more commonly known as Heartbleed, is a security bug in the OpenSSL cryptographic library that was disclosed on
April 7, 2014. A patch was also made available the same day.
The data obtained by a Heartbleed attack may include unencrypted exchanges between TLS parties, which is likely
to be confidential, including any form post data in users’ requests. Moreover, the confidential data exposed could
include authentication secrets such as session cookies and passwords, which might allow attackers to impersonate
a user of the service.
An attacker having gained authentication information may impersonate the owner after the victim has patched
Heartbleed, as long as the material is accepted (for example, until the password is changed or the private key
revoked). Heartbleed therefore constitutes a critical threat to confidentiality. However, an attacker impersonating a
victim may also alter data. Indirectly, Heartbleed’s consequences may thus go far beyond a confidentiality breach
for many systems24.
The vulnerable FQDN - sandbox.api.mnubo.com - belongs to an IoT big data and analytics vendor in Canada
named mnubo, Inc.
Though SHODAN provided us with the initial results, we verified the finding using Filippo Valsorda’s (@FiloSottile)
Heartbleed testing tool (https://filippo.io/Heartbleed/) on April 30, 2015 at 3:31 PM PDT.
Figure 34 - Heartbleed Scan Results for sandbox.api.mnubo.com on April 30, 2015 at 3:31 PM PDT
24 http://en.wikipedia.org/wiki/Heartbleed#Impact
Our research shows that only one customer queried the mnubo sandbox API. That customer, a K-12 institution in
Canada with less than 100 employees, is likely testing the vendor’s offerings given that a ‘sandbox’ API is what is
being queried.
Upon reaching out to mnubo ahead of publishing our report report the company has taken steps to patch the
server. Results of the same Heartbleed testing tool used before now show the server as patched as depicted in
Figure 36 - Heartbleed Scan Results for sandbox.api.mnubo.com as of Tuesday, May 19, 2015. The company
also thanked us for bringing the matter to their attention.
Figure 36 - Heartbleed Scan Results for sandbox.api.mnubo.com as of Tuesday, May 19, 2015
The FREAK attack was discovered by Karthikeyan Bhargavan at INRIA in Paris and the miTLS team. Further
disclosure was coordinated by Johns Hopkins cryptography professor Matthew Green. The vulnerability is
associated with OpenSSL clients and Apple TLS/SSL clients that allow a “man-in-the-middle” attacker to
downgrade connections from “strong” RSA to “export-grade” RSA. These attacks are real and exploitable against a
shocking number of websites–including government websites25.
Servers that accept RSA_EXPORT cipher suites put their users at risk to the FREAK attack26. It is recommended
that system owners immediately disable support for TLS export cipher suites—and other cipher suites that are
known to be insecure—and enable forward secrecy.
Table 12 - FREAK Attack Vulnerable FQDNs by Industry shows the count of industry verticals observed querying
FREAK-vulnerable IoT FQDNs.
CVE-2015-0204 CVE-2015-0204
INDUSTRY VERTICALS VULNERABLE INDUSTRY VERTICALS VULNERABLE
Accounting/HR/Admin 17 Libraries 1
Construction/Architecture 2 Manufacturing 1
Energy 42 Retail 18
Government 2 Transportation/Shipping/Logistics 2
Healthcare 23 Utilities 24
Hospitality 1
25 http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html
26 https://freakattack.com
WIDGETS.IOBRIDGE.COM ANALYSIS
ioBridge Web Gateways are input-output (I/O) routers that act as the interface between local devices and ioBridge’s
servers on the Internet (ioBridge cloud servers). The ioBridge web-gateway has an Ethernet connection like a home
computer that plugs into a local network and creates a connection to ioBridge’s cloud servers. The ioBridge Web
Gateways have I/O channels that enable the control and monitoring of digital inputs, analog inputs, serial data,
servos, relays, and digital outputs using web-interfaces provided by ioBridge27.
Widgets are simple function script objects that either control outputs or monitor inputs. Widgets are used on the
user’s dashboard or can be dropped into a website using the embed code28. Queries to widgets.iobridge.com were
observed from a food and beverage company in the United States that operates a large number of restaurants
in airports around North America. Also observed from this particular customer were queries to Fitbit, Samsung
mobile, Logitech, and SmartThings FQDNs. Figure 37 - OpenDNS Investigate DNS Queries for widgets.iobridge.
com depicts the DNS queries for the ioBridge widget FQDN.
27 http://connect.iobridge.com/docs
28 http://connect.iobridge.com/docs/widgets/
The widgets.iobridge.com server has a number of services running including FTP (21/tcp), HTTP/HTTPS (80/443/
tcp), RTSP (554/tcp), and others as shown in Figure 40 - Scan Results for widgets.iobridge.com. Any of these
could be potentially exploited to gain access to the widgets server.
AXEDA.COM ANAYLSIS
Axeda, a PTC Inc., company, provides cloud-based service and software for managing and implementing
connected products. The Axeda IoT Cloud Service includes:
The axeda.com FQDNs utilize a descriptive company name for their customers’ instances. The format is as follows:
<companyname>.axeda.com
For example, if your company was named Alice & Bob’s Cryptography Warehouse, there is a high likelihood that
your axeda.com hostname might be aliceandbob, abcrypto, abcw, or some other derivitive of the company name.
Though easy to remember, this naming convention does expose Axeda’s customers to profiling.
As shown in Figure X - Scan Results for First axeda.com FQDN, the listening ports on the server are not unlike
those detected in Figure 43 - Scan Results for widgets.iobridge.com.
The second axeda.com FQDN didn’t fare much better on its scorecard as seen in Figure 44 - SSL Scan Results
for Second axeda.com Domain.
Another interesting data point is not all of the observed axeda.com FQDNs were vulnerable to CVE-2015-0204. In
fact, we observed queries to 24 other unique axeda.com FQDNs that were not vulnerable. Ten of those 24 FQDNs
map directly to customers publicly disclosed via the axeda.com website’s “Customers” section29. Those customers
are Dedicated Computing, Elekta, Gerber Scientific, Hil-Rom, Leica Microsystems, Medrad, SGI, Talaris, and
Waters Corporation.
29 http://www.axeda.com/community/customers/all
My Cloud™ FQDNs follow a distinct format that includes the customer-chosen device name, a device ID with a
series of digits, and a domain of .wd2go.com.
<customer-chosen name>.deviceXXXXXXX.wd2go.com
andrewcloud.device1234567.wd2go.com
Where andrewcloud is the device name and device1234567 is the device identifier.
More information regarding the configuration of your personal cloud storage device can be found at
http://www.wdc.com/wdproducts/library/UM/ENG/4779-705058.pdf.
Figure 50 - SSL Scan Results for Western Digital My Cloud™ Storage FQDNs
orionrelay[a,{0,1}][region{0,1}][n{1,3}].wd2go.com
Where the orionrelay is the primary hostname that may or may not contain the letter ‘a’ and, if located in a region
outside of the United States, appends the two-letter region code (e.g. ‘eu’) to the hostname. The host also contains
a number identifier between one and three.
Conducted during March and April 2015, OpenDNS surveyed more than 500 IT and security professionals and
500 consumers to measure their current sentiments and behaviors regarding IoT device usage in the workplace30.
According to the primary findings, there is a disconnect between employee awareness of existing IoT policies
and IT enforcement. While nearly 75% of the IT professionals surveyed said they currently have a defined policy
for employee-owned IoT and Internet connected devices in place, approximately 65% of the consumers surveyed
said they were not aware of an IoT policy or that they believed their companies did not have a policy in place.
ll Further confirmation that IoT device deployment is on the rise. More than 60% of IT professionals surveyed
said their companies have future plans to deploy IoT devices. Of those who plan to deploy IoT devices:
–– 43% will deploy security and monitoring devices
–– 66% expect employee owned IoT devices to move onto their networks including personal electronics and
consumer IT devices.
ll Mitigating controls most IT professionals have in place today, aren’t necessarily going to protect their
companies from the IoT vulnerability risks described later in this report.
–– 23% of the IT professionals surveyed admitted to having no mitigating controls in place preventing someone
from connecting unauthorized devices to their company networks.
–– Approximately 54% relied on network security.
–– 43% used credentialed access only.
–– Another 35% have a separate WiFi network for unapproved or guest devices.
ll IT professionals do recognize there are potential risks with IoT. Approximately 70% said they are concerned
about vulnerabilities from IoT devices in the workplace.
ll However, the majority of IT professionals believe they can manage those risks. 77% feel they are prepared to
handle security issues arising from IoT devices in the workplace.
30 Survey conducted using SurveyMonkey Audience. For more details, please visit: www.surveymonkey.com/mp/audience
Early adopters sanctioning IoT use are likely considered fringe cases at this time. Underprepared companies will
find they are unable to prevent the tech-savvy employee from bringing their latest toy into the office and connecting
it to the network.
Throughout this report, we have outlined numerous FQDNs used by IoT devices. The presence of these FQDNS in
an organization’s firewall, intrusion detection/prevention systems, proxies, and DNS logs is an excellent indicator
that IoT devices are active on a company’s infrastructure.
A New Attack Vector: Whether or not enterprises and users are aware, IoT devices brought into a company’s
network are connecting to the Internet, creating new avenues for remote exploitation. Lack of insight into where
these devices connect to and send traffic means that they present a potential blind spot in an enterprise’s security
efforts. Because IoT devices innately bring such insecurity into a network, they should be managed like standard
enterprise IT equipment. Instead the mentality is often to think of these devices as mostly harmless toys or
gadgets. .
The Company Your Network Keeps: In their current state, even sanctioned IoT devices live mostly outside
the control of IT, because they rely on cloud and hosted network infrastructure. Without insight or controlling
measures for these devices, traffic could be–and currently is for some devices–going to network locations known
to be untrustworthy. Untrustworthy hosting or cloud subnets could result in network blocks that cripple IoT device
abilities. Some IoT devices use infrastructures that are unpatched for known vulnerabilities, which may result in
compromised user credentials, personal information, or classified company data.
Toys in the Attic: Users seem to often think of IoT devices as toys or personal gadgets. This mentality, considering
their prevalence in enterprise networks, is an irresponsible approach to managing these devices. The networks
on which they live is the same environment that enterprises run servers, firewalls, and other IT equipment, which
makes IoT just as important in terms of security. Managing IoT devices with a casual attitude could leave them
unmonitored and unpatched, which is not an approach befitting enterprise technology.
Unfortunately it may only be after IoT devices prove their value that they will be scrutinized like the devices they
are–computers connected to the enterprise network, accessing enterprise data, and interoperating with enterprise
systems.
In the interim, organizations should take the time to sanction, or at least confirm, the presence of new IoT devices
operating within their infrastructure. This requires hands-on testing to validate all communications models and
documentation for filtering via perimeter devices, host-based firewalls, proxies, and DNS. This exercise should
be treated no differently than the adoption of any new piece of networking equipment or enterprise software
application.
In assembling a plan to protect their networks that have IoT device activity, organizations also will quickly discover
that much of the vendor documentation is lacking critical information. In fact, most IoT documentation simply
states that outbound HTTP and HTTPS (80/TCP and 443/TCP) should be allowed for the device to function
properly. Documentation like this is a key indicator that the device was not designed for use within an enterprise,
and was intended instead for home or personal use. We suspect that the IoT manufacturers provide simplified
documentation aiming for a straightforward installation and configuration process, but this is unhelpful to an
enterprise.
Almost every organization in the world employs some type of host, network, and cloud-based security controls. In
fact, security spending is on the rise based on reports from several industry analyst firms. It’s probably safe to say
that any host, network, or security technology installed within the last 10 years has the ability to alert on certain
criteria–whether it’s based on a change in network traffic volume, the detection of newly installed software on an
endpoint, or queries to new and never before queried domain names. These alerts should be closely monitored for
the presence of new IoT devices, access to new platforms, and changes in traffic patterns.
ll What traffic patterns look like for IoT devices and platforms
ll What the SLAs are with regards to the storage of data and continuity of service
We hope you have received value from our in-depth research into the world of IoT. We’ve only scratched the
surface of IoT’s foray into the enterprise space, and we will continue to expand the scope of our research over the
coming weeks, months, and years. OpenDNS Security Labs will also post timely and interesting analysis of IoT
devices and platforms on our research blog located at https://labs.opendns.com/blog. The first blog post in this
new series will be a more detailed look at our Samsung Smart TV findings.
Any questions about the data or methodology used in this research should be addressed to Andrew Hay, Director
of Security Research, OpenDNS, [email protected].