Team82’s Noam Moshe discusses state actor targeting of OT, why it’s so challenging to develop ransomware for OT and industrial control systems, and the mitigation strategies available to defenders of cyber-physical systems.
Cyber Resilience
Internet of Things

Nexus Podcast: Team82 on Attacking the Insecure IoT Cloud

Michael Mimoso
/
Dec 16, 2024

Subscribe and listen to the Nexus podcast on your favorite platform.

Claroty’s research outfit, Team82, has invested resources in 2024 in the security of cloud connectivity and improving device authentication to cloud platforms and services. Its latest research project focused on Ruijie Networks’ popular line of wireless access points and devices. Team82’s research uncovered 10 vulnerabilities; chains of those vulnerabilities exposed every device connected to the Ruijie cloud to attack, including remote code execution. 

Read Team82’s research blog on the insecure IoT cloud

In this episode of the Nexus Podcast, researchers Noam Moshe and Tomer Goldschmidt, fresh off a presentation at Black Hat Europe on the subject, provide their perspective on the issues plaguing IoT clouds and why attackers and defenders should be locking down device authentication and other avenues exposing clouds to attack

Device Authentication Weaknesses Exploited

Device authentication, Moshe said, is less understood and explored, unlike user authentication which has paradigms such as strong passwords and multifaceted authentication that are entrenched in implementations. In its Ruijie research, for example, Team82 was able to exploit device authentication weaknesses to impersonate the Ruiji cloud, gain access to, and execute code on devices.

Watch this demo of Team82's Open Sesame Attack

“For device credentials, device authentication, this is not as relevant and not as explored. And because of that, we see a lot of times where this exact scenario of impersonating a device or using device credentials may be badly generated, and badly stored device credentials, as the starting point of our attack is very, very common,” Moshe said.

“And I think this is the core issue here and in many different research [projects] we've done in the past, where while user authentication is very good, very tight, but the device point of view is less explored,” Moshe added. “And I think that this is only made more serious when we're talking about IoT or devices that by default the vendor thinks is under their control.”

Ruijie, and other vendors, would not view their devices as rogue, and would inherently trust them. An attacker who is able to impersonate these devices is in a powerful, trusted position and can carry out attacks with privileges

Targeting Cloud’s Trust Issues

“It resonates with me the idea where devices and the cloud infrastructure as a whole have this kind of trust relationship that maybe—I wouldn't say lacks suspicion—in some cases there is some kind of trust between the device and the cloud that there the other entity is who it's supposed to be,” Goldschmidt said. 

In the case of Ruijie, only a serial number was required—information that was readily leaked by the device—to assume the identity of the device. 

“Then you can also do some intricate stuff with regards to cloud communication with other devices,” Goldschmidt said. “So the whole relationship between device and cloud infrastructure is actually very prone and very risky turf, I would say.”

Ruijie has addressed all 10 vulnerabilities in its cloud infrastructure, and no action is required by users to remediate.

Cyber Resilience
Internet of Things
Michael Mimoso
Editorial Director

Michael Mimoso is Director of Influencer Marketing at Claroty and Editorial Director of Nexus.

Stay in the know Get the Nexus Connect Newsletter
You might also like… Read more
Latest on Nexus Podcast