Firmware Hackers – ReFirm Innovation Sandbox 2018
Firmware Hackers Find New IoT Vulnerabilities
Firmware… it’s running on practically every internet connected device. And because it cannot be protected by traditional security products, it has become a favored target for hackers and state sponsored actors. And firmware hackers are finding ways to manipulate and gain access to networks using these devices.
Here’s a true story: A Fortune 100 customer used our platform to analyze the firmware in their widely deployed security cameras. They found threats that firmware hackers can manipulate. But the most disturbing threat they found was hard coded backdoor accounts. Armed with this information they started digging through their network, and they were shocked at what they found. Their corporate traffic was going out of these cameras to a foreign IP address they didn’t recognize.
Now, this camera, made by a foreign company, happens to be one of the world’s top selling enterprise security cameras with over 20 million units sold. Thankfully, the Fortune 100 company was able to block the malicious traffic and justify the replacement of every single camera on their network.
Now think about this.
What if these connected devices with these types of threats are in your corporate network right now. Or in a bank. Or in a nuclear power plant. Finding these types of threats before something catastrophic happens has been nearly impossible, until now.
Introducing the Centrifuge Platform – the first cloud-based solution that can rapidly analyze and continuously monitor the health and status of firmware – no source code required. Built with our patent pending technologies, we can reveal things like embedded crypto keys, both public and private, password hashes, publicly know vulnerabilities, and – an industry first for firmware – potential zero-day vulnerabilities. All in one comprehensive report. And by continuously monitoring the firmware, the Centrifuge Platform can proactively warn you any time a new public vulnerability impacts or threatens any of your connected devices.
Hackers Can Manipulate IoT Devices
Any industry with connected devices can benefit form the Centrifuge Platform. Medical, auto, financial… you get the picture.
There’s no need for special libraries, there’s no need for monitoring agents. In fact, we don’t even need access to your network, so what makes us uniquely qualified… Actually, let me talk about our customers. That’s probably more important. So our customers today are actually taking action now to secure their firmware and protect the integrity of their supply chain. (Time Limit Buzzer)
Backdoored firmware found in the supply chain of video surveillance chips from HiSilicon (a subsidiary of Huawei) allows remote access via Telnet.
A few days ago I decided to reverse engineer my router’s firmware image with binwalk. I’ve bought the TP-Link Archer C7 home router. Not one of the best, but good enough for my needs.
On February 4th, 2020 we deployed a new analyzer to the Centrifuge Platform, our automated firmware analysis platform which detects the presence of the Cable Haunt vulnerability in eCos-based firmware images.