Viktor Petersson logo

Podcast

Follow Me

Join Viktor, a proud nerd and seasoned entrepreneur, whose academic journey at Santa Clara University in Silicon Valley sparked a career marked by innovation and foresight. From his college days, Viktor embarked on an entrepreneurial path, beginning with YippieMove, a groundbreaking email migration service, and continuing with a series of bootstrapped ventures.

Hacking airplanes, ships and IoT devices with Ken Munro

Play On Listen to podcast on YouTube Listen to podcast on Spotify Listen to podcast on Apple Listen to podcast on Amazon music
03 NOV • 2024 1 hour 4 mins
Share:

In this captivating episode of Nerding Out with Viktor, host Viktor Petersson sits down with Ken Munro, a renowned cybersecurity expert and penetration tester. Together, they embark on an insightful journey into the uncharted world of aviation cybersecurity, shedding light on the intricacies and vulnerabilities that exist within modern aircraft systems.

As they delve deeper into the realm of aviation security, Ken shares his vast experience in testing aircraft systems, revealing surprising tales of hacking decommissioned planes in a scrapyard. This unique approach allowed his team to practice without compromising passenger safety or active fleets.

One of the most pressing security concerns in aviation today is the Electronic Flight Bag (EFB), a system that has replaced traditional paper-based navigation tools with digital equivalents. However, as Ken astutely points out, EFBs have introduced new vulnerabilities that can be exploited by attackers. By manipulating data within the performance calculators, hackers can mislead pilots about crucial factors like runway length or engine thrust. Viktor and Ken explore the dire implications of these weaknesses and discuss the sophisticated tactics used to secure these systems.

GPS spoofing is another critical topic discussed in this episode. Ken explains how malicious actors can use this technique to confuse an aircraft’s navigation system, leaving pilots with outdated or incorrect data until they’re able to safely land. The complexity of GPS spoofing and jamming are also explored, highlighting the need for advanced security measures to counter these threats.

The conversation then turns to responsible disclosure in the aviation industry, where Ken shares his experience working with manufacturers like Boeing and Airbus. He emphasizes the delicate balance between informing manufacturers about security issues while respecting their time-consuming processes for safety certification. Viktor is impressed by Ken’s commitment to transparency and collaboration, which has led to significant improvements in aviation security.

Viktor and Ken also discuss the industry’s gradual shift towards transparency in handling disclosures and threats. They highlight the importance of collaboration between cybersecurity professionals, manufacturers, and government regulators to continuously enhance aviation security. Ken emphasizes that, while security is critical, safety remains paramount in aviation, often requiring extended timelines for vulnerability patches.

This episode of Nerding Out with Viktor offers a compelling deep dive into the world of aviation cybersecurity, showcasing Ken Munro’s expertise and passion for making aviation safer. For anyone fascinated by cybersecurity, aviation, or the hidden challenges of keeping the skies secure, this conversation is an eye-opening exploration that reveals both the resilience and risks of modern aircraft systems.

Transcript

Show/Hide Transcript
[00:01] Viktor Petersson
Welcome back to another episode of Nerding out with Victor.
[00:04] Viktor Petersson
Today I have Ken Munro with me on the show and he's going to speak all about pen testing and security.
[00:10] Viktor Petersson
So welcome to the show.
[00:12] Ken Munro
Hey, nice to meet you.
[00:13] Ken Munro
How's it going?
[00:14] Viktor Petersson
Good, good.
[00:14] Viktor Petersson
So we first met at Bsides Bristol, what a few months ago.
[00:18] Viktor Petersson
We both spoke there and I caught your talk about hacking planes, which I thought was a fantastic talk.
[00:24] Viktor Petersson
And it definitely opened my eyes up to like the security in that space in general.
[00:29] Viktor Petersson
So I think that something I can wanna kick the show off with.
[00:32] Viktor Petersson
Like what?
[00:33] Viktor Petersson
How did you even get into the space of hacking airplanes?
[00:38] Ken Munro
It's a great story.
[00:39] Ken Munro
So my background, I was supposed to be a commercial pilot.
[00:43] Ken Munro
So back in the day I first started working, oh my gosh, in the 90s in the antivirus industry.
[00:48] Ken Munro
And I was using that to fund my pilot's license.
[00:52] Ken Munro
So I got up and I was supposed to go commercial and the company I was working for at the time went belly up and that was the end of my commercial pilot's career.
[00:59] Ken Munro
So yeah, given the number of near accidents I caused, that's probably actually a good thing for all you passengers out there.
[01:06] Ken Munro
I do still fly general aviation, so light aircraft does crazy things in crazy places.
[01:10] Ken Munro
But yeah, no more commercial flying.
[01:15] Ken Munro
So instead I ended up starting a pen testing firm.
[01:18] Ken Munro
A long time ago now and end of the 2000 and tens, my sort of two passions started to come back together.
[01:25] Ken Munro
I'd say collide, but that doesn't sound great in flying, does it?
[01:31] Ken Munro
And one of my colleagues, an amazing guy called Alex Lomas, who's also a general aviation pilot, but also an aeronautical engineer and a really good pen tester.
[01:41] Ken Munro
We started chatting and Raspberry had a lot of common interest in planes.
[01:45] Ken Munro
Where'd you go with this?
[01:47] Ken Munro
How do you go about lent hack planes?
[01:51] Ken Munro
We picked up the phone to one of the breakers yards in the UK and said, those planes that come and land at your place and don't fly again, what happens?
[02:01] Ken Munro
Well, they sit around until we take them apart and that's about it.
[02:06] Ken Munro
We said, well, okay, if I'm never going to fly again.
[02:08] Ken Munro
If we gave you some cash to pay for the power, so running the power unit, could we come and have a learn?
[02:15] Ken Munro
They were like, yeah, knock yourselves out, go for it.
[02:18] Ken Munro
At this really weird situation where we rocked up first time to one of the airport breakers and they said, well, what do you want to have a go at?
[02:27] Ken Munro
We said, what have you got?
[02:28] Ken Munro
Well, we've got some 737s and some A320s.
[02:31] Ken Munro
I was like, great, off we go.
[02:33] Ken Munro
And we literally turned up with some laptops, a bunch of connectors, some scopes, and just started learning because there's really not very much online about how you hack a plane.
[02:46] Ken Munro
The good news is it's actually very difficult and long may it stay that way.
[02:49] Ken Munro
But, yeah, we just started learning.
[02:52] Ken Munro
And then, as we all know, the world went sideways with COVID which was awful for everybody.
[02:58] Ken Munro
But there was this kind of weird silver lining in the airplane cybersecurity space was that the breakage yards got really backed up.
[03:06] Ken Munro
Really backed up.
[03:07] Ken Munro
And also I think some of them were struggling with it because no one wanted to buy the parts because no one was flying airplanes.
[03:15] Ken Munro
And so that's kind of when things accelerated a bit for us is we had, for example, British Airways, entire 747 fleet was retired early.
[03:24] Ken Munro
So they were all laid up.
[03:27] Ken Munro
Believe it or not, were actually offered one for just over a quarter of a million dollars.
[03:30] Ken Munro
But parking was going to be a problem.
[03:36] Ken Munro
Yeah, I don't know.
[03:37] Ken Munro
I think we struggled to get that one in the driveway.
[03:39] Ken Munro
So.
[03:39] Ken Munro
Yes, but it just meant that from chasing down to one of the breakers yards to hopefully get your hands on a plane to learn a bunch of stuff, and then you'd need to go away and really understand what you found, think about exploits and packaging attacks to come back a month later and find the plane was in bits.
[03:58] Ken Munro
But now we had the breaker's yards backed up.
[04:01] Ken Munro
So actually the planes that we got to look at were still there six months, 12 months, 18 months later, because there was no market for the parts.
[04:10] Ken Munro
They were backed up in terms of taking them apart.
[04:14] Ken Munro
And that's when things start to get really interesting and things start to accelerate for us.
[04:19] Viktor Petersson
That's super fascinating.
[04:20] Viktor Petersson
Right.
[04:20] Viktor Petersson
But you got your keys to, well, your fidget keys to the planes.
[04:25] Viktor Petersson
And where do you start?
[04:27] Viktor Petersson
How much did you know about internal communication?
[04:31] Viktor Petersson
Like possible attack vectors?
[04:33] Viktor Petersson
Like even you mentioned cabling and ports and all that.
[04:37] Viktor Petersson
Like even that is probably.
[04:39] Viktor Petersson
These are not things that you have.
[04:41] Viktor Petersson
These are not USB or ethernet cables.
[04:43] Viktor Petersson
I presume that you plug into these, like internal system.
[04:46] Viktor Petersson
They're probably a lot of custom casing, couple of custom cases, custom cabling and all that, right?
[04:51] Ken Munro
Yeah, absolutely right.
[04:52] Ken Munro
I mean, before we go there, I should say, look, we talk about hacking planes.
[04:55] Ken Munro
It's actually insanely difficult.
[04:57] Ken Munro
And a lot of that has to do with the thought that the manufacturers have given to it.
[05:01] Ken Munro
And Airbus aren't stupid.
[05:02] Ken Munro
They get cyber and there's a lot of effort put into segmenting the plane network.
[05:08] Ken Munro
So the bit in the back where you and I sit, right, that's considered a very dirty network.
[05:13] Ken Munro
The wireless networks we connect to, they're untrusted.
[05:16] Ken Munro
So that's called the passenger and information entertainment services domain.
[05:20] Ken Munro
And what goes on there, frankly, who cares, because it's no different to a wifi hotspot, a cafe, whatever.
[05:29] Ken Munro
Then things get a bit more interesting when you go to the halfway house, which is the information services domain, aisd.
[05:35] Ken Munro
And that's where in some planes you have slightly more privilege for members of the cabin crew to do stuff.
[05:40] Ken Munro
So when you walk onto a plane and you look left or right as you walk on, you probably see a panel there and that's the panel that the cabin crew have more access to and can do a bit more.
[05:51] Ken Munro
And you might remember an old 747, certainly on BA and a few other operators, they had a little terminal under the stairs and that could do quite a bit more.
[06:00] Ken Munro
That was called the cabin management terminal.
[06:02] Ken Munro
So you could do things like send messages.
[06:05] Ken Munro
Funniest bit of all, one of the planes we worked on, 2020, this was running windows NT351 on that terminal.
[06:15] Ken Munro
Yeah.
[06:16] Ken Munro
And so that's the bit that kind of in the middle and then you get to what we call the aircraft control domain.
[06:20] Ken Munro
And that's, you know, that's the flight controls.
[06:22] Ken Munro
And that bit is essentially completely isolated.
[06:26] Ken Munro
So there is no practical way, as has been suggested in the media, of hacking an airplane from the seat in coach.
[06:32] Ken Munro
Just doesn't work.
[06:34] Viktor Petersson
So even you spoke about wifi, but even the infotainment device in the headrest in front of you, that's all on the same threat, I guess.
[06:46] Viktor Petersson
Network.
[06:46] Ken Munro
Yeah, absolutely right.
[06:47] Ken Munro
So it's all in the passenger entertainment services domain.
[06:51] Ken Munro
So historically, you might remember if you get unlucky in economy and you get the seat with a box underneath the seat in front that's basically an ethernet hub.
[07:03] Ken Munro
So essentially that's switching old video protocols.
[07:07] Ken Munro
But I've actually got one in a box just there randomly, but it's in bits.
[07:11] Ken Munro
I won't bother.
[07:13] Ken Munro
But again, turning back the clock, last one of those we took apart was running docsis.
[07:17] Ken Munro
So really old cable protocols that you won't have seen for years.
[07:22] Ken Munro
It's essentially just a switch.
[07:24] Ken Munro
So there'll be a media server on the plane, older servers, there'll be a set of disks and they'll be distributing video content out to your seat.
[07:32] Ken Munro
More recently, you've tended to Find that seatback device is now going to be android tablet, basically dressed up.
[07:40] Ken Munro
So I'm sure many of you seen those Android icons when you power it up.
[07:46] Ken Munro
What's the worst you could do with that?
[07:50] Ken Munro
There have been a few demonstrated hacks and in fact, we've successfully done it ourselves as well.
[07:54] Ken Munro
But what could you do?
[07:56] Ken Munro
All you've got access to is the video content, so I suppose you could stream some porn.
[08:04] Ken Munro
And that accidentally happened a little while ago.
[08:07] Viktor Petersson
I see.
[08:08] Viktor Petersson
It's more like in the Rickrolling domain of attack.
[08:13] Viktor Petersson
Nothing serious can actually come from that.
[08:15] Ken Munro
Yeah, there was an interesting discussion we had at an aviation cyber event with one of the airlines and we're trying to work out if you broadcast something that caused everyone to panic, could you create a fire safety incident?
[08:30] Ken Munro
I mean, it'd be pretty scary, but could you broadcast something that said, hey, the plane's been hijacked, you need to break into the cockpit, don't trust the crew, or there's a bomb at the front of the plane, run to the back.
[08:43] Ken Munro
So then you end up with this challenge.
[08:44] Ken Munro
You end up with the plane out of weight and balance.
[08:46] Ken Munro
So with everyone in the back actually forces the nose up.
[08:49] Ken Munro
And in certain plane types, in certain flight configurations, you could cause it to nose up and stall.
[08:54] Ken Munro
But practically that's very difficult.
[08:57] Ken Munro
I would only apply at very specific parts of the flight when the fuel tanks are quite empty.
[09:02] Ken Munro
So I don't think that system.
[09:05] Ken Munro
I don't think that the infotainment system is really a practical safety.
[09:10] Ken Munro
Safety.
[09:11] Ken Munro
Relevant vector.
[09:12] Viktor Petersson
Right.
[09:13] Viktor Petersson
Okay.
[09:14] Viktor Petersson
So you, I guess excluded that from your experiments relatively quickly.
[09:18] Viktor Petersson
And after done some assessments, so you moved on.
[09:20] Ken Munro
Oh, no, we hacked them.
[09:23] Ken Munro
Come on.
[09:24] Ken Munro
The opportunity knocked.
[09:26] Ken Munro
I mean, you know, we've got some video which I think you might have seen at BSides.
[09:29] Ken Munro
Gig is we successfully managed to get every seat back seat showing, I think.
[09:37] Ken Munro
What was it?
[09:38] Ken Munro
It was the pilot episod Scorpion.
[09:40] Ken Munro
We managed to get streaming.
[09:43] Ken Munro
It was more to prove a point that you could.
[09:46] Ken Munro
Is there a practical impact to that?
[09:48] Ken Munro
No, not really.
[09:49] Ken Munro
It was fun to do.
[09:50] Viktor Petersson
Yeah, yeah, fair enough.
[09:52] Viktor Petersson
And in your talk, you kind of moved on to kind of go into what you call electric flight bag is what you kind of ended up as a real attack vector.
[10:02] Viktor Petersson
Right?
[10:02] Ken Munro
Yeah.
[10:03] Ken Munro
So if you are have physical access to plane, access to cockpit systems, access to the cargo hold, access to the avionics bay, which is very unlikely, it's virtually impossible in flight.
[10:17] Ken Munro
And even if you had that sort of access, you'd still Having to be injecting onto three separate networks concurrently with incredible precision timing, which is on the bounds of practicality.
[10:30] Ken Munro
So a real world hack of aircraft control domain is.
[10:34] Ken Munro
It's not there.
[10:36] Ken Munro
It's really not there.
[10:37] Ken Munro
And despite in the Netflix MH370 documentary where they suggested a Russian special ops team took control of the plane, just no.
[10:47] Ken Munro
So instead we spent our time looking at some of the connected systems that planes now use.
[10:52] Ken Munro
Now, the reason that planes are connected is for you and me, we want to watch movies in the back, we want to get our email when we're flying around.
[10:59] Ken Munro
So passenger connectivity is important, but actually in terms of safety, connectivity is really important for modern airplanes.
[11:06] Ken Munro
So it could be things as simple as weather routing, so you're avoiding turbulence or getting the best tailwind.
[11:13] Ken Munro
So we're using less fuel and less carbon dioxide through to simple things like calculating weight and balance.
[11:20] Ken Munro
Or the one that was most important to us was around what we call engine performance.
[11:25] Ken Munro
And that gets to your point about electronic flight bags.
[11:29] Ken Munro
Now the efb, if you ever poked your head in the cockpit when you board, you'll probably see the pilots are working on a tablet together.
[11:36] Ken Munro
And that tablet is the electronic flight bag.
[11:39] Ken Munro
And it replaces kilograms of paper that we used to carry around.
[11:43] Ken Munro
So I used to have to carry a physical approach chart, so it's the map that tells you how to land.
[11:50] Ken Munro
I used to have to carry charts of the airspace so I could navigate correctly.
[11:57] Ken Munro
I needed maps of the airport, charts of the airport so I could taxi correctly.
[12:01] Ken Munro
And those are incredibly heavy and also very complicated to update because by law, what's called the Airac update cycle mandates that they're updated every 28 days or so.
[12:13] Viktor Petersson
Right.
[12:14] Ken Munro
Which can you imagine the complexity of pushing bits of paper around the world?
[12:17] Ken Munro
So every pilot's got the latest maps.
[12:22] Ken Munro
So the overhead of that, the practicality, that was huge.
[12:24] Ken Munro
So what we use nowadays, we do it all online.
[12:26] Ken Munro
We use electronic flight bags to download those apps, to download those maps so that we don't have to carry around reams of paper that quickly gets out of date.
[12:35] Ken Munro
So it saves a fortune, saves weight, which saves fuel and makes us more efficient.
[12:42] Ken Munro
So we then started going, hang on, all right, these connected tablets, how secure are they?
[12:47] Ken Munro
And that's when things got really interesting.
[12:50] Viktor Petersson
Right.
[12:51] Ken Munro
To give you some examples.
[12:53] Ken Munro
So the average electronic flight backs probably got between 10 and 20 different applications on them.
[13:00] Ken Munro
And probably the most common is going to be a charting application.
[13:03] Ken Munro
So something that products from people like Jeppesen or Lufthansa systems, they're very popular charting applications.
[13:11] Ken Munro
But the one that intrigued us was what's called the performance calculator.
[13:14] Ken Munro
Now, when you're sat there at the end of the Runway on your plane, it's about to go, what you might not appreciate is that we very rarely use full power, right?
[13:25] Ken Munro
And the reason we don't use full power is it wears the engines quite a bit when we're caning them.
[13:29] Ken Munro
It burns a lot of fuel, so it's expensive, and it chucks out a lot of carbon dioxide when we don't want to do that, right?
[13:35] Ken Munro
So if the Runway is long enough and what we call the density altitude, so that's the thickness of the air is good, and maybe we've got a nice headwind and we're not too heavy, we'll do what's called a performance calculation.
[13:50] Ken Munro
In the case of Airbus, that's called a.
[13:54] Ken Munro
It's called a flex temp.
[13:56] Ken Munro
And when you actually look at the throttles on an Airbus plane, you'll see a setting that says flx, that's flex temp.
[14:02] Ken Munro
And at Boeing, it's called the D rate.
[14:05] Ken Munro
And probably in Boeing, it's a bit more logical.
[14:07] Ken Munro
What we're saying is we de rate from 100% down to whatever D rate percentage we want of thrust.
[14:12] Ken Munro
And so we're sat there in the Runway, pilots go, right, my D rate or flex temp is X.
[14:17] Ken Munro
Put the correct amount of power and the plane trundles off down the Runway, reaches V1, which we can brake safely, go past that, get to VR rotation speed, and finally we get to V2, which is the point at which we can safely climb away with one engine.
[14:30] Ken Munro
The gap between V1 and V2, scary place.
[14:33] Ken Munro
If it goes wrong, you're going off the end.
[14:38] Ken Munro
But anyway, so that calculator is really important, and that's one of the core applications on your efb.
[14:45] Ken Munro
And one of the first vulnerabilities we found was in one of the Boeing performance calculators called opt, or the Onboard Performance Tool, very well known in Boeing types.
[14:53] Ken Munro
And it takes lots and lots of data.
[14:56] Ken Munro
The obvious ones like Runway length, weight, wind direction, so crosswind, headwind, tailwind, but lots of other things like which things on the plane that use power are working.
[15:08] Ken Munro
So are you going to have your air conditioning packs running because they use a bit of power, and that then spits out all the data we need to make a safe departure.
[15:15] Ken Munro
And what we discovered early on was the ability, effectively, it wasn't protecting its own data very well.
[15:21] Ken Munro
So There was no signing mechanism on the database, which meant you could tamper with the data and therefore pilots would potentially use wrong data.
[15:28] Ken Munro
And the simplest example of that is we could make the Runway appear longer than it actually was.
[15:33] Viktor Petersson
Right.
[15:33] Ken Munro
Which of course, so the plane thinks it's got longer to get up to speed and therefore commands use of less power.
[15:41] Viktor Petersson
Right.
[15:41] Viktor Petersson
And that's scary.
[15:44] Viktor Petersson
But in terms of the communication between this device and that, your plane, are they completely air gapped or are they like, are they actually on the same wifi or how is intercommunication looking?
[15:55] Ken Munro
Like, are they air gapped?
[15:57] Ken Munro
Yes, but not always.
[16:02] Ken Munro
So when you get onto a plane, you see the pilot using a tablet.
[16:05] Ken Munro
Typically that tablet is air gapped.
[16:07] Ken Munro
It may have Internet access through the sat comms, but there's no practical route from that tablet back into the systems.
[16:13] Ken Munro
And there's some good reasons for that, is it means you're not exposing the airplane, excuse me, to the security of Android or iOS or Windows tablets.
[16:22] Ken Munro
So what will happen is the pilots will take the data needs, spit it into the iPad, typically for safety and security reasons, they'll then switch and check the data input and then go, okay, I agree.
[16:32] Ken Munro
Calculate what's my D rate.
[16:35] Ken Munro
Right, okay, so that's great.
[16:37] Ken Munro
And then they transpose it into the flight management systems to program them to use the right amount of power.
[16:44] Ken Munro
Problem is, sometimes pilots make mistakes even when you cross check.
[16:48] Ken Munro
Very occasionally we've seen cases where pilots have made the same mistake in the calculation or made the same mistake transposing it.
[16:55] Ken Munro
It's very rare, but it does happen.
[16:57] Ken Munro
And every one of those is investigated.
[16:59] Ken Munro
And you'll see that the most common flaw is forgetting to change the weight of the plane when you've done a hot, an interim stop.
[17:10] Ken Munro
And there's a very sad instant in Nova Scotia, I think it was, where some cargo pilots of a cargo 747 didn't change the weight of the plane between landing and filling up the cargo.
[17:24] Ken Munro
They got the weight wrong by, I think, £100,000.
[17:27] Ken Munro
The error wasn't seen by either the captain or the co pilot.
[17:32] Ken Munro
Didn't get a cross check by the loadmaster, and very sadly, that plane never actually took off and crashed into the end of the Runway and everyone very sadly died, which is awful.
[17:43] Ken Munro
And again, the pilots were at the end of a long duty day, they were tired.
[17:48] Ken Munro
It's quite easy to make a mistake, and that's to your point.
[17:52] Ken Munro
Are the EFBs connected or not?
[17:54] Ken Munro
And one way to reduce the ability to make mistakes at Transposition is to connect them.
[18:00] Ken Munro
And that's what a couple of the latest plane types.
[18:03] Ken Munro
So the Airbus A350 has an A semi installed electronic flight back.
[18:08] Ken Munro
So the idea being is you actually remove that layer of error.
[18:11] Ken Munro
But of course the next you then create a potential vector.
[18:14] Viktor Petersson
Yes.
[18:15] Ken Munro
You no longer have an air gap.
[18:17] Viktor Petersson
Yes.
[18:17] Viktor Petersson
Right, interesting.
[18:20] Viktor Petersson
And so that tech vector is essentially to remotely kind of attack these devices and then tamp with the data on.
[18:29] Viktor Petersson
Well, with data on the device and then basically tamper with the data points there.
[18:34] Viktor Petersson
So that was the most serious attack vector you found so far, or did you find anything else in your findings on hacking planes in general?
[18:43] Ken Munro
Well, so that was just one example.
[18:45] Ken Munro
So that was Boeing's OPT package.
[18:46] Ken Munro
We also found very similar sets of vulnerabilities in a similar Airbus product.
[18:52] Ken Munro
We also found a couple of vulnerabilities in Airbus products, one of which wasn't just a local attack.
[18:58] Ken Munro
It could be done over WI fi.
[19:00] Ken Munro
So WI fi attacks man in the middle.
[19:02] Ken Munro
Not really practical anymore, are they?
[19:04] Ken Munro
I mean, modern application design, HSTS, etc.
[19:08] Ken Munro
Man in the middle doesn't really work.
[19:10] Viktor Petersson
You would hope, but they still do.
[19:12] Ken Munro
Yeah, except.
[19:14] Ken Munro
So one of the apps we looked at, Airbus, had intentionally disabled application transport security, which amazingly re enabled a man in the middle attack.
[19:22] Ken Munro
So yeah, you remove the one protection that stops man in the middle working.
[19:27] Ken Munro
Yeah.
[19:28] Viktor Petersson
And the logic there being that I guess they are using some untrusted network where those would fail.
[19:36] Viktor Petersson
So they might want the fallback.
[19:38] Ken Munro
Yeah, well, we challenged them on this.
[19:41] Ken Munro
It was a bit of interesting disclosure.
[19:45] Ken Munro
Obviously the practicality of a man in the middle tack.
[19:47] Ken Munro
Normally if you're actually targeting someone specifically, you've really got to follow them.
[19:50] Ken Munro
But there's a really weird quirk in aviation, is that pilots typically always go to the same layover of a hotel.
[19:56] Ken Munro
And every plane that's coming down route, the pilot, the airline will have a contract with whichever hotel and they'll go to the same hotel.
[20:03] Ken Munro
So if you go to an airport hotel on a particular night, you know that a pilot from airline X is there.
[20:09] Viktor Petersson
And it might even be more than that because we are creature habits.
[20:12] Viktor Petersson
And if you are staying at the same with hello over and over, you might even stay at the same room over and over.
[20:16] Ken Munro
Absolutely.
[20:16] Ken Munro
Which makes it quite easy to target pilots if that's what you wanted to do.
[20:22] Ken Munro
So it's just this weird quirk.
[20:23] Ken Munro
Now, Airbus did fix that vulnerability quite quickly once we flagged it.
[20:26] Ken Munro
We think it was there because one of their airline clients was probably having Some compatibility problems, but like all these things, maybe they enabled something and then forgot to disable it once the problem had been troubleshot.
[20:38] Ken Munro
Familiar story, isn't it?
[20:39] Viktor Petersson
Yeah.
[20:40] Viktor Petersson
So that brings me to my next talking point here.
[20:43] Viktor Petersson
I was curious about responsible disclosures.
[20:46] Viktor Petersson
How did that work in the aviation industry?
[20:49] Viktor Petersson
And I presume people weren't too happy about people digging in their trash, so to speak.
[20:55] Ken Munro
Yeah, it's always a difficult one, disclosing vulnerabilities.
[20:57] Ken Munro
I mean, certainly in many industries which perhaps aren't that familiar with disclosures, they react in quite a hostile way sometimes.
[21:07] Ken Munro
I get it though.
[21:08] Ken Munro
I mean, we are perceived to be criticizing everything they've worked and put blood, sweat and tears into creating.
[21:13] Ken Munro
So you're effectively telling them their baby's ugly.
[21:15] Ken Munro
Right.
[21:17] Ken Munro
Who's going to like that?
[21:19] Ken Munro
But actually we started to see a change.
[21:23] Ken Munro
We're seeing better responses.
[21:24] Ken Munro
And actually I want to give Boeing a hat tip here.
[21:27] Ken Munro
And given they're experiencing some other challenges in the market right now, I think they could do with some good pr, frankly.
[21:34] Ken Munro
Boeing were really good.
[21:36] Ken Munro
When we disclose those vulnerabilities to them, they were incredibly responsive.
[21:41] Ken Munro
They acknowledged, validated the vulnerability within about three days, as I recall, which is impressive.
[21:48] Ken Munro
The challenging bit.
[21:50] Ken Munro
They said, yeah, great, we found the vulnerability.
[21:52] Ken Munro
We agree with you.
[21:53] Ken Munro
Thank you.
[21:53] Ken Munro
It's going to take us two years to fix it.
[21:55] Ken Munro
We're like, what?
[21:57] Ken Munro
No, no.
[21:58] Ken Munro
Google Project Zero says you get 90 days, then we go public.
[22:00] Ken Munro
Right.
[22:02] Ken Munro
And they said, yeah, but the problem is that code is certified, so we have to go.
[22:09] Ken Munro
Even if we make one tiny change to remove the vulnerability, you find we've got to go and recertify the code, which means we have to test it in every possible scenario that an airplane could experience to make sure we don't accidentally bring in a bug that blue screens it.
[22:22] Viktor Petersson
And these are not, we're not talking integration tests here.
[22:26] Ken Munro
We're talking everything right going all the way back through.
[22:30] Ken Munro
Because what could be worse, we found a vulnerability, but by fixing it, they introduced something that bricks a plane.
[22:35] Ken Munro
Of course, of course.
[22:36] Ken Munro
And that was a learning point for us.
[22:38] Ken Munro
Actually, that was one of the very first vulnerabilities we disclosed in aviation.
[22:41] Ken Munro
And were like, Boeing came back and they got in touch with us every month and said, proactively, said, look, this is where we're at, this is what we're doing, this is how we're getting on with it.
[22:49] Ken Munro
And I think in the end it took just shy of two years to fix.
[22:52] Ken Munro
But that was a massive learning point for us.
[22:54] Ken Munro
And it meant that when we started the next disclosure, I think were a lot more accommodating and understanding that.
[23:00] Ken Munro
You see, it takes time in planes because safety is king.
[23:05] Ken Munro
Security is really important, but safety is king.
[23:08] Viktor Petersson
Yeah, no, I get that.
[23:09] Viktor Petersson
I mean, and I've had previous guests on the podcast speaking about like hardware firmware, for instance.
[23:15] Viktor Petersson
Right.
[23:15] Viktor Petersson
And that like even something like a bias or disclosing issues involve in firmware in general.
[23:22] Viktor Petersson
Like, yeah, what we are used to in the software world is very different from what in the firmware world.
[23:27] Viktor Petersson
Right.
[23:28] Viktor Petersson
Like you're talking a year or so.
[23:30] Viktor Petersson
I think that's what they want to actually fix these things.
[23:33] Viktor Petersson
So, yeah, I definitely see that it is more complicated, for sure.
[23:39] Viktor Petersson
And yeah, so the other thing I want to chat about, because you had some press around this recently, relatively recently, about GPS spoofing in planes, which I found interesting.
[23:50] Ken Munro
Right.
[23:51] Viktor Petersson
So I'm familiar with the concept, but how would that even go about to work?
[23:57] Viktor Petersson
Right.
[23:57] Viktor Petersson
Because there are some territories that are actually voided entirely by certain airlines for that reason.
[24:02] Viktor Petersson
Right.
[24:02] Viktor Petersson
So let's talk a bit about that because I found that super fascinating, kind of in the realm of security of planes.
[24:08] Ken Munro
Yeah, a real surprise.
[24:10] Ken Munro
It was an eye opener for me right now.
[24:12] Ken Munro
I've been around aviation for nearly 30 years now.
[24:17] Ken Munro
I was there as GPS first emerged in the cockpit of light airplanes.
[24:20] Ken Munro
I was there when GPS first started taking over inertial reference systems, for example.
[24:26] Ken Munro
And we have been well aware of GPS jamming for years.
[24:31] Ken Munro
So it was more of a problem in maritime actually.
[24:33] Ken Munro
So you go to certain installations around the Black Sea and all of a sudden you either GPS would drop out or you get a very coarse position spoof.
[24:41] Ken Munro
So you might be 20 nautical miles away on GPS compared to where you thought you were.
[24:47] Ken Munro
And certainly over the last few years, things have really picked up and there's some very good data from the Ops group, which is a collaboration between lots of airlines, where they've got a group together that analyzes frequency impacts.
[24:59] Ken Munro
And there's a fantastic report they've published since I gave my talk at DEFCON this summer, which actually even that opened my eyes even further.
[25:07] Ken Munro
Right, so what's the problem?
[25:10] Ken Munro
We think about GPS spoofing as being, okay, my plane GPS says I'm in the wrong place.
[25:17] Ken Munro
Okay, well, that's fine.
[25:18] Ken Munro
I can look out of the window or I can dial in my radio nav aids, or I can talk to the ground and everything's fine.
[25:24] Ken Munro
But actually, it's a lot more complicated than that.
[25:26] Ken Munro
And lots of weird side effects have been happening when planes have been experiencing jamming and spoofing.
[25:32] Ken Munro
So the first problem we noticed were a number of planes would fly through an area of jamming or an area of spoofing caused problems to the pilots, particularly if they're flying relatively close to perceived hostile airspace.
[25:47] Ken Munro
Wouldn't take long to get out of position.
[25:50] Ken Munro
But once they come through the area of spoofing, they were having problems in that the GPS wouldn't reacquire.
[25:57] Ken Munro
And that was intriguing because you've come from a position where you knew where you were, your GPS was accurate, you came to the spoofing area, you get out the far side, great, everything's fine.
[26:07] Ken Munro
It's not.
[26:08] Ken Munro
And one of the reasons for that is your GPS almanac.
[26:12] Ken Munro
So that's the bit that tells the GPS receiver roughly where to look for the satellites so it can acquire them.
[26:17] Ken Munro
That almanac was out of date.
[26:19] Ken Munro
So in certain older airplane types, the GPS receiver, which in this case is what's called an MMR or multimode receiver, kind of didn't quite know where to look and therefore couldn't reacquire GPS while it's hacking along at, say, 550 miles an hour.
[26:32] Ken Munro
And that caused some problems.
[26:35] Ken Munro
So that couldn't be reset until the plane was on the ground.
[26:37] Ken Munro
Everything was stationary.
[26:38] Ken Munro
And you could then reset the almanac plane, go, oh, yeah, I can see.
[26:41] Ken Munro
I can see the satellites again.
[26:42] Viktor Petersson
Right.
[26:43] Ken Munro
So that caused problems.
[26:45] Ken Munro
So planes would be potentially on the ground for maintenance for a time, so they couldn't depart.
[26:51] Ken Munro
And another weird thing started happening.
[26:54] Ken Munro
So we think of GPS being that source of position, and the reason we use GPS is more accurate.
[27:02] Ken Munro
It's more accurate than all the international reference systems we used to use.
[27:05] Ken Munro
So inertial reference was typically, most recently spinning laser gyros, and they could accept the detect acceleration, deceleration and gave you pretty accurate position.
[27:17] Ken Munro
So you could fly over the Atlantic from the UK to the US coming towards jfk, and you might be just one nautical mile out of position.
[27:24] Ken Munro
They were that accurate.
[27:25] Ken Munro
But of course, GPS is better.
[27:27] Viktor Petersson
Right?
[27:28] Ken Munro
And so of course, what you do, you update your inertial reference system with the better source of navigation, which is gps.
[27:35] Ken Munro
Hang on a minute.
[27:36] Ken Munro
We've now got a problem because we've now got a GPS that's had a position, that's now updated our inertial reference system.
[27:42] Ken Munro
That was our backup system.
[27:45] Viktor Petersson
Domino effect.
[27:47] Ken Munro
Yes.
[27:47] Ken Munro
So we've now lost our secondary navigational aid as well.
[27:53] Viktor Petersson
Interesting.
[27:54] Viktor Petersson
All right, Interesting problem.
[27:56] Viktor Petersson
Space for sure.
[27:57] Viktor Petersson
But let's go back to like, I mean, jamming is pretty obvious how that works.
[28:01] Viktor Petersson
Just basically send the signal stronger than whatever you're trying to pick up on and like jam the receiving signal that you're trying to pick up on.
[28:11] Viktor Petersson
So that's pretty straightforward in terms of spoofing when it comes to gps.
[28:15] Viktor Petersson
How does it actually work from a technical perspective?
[28:18] Ken Munro
So I'm not going to go into that because I don't want to be accused of showing people how easy it is to spoof planes.
[28:25] Ken Munro
But you will find a matter of few minutes on YouTube and a software defined radio and you probably have enough to do it quite effectively.
[28:32] Ken Munro
And the scary bit is you probably know GPS have very weak signal, so it doesn't take very much to do it.
[28:38] Ken Munro
So let's not go into that in too much detail, shall we?
[28:41] Viktor Petersson
Fair enough.
[28:42] Viktor Petersson
All right, that's fair enough.
[28:45] Ken Munro
All right, let's.
[28:46] Ken Munro
Yeah, well, there's definitely more to go on the whole GPS thing as well, because we've seen this weird situation where we're seeing a secondary navigational mode be affected, poisoning if you like.
[28:57] Ken Munro
So when that happens, so the last thing we've got at our disposal is what we call radio navigation, and that's where we use beacons on the ground.
[29:07] Ken Munro
A good example of this, you might have heard what's called a VOR or a very high frequency omnidirectional radio range that was invented in the US in the late 40s and we still use them.
[29:16] Ken Munro
And if you actually look at the airways across various continents, they typically meet at points where there's a vor, so it's fine.
[29:24] Ken Munro
So we've lost gps, we've lost inertial reference, we can use old school radio navigation, except there's a problem because those VORS are really expensive to maintain, so they're gradually being retired.
[29:38] Ken Munro
We've now got a problem where we've lost our primary, our secondary and now our tertiary net mode of navigation.
[29:44] Ken Munro
So old school, they're now starting to be retired because they're expensive to run.
[29:49] Ken Munro
And it gets worse.
[29:51] Ken Munro
Right, so that's navigation at altitude.
[29:53] Ken Munro
Right.
[29:54] Ken Munro
And those VORs can also be used to what's called a non precision approach, where we can approach as long as there's enough visibility, we can come through cloud and land safely.
[30:03] Ken Munro
So we then move on to instrument landing systems, which, as I'm sure you know, allow the plane to land when it's foggy.
[30:10] Ken Munro
Those instrument landing systems are really expensive to run and calibrate and Keep running.
[30:15] Ken Munro
So particularly in perhaps secondary airports around.
[30:18] Ken Munro
So perhaps, you know, regional airports around the world, they're starting to be retarded because GPS is more accurate.
[30:24] Viktor Petersson
Right.
[30:26] Ken Munro
But hang on, we've now got a spoofing problem and there's even a documented case in Estonia airfield called Tartu.
[30:34] Ken Munro
It might be Finland.
[30:34] Ken Munro
Trying to remember Tartu Airport.
[30:36] Ken Munro
You can read up on it, where they actually had to retire the approach for a period of time because they're very close to the Russian border and there was so much spoofing going on and they've retired instrument landing system.
[30:45] Ken Munro
Planes couldn't land there for a while.
[30:46] Ken Munro
So it's happened.
[30:47] Ken Munro
Yeah, so that's a problem.
[30:52] Ken Munro
And then you start getting into other crazy things.
[30:54] Ken Munro
So your primary navigation GPS has gone down.
[30:56] Ken Munro
Your secondary navigational inertial reference isn't working anymore.
[31:00] Ken Munro
So.
[31:00] Ken Munro
So your ground receivers aren't working anymore because they've been retired because they're expensive.
[31:04] Ken Munro
So what you do, well, the last thing you've got is you can speak to the controller on the ground and go, hey, tell me which way to go.
[31:10] Ken Munro
And that's called a radar vector.
[31:11] Ken Munro
And so the controller goes, oh, you're all right, I've got you on primary radar, secondary radar, turn right, bearing 270.
[31:19] Ken Munro
Right.
[31:20] Ken Munro
Great.
[31:21] Ken Munro
Maintain altitude X.
[31:22] Ken Munro
Great.
[31:22] Ken Munro
And you go the right way and everything's fine.
[31:24] Ken Munro
Except that GPS spoofing happens in defined areas, so it's going to happen to lots of planes at once.
[31:30] Ken Munro
And there's been some really interesting research to show that controller workload can increase by five times for one plane, requiring radar vectors.
[31:39] Ken Munro
So all of a sudden you've gone from controllers very happy to massively overworked with a bunch of planes all experiencing the same problem, all needing radar vectors.
[31:48] Ken Munro
And that then creates problems where overloaded controller can make mistakes.
[31:53] Viktor Petersson
Oh, wow.
[31:56] Ken Munro
But it gets worse.
[32:00] Ken Munro
Oh, dear.
[32:01] Ken Munro
So now, and this is really where I was going with the talk at DEFCON was we think about GPS position, all right, we think of spoofing and jamming as loss of position.
[32:11] Ken Munro
But actually, gps, as you well know, is actually simply a very precise source of time.
[32:16] Viktor Petersson
Yes.
[32:17] Ken Munro
All right, so where does the airplane source its time from?
[32:21] Ken Munro
Well, it used to source it from a local clock.
[32:24] Ken Munro
Right.
[32:25] Ken Munro
Even the most precise clocks on planes, very slowly, they drift a little bit over time.
[32:31] Ken Munro
Particularly as we're flying at altitude and high speed, you see a very small amount of clock drift.
[32:35] Ken Munro
So what, you update it from gps.
[32:38] Viktor Petersson
Right.
[32:40] Ken Munro
So the primary source of time sync in most modern airplanes is light to be gps.
[32:45] Ken Munro
Based and we saw a really interesting incident that I won't go into detail of who or what or when because it's quite sensitive.
[32:51] Ken Munro
Is a plane experienced not just position spoofing, but experienced a time spoof.
[32:58] Ken Munro
GPS is time and they spoofed the time into the future.
[33:02] Ken Munro
And of course because GPS was a single trusted source of time, it then effectively updated various other systems and caused a lot of the digital certificates on the airplane to expire.
[33:12] Ken Munro
So now all your communications have gone as well.
[33:16] Ken Munro
Because a good example, sorry is control the pilot data link which requires very precise price time.
[33:23] Ken Munro
You can't be more than a second adrift for the digital communications between the controller and the pilot to work.
[33:28] Ken Munro
But there's lots of other things think about.
[33:30] Ken Munro
There was a case where the cabin WI fi went down.
[33:34] Ken Munro
Why?
[33:34] Ken Munro
Because the source of time was wrong.
[33:36] Ken Munro
So all the certificates were expired.
[33:38] Ken Munro
Well the ones strictly expired because it was the future.
[33:40] Ken Munro
But yeah, they just weren't valid.
[33:44] Ken Munro
And then that gets even more complicated because you've now got a bunch of clocks on the plane that are now updated from the GPS clock that are now out of date.
[33:52] Ken Munro
But time GPS particularly is protected from rolling back.
[33:57] Ken Munro
You can roll full, but you can't roll back.
[34:00] Ken Munro
So this caused a lot of trouble because for the first time a bunch of components on a plane had to be reflashed to get the time back to the correct point in time so the plane could then fly again.
[34:11] Ken Munro
And that caused an outage on the plane for a significant period of time.
[34:13] Ken Munro
It took a couple of weeks of downtime.
[34:16] Viktor Petersson
Oh yeah.
[34:17] Ken Munro
So it's mind blowing.
[34:19] Ken Munro
And the instructions right now, so if you go to the.
[34:22] Ken Munro
What's called the quick reference handbook.
[34:23] Ken Munro
So it's on the EFB that we talked about.
[34:25] Ken Munro
So if I'm experiencing GPS spoofing, what I do first thing to do is change the clock to local plane time.
[34:31] Ken Munro
So you're not using GPS anymore.
[34:33] Ken Munro
But that involves the pilots to be like on it.
[34:36] Ken Munro
You're flying a plane, you're doing something else.
[34:38] Ken Munro
All of something weird happens with gps.
[34:40] Ken Munro
Oh, got to do that.
[34:41] Ken Munro
By which time it could easily.
[34:42] Viktor Petersson
Time sync is like milliseconds to take to complete.
[34:46] Viktor Petersson
Right.
[34:47] Viktor Petersson
You just need one packet to come through really.
[34:49] Ken Munro
And there's some also some good advice coming out about, you know, if you're going to be entering an area of known spoofing, you'll switch to local clock anyway.
[34:56] Ken Munro
So that's good.
[34:57] Ken Munro
But it's still.
[34:58] Ken Munro
It worries me that it's reliant on the Pilots.
[35:00] Ken Munro
Right.
[35:00] Ken Munro
Now the good news is that there is a future for all this and that's what we call hybrid gps.
[35:06] Ken Munro
So we correlate GPS from satellites with certain position broadcasts from the ground as well.
[35:15] Ken Munro
A good example of that.
[35:16] Ken Munro
Remember those radio based navigational layers I talked about?
[35:18] Ken Munro
What we do is we actually correlate GPS with where the radio transmitter on the ground is as well, which is great because that allows us to check.
[35:27] Ken Munro
Well, hang on, there's a coarse error in my position and time up here and the ground based navigator is saying I'm there, that's just radius.
[35:34] Viktor Petersson
Well, so you could in theory spoof that as well.
[35:36] Ken Munro
But it's two things, right?
[35:37] Viktor Petersson
Yeah, fair enough.
[35:39] Ken Munro
Yeah, it's more complicated and actually the ground based nav aids have got a lot of radio power, so you need a big transmitter to overwhelm that.
[35:46] Ken Munro
But this is again where I'm worried about ground based nav aids being retired because we're retiring them for reasons of cost because GPS was better.
[35:55] Ken Munro
But actually now we're finding out that GPS is quite vulnerable to certain attacks.
[35:59] Ken Munro
So we need to rely on those ground based navigation aids again.
[36:01] Ken Munro
But if they've all been retired because they're too expensive, we've got no way to have a hybrid GPS system.
[36:07] Viktor Petersson
And I guess in these attacks of spoofing, because you have two GPS systems, right?
[36:10] Viktor Petersson
You have, I forgot what they call the different types of GPS systems.
[36:13] Viktor Petersson
Like it's like even the smartwatches, like for athletes, like they use dual systems, right.
[36:18] Viktor Petersson
In these attack vectors.
[36:21] Viktor Petersson
Are they spoofing both systems or are planes using both systems or how does that look like?
[36:26] Ken Munro
Yeah, so we talk about gps, but gps, we're typically talking about the US Global positioning system.
[36:31] Ken Munro
But actually it would better to talk about gnss, which is all of the various countries satellite systems.
[36:42] Ken Munro
So for example GLONASS I believe is on the Russian ones, you've got European version, you've got us one.
[36:46] Ken Munro
I think there's a Chinese version too, which name escapes me.
[36:49] Ken Munro
So we talk about GNSS as being the aggregation actually pretty much every receiver on every plane.
[36:54] Ken Munro
And most used to art watches will pick up every one of those if they need to for precise reasons.
[36:59] Ken Munro
Right.
[37:01] Ken Munro
But the fundamental principles are the same.
[37:04] Viktor Petersson
Are the roughly the same as well.
[37:07] Ken Munro
That'S a great question.
[37:08] Ken Munro
They operate in a similar space.
[37:10] Ken Munro
The technical challenges are the same to chance.
[37:12] Viktor Petersson
SDR could do easily do both.
[37:14] Viktor Petersson
All of them.
[37:15] Viktor Petersson
Yeah.
[37:16] Viktor Petersson
Okay, fair enough.
[37:16] Viktor Petersson
Yeah, that's interesting.
[37:18] Viktor Petersson
Oh wow, that's some interesting Cascading impacts or jamming about.
[37:26] Ken Munro
If anyone wants to read more, what probably the best source of information right now.
[37:30] Ken Munro
It wasn't available when I did my talk in the US at defcon.
[37:33] Ken Munro
It is now.
[37:33] Ken Munro
It's from the Ops group.
[37:35] Ken Munro
It's an amazing website.
[37:36] Ken Munro
They've got their report.
[37:37] Ken Munro
There's 150 pages of stuff.
[37:40] Ken Munro
Absolutely fascinating, particularly some of the cascade consequences that we're now seeing direct evidence of in certain planes.
[37:47] Viktor Petersson
I'll make sure to link that up in the show notes because that sounds like a good read and that let me switch topic to maritime security because that's another topic that you guys have been on.
[37:57] Viktor Petersson
Another odd area of, I guess pen testing, right?
[38:02] Viktor Petersson
Because you guys have got your hands into some strange pen testing really.
[38:06] Viktor Petersson
But it's super fascinating, right?
[38:08] Viktor Petersson
How does that look in that world?
[38:10] Viktor Petersson
Is it very similar to the aviation space or completely different?
[38:16] Ken Munro
It's completely different.
[38:17] Ken Munro
And the reason is that back in the day, until about five, 10 years ago, ships weren't connected.
[38:27] Ken Munro
So none of it mattered.
[38:30] Ken Munro
It didn't really matter.
[38:32] Ken Munro
So if you wanted to use a sat phone or you needed satellite comms, you had to use what's called fleet broadband, which was insanely expensive.
[38:40] Ken Munro
So it was reserved for use in emergencies only.
[38:42] Ken Munro
Right?
[38:43] Ken Munro
Stupidly expensive and slow.
[38:46] Ken Munro
Yeah, you're talking dollars a kilobyte.
[38:50] Ken Munro
It was that expensive.
[38:52] Ken Munro
So that was your emergency stuff.
[38:56] Ken Munro
But everything changed with vsat.
[38:58] Ken Munro
So went from insanely expensive connectivity to always on, everywhere connectivity.
[39:05] Ken Munro
And it got to the point where if you wanted good crew, you had to have VSAT because they wanted to be always on, they wanted to be doing email, in touch with their families, doing social media, surfing, Internet.
[39:16] Ken Munro
You had to have good VSAT and give them access to it.
[39:19] Ken Munro
If you didn't have good vsat, you didn't get good crews.
[39:23] Ken Munro
But that changed everything.
[39:24] Ken Munro
So the ship's operators went, okay, we'll do vsat.
[39:27] Ken Munro
That's a really good idea.
[39:27] Ken Munro
It means we can do least cost routing, avoiding headwinds, we can avoid storms.
[39:31] Ken Munro
At last minute we can have routing changes.
[39:35] Ken Munro
So we're up loading and unloading our cargoes more efficiently.
[39:37] Ken Munro
Great, fantastic.
[39:40] Ken Munro
So they connected their ships, which frankly had such out of date technology on board.
[39:47] Ken Munro
I mean we're talking 20 years of technical debt.
[39:51] Ken Munro
Unbelievable issues.
[39:54] Ken Munro
So bad.
[39:54] Ken Munro
I mean, my colleague Andrew Tierney, who's giving a talk at the International Maritime Organization this Wednesday, in fact about exit, he says in the last five years of testing ships, he's never once had to use an exploit.
[40:07] Ken Munro
It's that Bad?
[40:09] Ken Munro
Yeah.
[40:10] Ken Munro
It's gone from public Internet through to taking control of the rudder, the helm, the engines on a vessel.
[40:19] Ken Munro
Don't get me wrong, that's not easy.
[40:21] Ken Munro
And you typically need access to vessel to prove the attack path.
[40:24] Ken Munro
But yeah, without using an exploit, taking control of a vessel remotely.
[40:29] Viktor Petersson
That sounds like a VNC roulette almost.
[40:34] Ken Munro
I'm saying nothing.
[40:39] Viktor Petersson
Oh wow.
[40:40] Viktor Petersson
So how does that industry respond to this?
[40:46] Viktor Petersson
I guess you guys have done some responsible disclosures.
[40:50] Viktor Petersson
How has that landscape looked like there?
[40:54] Ken Munro
So I think there's a wonderful metaphor in terms of turning the oil tanker.
[40:59] Ken Munro
Shipping takes a long time.
[41:04] Ken Munro
There's been some attempts AT regulation, so MSC 428 for example, there's a couple of others but they really haven't had the effect of really getting shipping operators known as to stand up.
[41:17] Ken Munro
Actually this is important.
[41:19] Ken Munro
There has been a regulation change just happened this summer actually.
[41:23] Ken Munro
What's called IACS UR E26 and 27.
[41:28] Ken Munro
Right.
[41:29] Ken Munro
Have actually made cybersecurity mandatory for new build boats from start of this year, next year.
[41:38] Ken Munro
Sorry.
[41:39] Ken Munro
So there's a little bit of hope and everyone's getting quite excited.
[41:42] Ken Munro
Nope, nope.
[41:43] Ken Munro
So what has to happen is those boats have to come to the end of life and sink or whatever before.
[41:47] Ken Munro
No, I think I'm being facetious.
[41:49] Ken Munro
So yeah, we've got huge problems.
[41:51] Viktor Petersson
Yeah.
[41:52] Viktor Petersson
With these life cycle of these vessels I would imagine are in the range of 20 some years.
[41:56] Viktor Petersson
Right.
[41:56] Ken Munro
Yeah.
[41:57] Ken Munro
Yeah.
[41:57] Ken Munro
You want to sweat that asset for 20 years before it gets broken up.
[42:00] Ken Munro
And of course even if you designed it well on day one, refits, modification, tampering and I can think of one case where we're looking at.
[42:11] Ken Munro
We were working on an exploration drilling rig and one of the engineers responsible for the dynamic propulsion system had his office up on the main deck and in order to administrate things had to walk down a bunch of stairs down to the base of the vessel.
[42:25] Ken Munro
Didn't want to do that, so bypassed all the segregation and as a result of that exposed the ship to remote compromise.
[42:34] Ken Munro
So it's all very well having a good design, but was it designed correctly, was it then built correctly by the shipyard?
[42:41] Ken Munro
Often they don't follow what you intended security wise.
[42:45] Ken Munro
Does it then do what you intended when you shake the vessel down?
[42:47] Ken Munro
Very rarely.
[42:49] Ken Munro
And then what happens over the life of the vessel in terms of maintaining its security?
[42:53] Viktor Petersson
I mean this sounds so familiar to other industries as well.
[42:56] Viktor Petersson
Right.
[42:56] Viktor Petersson
Because they, this tend to come from industry where they don't deem themselves as software companies.
[43:02] Viktor Petersson
Obviously because they're not.
[43:03] Viktor Petersson
But they also have, don't have that culture.
[43:05] Viktor Petersson
They view it as, I guess a one time fee to solve software.
[43:11] Viktor Petersson
And then there is no ongoing maintenance or life cycle management of these things.
[43:15] Ken Munro
Right.
[43:17] Viktor Petersson
So that's when these things happen.
[43:20] Ken Munro
Yeah.
[43:21] Ken Munro
Where'd you go?
[43:21] Ken Munro
And I think the really challenging bit is the acceleration that maritime's had to experience is most other industries, financial services being a great example, being a target for attck for 20 plus years.
[43:35] Ken Munro
On the cyber side, they've seen iteration and they've improved their cybersecurity little by little over the last couple of decades.
[43:45] Ken Munro
The problem with maritime is they've gone from zero and need to get to 100% in the space of a year or two.
[43:51] Ken Munro
And that's an incredible ask for a floating environment that is also safety critical, that if it ain't broken, why would you fix it?
[43:59] Ken Munro
Says the average chief engineer on a ship.
[44:01] Viktor Petersson
Yeah.
[44:02] Viktor Petersson
And also every time that's in dock that is not generated revenue, that's a massive cost.
[44:07] Viktor Petersson
Right.
[44:07] Viktor Petersson
So retiring that for months, just fix security issues or perceived security issues.
[44:16] Ken Munro
You end up with this weird race to the bottom as well.
[44:18] Ken Munro
Because often when you've taken a ship in after say 10 years, it might be coming in for a refit of some of the bridge systems.
[44:22] Ken Munro
So you get some of the advantages of the latest connected bridges which offer you much improved safety, better weather routing, saving money on fuel use for example.
[44:32] Ken Munro
But they still need to work with all the grimy dirty bits down in the bowels of the ship.
[44:37] Ken Munro
And if they've got static credentials on that new sexy bridge, has to have static credentials too to talk to it.
[44:42] Ken Munro
So you introduce exactly the same vulnerability even though you put brand new kit onto that vessel.
[44:48] Viktor Petersson
Yeah, I mean this is, I think I'm usually not a massive fan of over regulation, but I think in the security space it's one of the only ways to actually make the industry changes.
[45:00] Viktor Petersson
Like CRA is a good example of this.
[45:02] Viktor Petersson
I think we might not like it, but it was the only way for our industry to change.
[45:11] Ken Munro
I completely agree.
[45:13] Ken Munro
I'm not a particular fan of regulation either.
[45:15] Ken Munro
I'd far rather see market forces drive behavior.
[45:18] Ken Munro
But to use an example with IoT smart devices is the market pressure doesn't exist because the consumer isn't capable of making a buying decision based upon cybersecurity at the point of sale, therefore the driver's gone.
[45:31] Ken Munro
So that's where I think regulation is important, where the market cannot force behaviors in a good direction.
[45:37] Ken Munro
And that's Where I think, for example, the EU CRA will drive behaviors in a certain direction to actually benefit all of us as consumers.
[45:45] Viktor Petersson
Yeah, Security is a weird one.
[45:47] Viktor Petersson
Right.
[45:47] Viktor Petersson
And you can't touch on that.
[45:49] Viktor Petersson
The average user is by no means savvy enough to understand what the harm is to have static credentials in their baby cameras.
[45:57] Viktor Petersson
Right.
[45:57] Viktor Petersson
Like, oh, very convenient.
[45:59] Viktor Petersson
It's right here on the packaging.
[46:00] Ken Munro
Yeah.
[46:02] Viktor Petersson
But then connected Internet and there you go.
[46:05] Viktor Petersson
Right.
[46:05] Viktor Petersson
So I think that's a good segue to the work you guys have done in the IoT space because you've done some interesting work there as well.
[46:13] Viktor Petersson
You found some good, interesting problem with various IoT devices.
[46:19] Viktor Petersson
By the way, I used to shout that I loved your Chromecast and Alexa hack because I think that was a very clever.
[46:24] Viktor Petersson
It's an old video, but it's a very clever attack vector where.
[46:28] Viktor Petersson
Yeah, yeah, recap it for audience.
[46:30] Viktor Petersson
I think it was a.
[46:31] Viktor Petersson
It's a clever attack.
[46:32] Viktor Petersson
Relatively simple, but clever.
[46:33] Ken Munro
It was fun.
[46:34] Ken Munro
Yeah.
[46:34] Ken Munro
So the Chromecast, which you plug into your TV to make it smart, right?
[46:39] Ken Munro
Certainly for older TVs, great device, but it has this weird thing where if you deauth it over WI fi, it would spin up an open access point and you can then connect to it and then you could then cause the TV to stream arbitrary content.
[46:53] Ken Munro
And we thought, hang on, well, that's not very useful, is it?
[46:55] Ken Munro
You know, you can put something rude to appear while your kids are watching the tv.
[46:58] Ken Munro
If you're a dodgy hacker outside, then we thought, hang on, home assistants.
[47:03] Ken Munro
So what about the Echo and Google products?
[47:08] Ken Munro
Actually what you could do is you could call someone's TV that was off, hit the Chromecast, it will power the TV on and you could then stream arbitrary content.
[47:17] Ken Munro
So a blank YouTube video of you saying something that's then recognized by the echo and then trigger stuff to happen in your house.
[47:24] Ken Munro
So it was a very funny TV show where were doing this from outside and causing people.
[47:28] Ken Munro
People's lights to come on, the heating to come on, in some cases, some early smart locks, you could make the front door unlock as well.
[47:34] Ken Munro
So lots of weird things.
[47:35] Ken Munro
And I think for giggles, we also found a third party recipe that would allow you to summon your Tesla, right?
[47:46] Viktor Petersson
No, but this is what I love with the domain of security because it's always like thinking outside the box, right.
[47:54] Viktor Petersson
It's like it doesn't seem very harmful, but you chain together these things, you can make unexpected things happen.
[48:01] Ken Munro
Right.
[48:02] Viktor Petersson
And I think that was a really clever way of looking at that.
[48:05] Viktor Petersson
And you had another interesting attack with the smart helmet level, I think they call it.
[48:11] Viktor Petersson
Level.
[48:12] Ken Munro
Oh, yeah, where's that?
[48:14] Ken Munro
I think that might be in my bag of skiing gear at the moment.
[48:19] Ken Munro
Now, what was the vulnerability of that?
[48:20] Ken Munro
I'm trying to remember.
[48:21] Ken Munro
I think.
[48:23] Ken Munro
What did it do?
[48:24] Ken Munro
yeah, I remember now.
[48:26] Ken Munro
So there was.
[48:26] Ken Munro
It's a smart helmet.
[48:27] Ken Munro
Great.
[48:28] Ken Munro
I mean, do you ski?
[48:29] Ken Munro
Do you board?
[48:30] Viktor Petersson
Yeah, yeah, I do occasionally.
[48:31] Ken Munro
Okay.
[48:32] Ken Munro
And you know what it's like is, you know, you're skiing with your buddies and you lose them and it's like this, gloves off, dial their phone and you never quite get.
[48:39] Ken Munro
It never works.
[48:40] Ken Munro
So the idea was this smart helmet that connected to an app on your phone where you just pressed a button here and then it span up using the app using cellular data, you could then talk to your buddies.
[48:50] Ken Munro
I mean, I'll be honest, it was pretty clunky.
[48:52] Ken Munro
It didn't work very well.
[48:54] Ken Munro
But there was a lack of user authorization, so anyone could jump into any of the groups and just start spouting stuff to each other.
[49:02] Ken Munro
So you could have people creeping on you through your helmet.
[49:04] Ken Munro
Weird.
[49:05] Ken Munro
But then that same functionality also allowed to track people in real time.
[49:09] Ken Munro
So using a very weak authorization key, you could then see where everyone was in the ski resort.
[49:15] Ken Munro
So privacy invasion.
[49:18] Ken Munro
Bit of fun.
[49:20] Ken Munro
Good excuse to mess around with some smart connected ski gear.
[49:23] Viktor Petersson
Yeah, absolutely.
[49:24] Viktor Petersson
That brings me to another topic, which is like, you guys obviously do solve these things for shits and giggles, I would imagine, because she's like, oh, this is fun.
[49:33] Viktor Petersson
But when you approach one of these projects, like, you forget a new device.
[49:37] Viktor Petersson
How do you guys approach it?
[49:39] Viktor Petersson
Where do you start?
[49:40] Viktor Petersson
You get a new shiny IoT gear.
[49:43] Viktor Petersson
How do you start poking at it?
[49:45] Viktor Petersson
Like, what's the process like?
[49:47] Viktor Petersson
Is there a such thing?
[49:48] Ken Munro
This is going to sound really weird, but through 10 years experience of looking at smart devices, many of the team here, you get a feel for what's going to be wrong with it before you've even got the product.
[50:01] Ken Munro
You can often do stuff like pulling the firmware from online resources.
[50:04] Ken Munro
First, you can use open sources.
[50:06] Ken Munro
So the FCC Referral Communications Commission website is actually really good for getting useful data off it.
[50:13] Ken Munro
You get a sixth sense of what's going to be wrong with something based upon other devices you've seen.
[50:20] Ken Munro
Sometimes it'll be esoteric stuff in the firmware, other times it'll be really stupid stuff to do with lack of Bluetooth pairing security.
[50:28] Ken Munro
I brought this along for reasons.
[50:32] Ken Munro
You probably have one of these as a kid.
[50:33] Ken Munro
I certainly did mine was made of wood though, and it certainly wasn't smart because I'm old.
[50:38] Ken Munro
This is the new Bluetooth connected version of the Fisher Price chatterbox phone.
[50:43] Ken Munro
And you can connect it to your phone over Bluetooth.
[50:45] Ken Munro
And I kid you not, you can genuinely then pick up and start making calls on this from your cell phone, which I love.
[50:49] Ken Munro
You can even use the rotary dial.
[50:51] Ken Munro
And my kids looked at this going, what's one of those, Daddy?
[50:55] Ken Munro
I've not used one of those.
[50:56] Ken Munro
But the problem being is they put no thought into Bluetooth pairing security.
[51:00] Ken Munro
So it was always on.
[51:02] Ken Munro
The battery lasts a couple of months and any Bluetooth device in range could just connect and wow, once that, you know, the kids are probably playing with it.
[51:10] Ken Munro
If they leave the headset off, the handset off, the microphone, speaker are continuously enabled.
[51:15] Ken Munro
So you can just bug and spy bug on people.
[51:17] Ken Munro
I think that's really silly that Fisher Price would make such a mistake.
[51:22] Viktor Petersson
I think my thinking on all these smart things that most things are better stupid than smart.
[51:29] Viktor Petersson
There is often very little reason to make things smart because the more smart they are, the more stupid they become.
[51:34] Ken Munro
Yeah.
[51:35] Ken Munro
Don't get me wrong, you know, I do have some, finally have some smart products in my own home.
[51:39] Ken Munro
So I have a connected heating system which I use, and we haven't battered the security of it, so it's one I'm very happy with.
[51:46] Ken Munro
And I think there's definitely a case for connectivity in certain areas.
[51:49] Ken Munro
I mean, as a result, I use less fuel, I save carbon dioxide.
[51:53] Ken Munro
You know, the heating works for me now.
[51:56] Ken Munro
And I think there's also a really strong case in certain areas of assisted living for our elderly.
[52:00] Ken Munro
I think there's a strong case for Iot there.
[52:02] Ken Munro
And I also think there's a strong case for IoT in healthcare.
[52:05] Ken Munro
I think we will live longer, better, more fulfilled lives with connectivity.
[52:10] Ken Munro
But those areas that we need to be really careful of.
[52:14] Ken Munro
Healthcare and elderly people.
[52:16] Ken Munro
We need to be really careful about the cybersecurity of those communities.
[52:21] Viktor Petersson
Yeah, absolutely.
[52:23] Viktor Petersson
I guess to elaborate, what about smart TVs are usually worse than a dumb TV.
[52:30] Viktor Petersson
And like, you guys had a post about this while doing some research before the show about.
[52:37] Viktor Petersson
I think it's an old post, but Samsung's Tizen asks you to do like a virus check on their TVs.
[52:44] Viktor Petersson
And it's just like if my TV requires me to run a virus scan, it's the wrong tool for the job.
[52:51] Ken Munro
Yeah.
[52:52] Ken Munro
Oh, this is years ago.
[52:53] Ken Munro
I think it's been 2014.
[52:55] Ken Munro
Maybe there was a Press story that someone had read the Samson terms of use for their TV and it said something about voice data, personal data.
[53:07] Ken Munro
And so hang on, I remember that story.
[53:09] Ken Munro
Yeah, I've got one of those TVs.
[53:11] Ken Munro
So literally the next morning I walked out of my home carrying my tv, much to the confusion of my wife, brought it to the office and we set it up and started looking at it in real detail to see how it was doing voice recognition.
[53:22] Ken Munro
And it turned out the TV was pretty much constantly listening to you.
[53:26] Ken Munro
And because it didn't have enough processing power on board, it would offload the processing of voice to text to a third party in the usa.
[53:34] Ken Munro
And it was making.
[53:35] Viktor Petersson
Right there.
[53:36] Ken Munro
Yeah.
[53:36] Ken Munro
And it was doing that communication over plain text.
[53:41] Ken Munro
Wow.
[53:41] Ken Munro
So not only was the TV listening, it was also capturing our data, sending to the US without permission, and doing it in the clear.
[53:48] Ken Munro
So yeah, that was a bad day, I think.
[53:51] Viktor Petersson
Yeah.
[53:52] Viktor Petersson
I mean, there have been so many bad stories about smart TVs.
[53:54] Viktor Petersson
Like I used to use stupid TVs because of that reason in particular, but.
[53:59] Viktor Petersson
And if you do have a smart tv, never turn it on.
[54:01] Viktor Petersson
Wi fi.
[54:01] Viktor Petersson
Right.
[54:02] Viktor Petersson
There was this story that I broke, I think two weeks ago, where I forgot which brand of TVs it was.
[54:09] Viktor Petersson
But you would think that if you use an external input like an HDMI as your, like an Apple TV or something, that you're in better position.
[54:17] Viktor Petersson
But turns out that this TV actually like fingerprinting content coming into hdmi.
[54:23] Viktor Petersson
So it could actually, even if you are not using the smart TV functionality, they could actually understand your viewing behaviors and send that off upstream, which is terrifying.
[54:33] Ken Munro
It's when you realize that actually the margins for making TVs are so tight that actually it's monetization of your data is the way that the TV manufacturers actually make money.
[54:45] Ken Munro
They'd far rather sell the TV at almost no margin and make it out of the back.
[54:50] Ken Munro
So I've got a frustration at the moment.
[54:51] Ken Munro
I've got a Samsung smart TV and it keeps spinning up Samsung's own content platforms.
[54:58] Ken Munro
I don't want to watch that.
[54:59] Ken Munro
I want to watch Netflix.
[55:01] Ken Munro
Leave me alone.
[55:02] Viktor Petersson
Yeah, yeah, exactly.
[55:03] Viktor Petersson
It's all upsell, right?
[55:04] Viktor Petersson
Yeah, it's scary.
[55:07] Viktor Petersson
No, it's.
[55:08] Viktor Petersson
Yeah, I don't trust these TVs.
[55:10] Viktor Petersson
That's my point for good reason.
[55:12] Viktor Petersson
Particularly if it has a microphone as well.
[55:14] Viktor Petersson
Absolutely not.
[55:16] Ken Munro
So they did start removing microphones not long after the piece of research that we published.
[55:23] Ken Munro
I thought that was a good thing, actually.
[55:25] Ken Munro
I think the first step was actually make it A push button on the remote.
[55:28] Ken Munro
So if you didn't push it, didn't listen.
[55:30] Ken Munro
That was a good step.
[55:31] Ken Munro
And then I think they gradually realized that actually people don't want microphones on their tv.
[55:35] Viktor Petersson
Shocking, isn't it?
[55:36] Ken Munro
Yeah.
[55:37] Ken Munro
Quite happy to press the button on the remote.
[55:39] Ken Munro
Thank you.
[55:39] Viktor Petersson
Yeah, exactly.
[55:40] Viktor Petersson
It's crazy.
[55:42] Viktor Petersson
One of the last things I wanted to cover.
[55:44] Viktor Petersson
Well, not one last thing I want to cover is the home alarm attack factor.
[55:47] Viktor Petersson
You did sometime the jamming stuff there, which kind of leads kind of a segue from the airplane spoofing, but on a much more similar level.
[55:55] Viktor Petersson
Right.
[55:56] Viktor Petersson
How widespread is this?
[55:57] Viktor Petersson
Like just to recap the story, like you could jam a gps.
[56:00] Viktor Petersson
A jam, sorry, with an SDR jab, an alarm, home alarm system, essentially.
[56:05] Viktor Petersson
Is that still how.
[56:06] Viktor Petersson
What's the verdict of that as of 2024?
[56:10] Ken Munro
So that was a wonderful piece of research by my colleague Andrew Tierney, who goes by the hashtag of cybergibbons.
[56:17] Ken Munro
So do give him a follow.
[56:18] Ken Munro
He does some amazingly clever stuff.
[56:21] Ken Munro
He had been looking at wireless house alarms.
[56:25] Ken Munro
So looking at how the pir, the sensor connects to the main board and for ease of installation, a lot of companies were offering this over RF rather than wired.
[56:35] Ken Munro
It's a lot easier to do at radio than it is drill lots of holes.
[56:39] Ken Munro
So started looking at this and realized that the way that many of the PRs were connecting was extremely vulnerable to jamming.
[56:46] Ken Munro
So even if you jammed the communication, the board wouldn't do anything about it.
[56:51] Ken Munro
So you could literally work, turn up with an SDR or optimize something into the size of a cigarette packet and you jam the alarm.
[56:59] Ken Munro
It was.
[56:59] Ken Munro
Certain brands were really bad.
[57:01] Ken Munro
What I was impressed with is see certain higher end brands that started addressing this directly.
[57:06] Ken Munro
So they were having two way communication with the pirates.
[57:09] Ken Munro
So they were checking the integrity of the pir, checking the integrity of the signal.
[57:13] Ken Munro
And if one of them dropped off, it would set an alert.
[57:15] Ken Munro
So you could go, is the battery on out or is it actually being jammed?
[57:19] Ken Munro
So it would.
[57:19] Viktor Petersson
Yeah, that's a good point because that's a valid scenario where it would drop off.
[57:25] Viktor Petersson
And you don't want alarm go off every time the battery is out either.
[57:28] Ken Munro
Yes, absolutely.
[57:29] Ken Munro
But it would have a two way communication.
[57:30] Ken Munro
So you as a user, you could look at your mobile app and go like, okay, the battery's running down, I need to go and look at that.
[57:36] Ken Munro
Or I'll disable that PIR in the interim.
[57:39] Ken Munro
But yeah, we have this crazy situation where all sorts of relatively cheap alarms were Very vulnerable to attacks.
[57:46] Ken Munro
There are even some funny things.
[57:47] Ken Munro
I think with like a remote fob, you'd have your alarm turning off and on.
[57:53] Ken Munro
Actually, you could spoof that as well, so you could disable the alarm just by some spoofing and jamming.
[57:58] Ken Munro
So, yeah, really poor attempt by a number of manufacturers.
[58:02] Ken Munro
But the good news is a number of alarms are now doing much better authorization and validation of the pirs to make sure they're actually there and doing the right thing and not being jammed.
[58:15] Viktor Petersson
That is good indeed.
[58:16] Viktor Petersson
All right, good.
[58:16] Viktor Petersson
So at least it's not as bad as it used to.
[58:20] Viktor Petersson
SDRs are getting cheaper and cheaper, so hopefully that makes it a little bit harder at least to leverage these things.
[58:29] Viktor Petersson
The last thing I want to wrap up on is kind of legislation, how you see kind of this playing out in particular in the IoT space.
[58:34] Viktor Petersson
We mentioned CRA already from your vantage point, how will this change the industry?
[58:41] Viktor Petersson
Like, how do you.
[58:42] Viktor Petersson
Do you actually think they will have an impact?
[58:44] Viktor Petersson
Or do you think this is people just going to ignore this or how do you see that?
[58:50] Ken Munro
So I've been very vocal about this.
[58:52] Ken Munro
So the first regulation I was aware of was California Senate bill 327.
[58:57] Viktor Petersson
Bizarrely, actually, that's the IOT one.
[58:59] Viktor Petersson
Yeah.
[58:59] Ken Munro
Yeah.
[59:00] Ken Munro
I've actually quoted our work on the swearing Dolly, my friend Kayla, as the inspiration to the bill, which was lovely, but I'm not aware of any enforcement.
[59:08] Ken Munro
And more recently in the uk led the world with the Product Security Telecommunications Infrastructure Bill, or psti.
[59:14] Ken Munro
That's a mouthful, isn't it?
[59:18] Ken Munro
And it came up with three basic principles which were supposed to drive behaviors.
[59:21] Ken Munro
So no default passwords, a statement about length of support for the product, and a vulnerability disclosure program.
[59:27] Ken Munro
So pretty light touch, but should drive behavior in the right way.
[59:30] Ken Munro
I'm still not aware of any enforcement action and it's lovely having regulations, but if someone's not prepared to enforce and enforce publicly, then the bill's toothless EU cra.
[59:44] Ken Munro
Really interested to see where that goes.
[59:47] Ken Munro
You've got Psti over here in terms of complexity, pretty light.
[59:49] Ken Munro
And then the cra, which is huge.
[59:52] Ken Munro
So it's going to be interesting.
[59:54] Ken Munro
It's got to drive behaviors, but it will only drive them if the EU and the UK and other enforcement agencies around the world actually grab some of these errant manufacturers by the scruff of the neck and go, no.
[01:00:06] Viktor Petersson
Yeah.
[01:00:07] Viktor Petersson
And I think if it does drive behavior, I mean, at least I'm starting to see a bit of behavioral change.
[01:00:14] Viktor Petersson
And I think more on the proactive buyers and S bombs is something that I think is kind of a direct consequence of legislation when executive order was the one driving that to start with.
[01:00:27] Viktor Petersson
But that's something I think would not have happened without these legal pushbacks really from the industry.
[01:00:37] Viktor Petersson
So I'm not sure how you see that.
[01:00:40] Viktor Petersson
If that's something that you see as well or like if you're bullish on that.
[01:00:43] Viktor Petersson
How do you see that shaping up?
[01:00:45] Ken Munro
I think the SBOM project has been really good.
[01:00:47] Ken Munro
I think that's a massive step forward to understand what you're building off.
[01:00:52] Ken Munro
It's huge, for example, in automotive right now because the complexity of an automotive ECU is massive.
[01:00:58] Ken Munro
You think about the number of dependencies that sit on the average ecu.
[01:01:03] Ken Munro
I think having that S bom and truly understanding it is great because you immediately go, right, well I've got a new CVE and it applies to all these different ECUs.
[01:01:12] Ken Munro
That is huge, massive overhead on manufacturers.
[01:01:15] Ken Munro
But I hope they flow that back up their supply chains and go like, well, when you're in the procurement process, I want to know what sboms you're using, document it and send it to me.
[01:01:26] Viktor Petersson
And that needs to be part of the life cycle.
[01:01:28] Viktor Petersson
I think that's my biggest beef when I have a lot of conversation with people about S bombs because people think them as a one time thing, but it's actually, it's a dynamic element.
[01:01:37] Viktor Petersson
Right.
[01:01:37] Viktor Petersson
Every time you push an update, you need to push that S bomb as well as an artifact.
[01:01:43] Viktor Petersson
And you've seen some developments in the medical space in the US actually, they've been actually pretty proactive on this stuff, at least some of the vendors there.
[01:01:53] Viktor Petersson
But again, that only came after pretty heavy handed regulation because they didn't do anything for so long.
[01:01:59] Viktor Petersson
Right?
[01:02:00] Ken Munro
Yeah, it's certainly on the MedTech side of things.
[01:02:03] Ken Munro
I think the FDA in the US has done some really good things of late.
[01:02:07] Ken Munro
I think of any industry where cybersecurity is critical, crikey, it's got to be MedTech, right?
[01:02:14] Ken Munro
And I remember a very silly vulnerability we found in a connected hot tub.
[01:02:20] Ken Munro
Why does it matter?
[01:02:21] Ken Munro
But actually it was the cloud platform behind it had a bunch of authorization flaws and we found some connected medtech on the same cloud platform with very similar vulnerabilities.
[01:02:31] Ken Munro
I think one of them was in fact a cranial stimulator.
[01:02:34] Ken Munro
So we think about of any industry that needs to get cybersecurity, right, it's got to be connected medtech.
[01:02:42] Ken Munro
I remember another vulnerability one of my colleagues found in very early 2020 he found an exposed S3 bucket read write permissions and looking at the data figured actually it was a closed loop insulin pump trial read write data.
[01:02:58] Ken Munro
You're like holy cow.
[01:02:59] Ken Munro
All you have to do is tamper with the insulin readings so they're high and you auto dose a fatal dose of insulin.
[01:03:07] Ken Munro
Thank goodness the manufacturer, they fixed that within an hour of us reporting to it, reporting it and that was on a Sunday.
[01:03:13] Ken Munro
So yeah, the vulnerability disclosure process worked really well.
[01:03:17] Ken Munro
It's a shame because development didn't quite get there so quickly.
[01:03:20] Viktor Petersson
Yeah, yeah, no it is crazy.
[01:03:23] Viktor Petersson
So I think that's there are light, I think there is a light end of the tunnel and hopefully I think their next wave of legal framework, the compliance frameworks, my gut feeling is that the next generation of ISO and well NISTA just got updated this year stopped just shy of mandating it.
[01:03:46] Viktor Petersson
But I think I'm bullish on the next generation of these framework will kind of mandate a lot stronger security posture and transparency.
[01:03:54] Viktor Petersson
Really?
[01:03:55] Ken Munro
Yeah.
[01:03:56] Ken Munro
I think can only drive good behaviors.
[01:03:58] Ken Munro
And for the large manufacturers who typically get it right because they've got a brand at stake, I cannot see why this would cause them a problem because what it does is it forces the cheaper the me too brands who aren't maybe spending as much time on cybersecurity to actually start to behave.
[01:04:14] Ken Munro
So actually their costs for the product get it right will increase and actually it's excuse me, a good thing for larger manufacturers who do cybersecurity right.
[01:04:21] Ken Munro
Because it forces everybody to not cut corners.
[01:04:25] Ken Munro
And I think that's a really good thing.
[01:04:27] Viktor Petersson
I think so too.
[01:04:28] Viktor Petersson
The biggest argument I've heard that I can kind of not sympathize with but understand is that why people bigger organizations, particular legacy organizations are so against S bombs is because.
[01:04:39] Viktor Petersson
Because the second they generate nest bomb that means they have no longer plausible deniability about what goes in there.
[01:04:45] Viktor Petersson
And I think that's actually a big reason why there's a big pushback.
[01:04:49] Ken Munro
I can see that too.
[01:04:50] Ken Munro
Although this is going to sound crazy but I think in IoT actually cybersecurity genuinely is an enabler.
[01:04:56] Ken Munro
I really do and I'll tell you why.
[01:05:00] Ken Munro
I saw lots of objection during the UK IoT bill about it would get in the way of sales and it would slow the market down.
[01:05:09] Ken Munro
Actually now hang on a minute.
[01:05:10] Ken Munro
They did some really interesting research showing this the government did and showed that cybersecurity was actually the number two objection by many consumers for buying smart product.
[01:05:18] Ken Munro
So hang on a minute.
[01:05:19] Ken Munro
So if you can tick that box and reassure consumers they'll buy more of your products.
[01:05:26] Viktor Petersson
Yeah.
[01:05:27] Ken Munro
I mean, actually, the number one objection was they didn't need it but couldn't see the benefit.
[01:05:31] Ken Munro
But yeah.
[01:05:35] Viktor Petersson
That is crazy.
[01:05:37] Viktor Petersson
Ken, this has been super interesting.
[01:05:40] Viktor Petersson
If somebody want to learn more about you and Pen Test Partners, can they find more information?
[01:05:46] Ken Munro
Oh, sure.
[01:05:46] Ken Munro
Hit us up pentestpartners.com There's 150 of us based around the UK and USA.
[01:05:53] Ken Munro
We can help with pen testing, instant response and broader GRC consulting.
[01:05:57] Ken Munro
So we'd love to help out, if only to tell you lots more funny stories about hacking smart devices.
[01:06:03] Viktor Petersson
Love it.
[01:06:04] Viktor Petersson
Perfect.
[01:06:04] Viktor Petersson
I very much appreciate this, Ken.
[01:06:07] Viktor Petersson
So thanks so much for coming on the show.
[01:06:08] Viktor Petersson
Have a good one.
[01:06:09] Viktor Petersson
Cheers.
[01:06:09] Ken Munro
Thank you.
[01:06:10] Viktor Petersson
Bye.

Found an error or typo? File PR against this file or the transcript.