Carelessness with security seems to be the norm.
http://www.zdnet.com/article/histor...17cfd61&bhid=24083753282545551715082267791408
http://www.zdnet.com/article/histor...17cfd61&bhid=24083753282545551715082267791408
I suppose regulation would seem to be an easy solution, but the government doesn't move fast enough to keep up with technology. I think pressure on the manufacturers from one of the standardization bodies, such as IEEE would probably be more effective.I really don't think blaming the victims of this is helpful. This is what regulation is for, and rightly so. Car deaths resulting from a plethora of shoddy car companies (there used to be hundreds in the US alone) resulted in the government stepping in so people wouldn't have to think about whether their car would blow up when they drove it off the lot. That's probably what needs to happen in these cases as well. We regulate lots of foreign goods as well - like produce and toys for kids. Unfortunately regulators have a mixed record on doing it once they get involved.
You'll never have the level of security on these things that you see on say a PC. As much as we make fun of Windows security, Windows is the target of most malware/hacks by virtue of being the most widely used OS. Because of all that it is in a constant state of update. It's in a sense hardened and battle tested. Or to use a medical analogy Windows has been all around the world and caught every disease possible... now it's immune to most. These one-off devices and OS setups are a bit more like an isolated tribe of people.... soon as smallpox comes in they're done.
Until we have standards and enforcement - including recalls - that make the manufacturer responsible, this will continue to happen.
Don't hold your breath.
I do blame the consumer. No regulation needed
I'm sure many don't and fact is if they gave a **** they would. It's not necessary to be able to write code to be an educated consumer. It's not the manufacturers responsiblity to protect people from their own ignorance and laziness. Nor is it the governments job to protect people from their own stupidity.How many consumers know jack crap about data networking and software development?
All they know is someone offered them a wifi router for $20.
They have no idea the software running it, wasn't written to any sort of security or safety standard.
Some of it gets mildly audited by mediocre pentesters, at least... but those blog posts never get seen by the light of day nor do findings ever make it through proper channels for disclosure. One day I imagine there will be a nonprofit pentest group that does nothing but test these devices and publish results. I know there are some groups out there, but there's not near enough coverage to cover the sloppy culture.
I'm sure many don't and fact is if they gave a **** they would. It's not necessary to be able to write code to be an educated consumer. It's not the manufacturers responsiblity to protect people from their own ignorance and laziness. Nor is it the governments job to protect people from their own stupidity.
I never said they had to be good pentesters, just mediocre. Plenty of kids out there looking to make a name without enough experience or credibility to make money at it yet.Who would want do do pen testing for no profit? Pen testing is an awful way to spend a day/week/month/year/decade of your life.
Only people I know who are really good at it, are also making a LOT of money to do it, and they almost universally hate it.
I never said they had to be good pentesters, just mediocre. Plenty of kids out there looking to make a name without enough experience or credibility to make money at it yet.
Here's a clue though: If your garbage man makes more money than your pen tester...
A lot of IoT stuff is imbedded and may or may not have password control.It would go a long way if manufacturers just required a password change on first use and didn't allow things like admin admin.
I was talking about the edge devices that were vulnerable on this particular attack. Most of the controller devices have password control, but not so much the light bulbs. If someone punches a hole in their firewall to get to their nanny cam a) someone had to have enough knowledge to do that b) therefore they should have known better. So, I guess there is blame to go around, but the manufacturers can really help prevent this type of attack and it would not take a lot of effort.A lot of IoT stuff is imbedded and may or may not have password control.
I'll never forget telling my mom, when I was growing up, that I had heard that garbage men got paid a lot of money and that I thought I might become a garbage man when I grew up. She said, "YOU ARE NOT!!!"Heck, my garbage man probably makes more money than my IA and A&P.
How much some people get paid isn't necessarily a good measure of their value or worth.
I'm tired of seeing pentesters that only know how to execute some metasploit command handed to them... and having that output be their report... so I wouldn't pay most of them for that kind of crap tier service.Ahh, that era is long over. Even fast food workers get paid, and pen testing isn't as easy as flipping burgers.
You need training to do it nowadays, and a lot of it. Anyone doing it deserves a buck or thousand.
Most successful pen tests that get real data out of places are SQL injection attacks and attacks against reasonably well thought out authentication schemes. If you're learning enough to do an SQL injection attack, you definitely deserve to get paid, and paid well. Slogging through that sort of thing, sucks.
Here's a clue though: If your garbage man makes more money than your pen tester...
I'm tired of seeing pentesters that only know how to execute some metasploit command handed to them... and having that output be their report... so I wouldn't pay most of them for that kind of crap tier service.
I'll agree with the SQL injection data exfil vector, obviously, but the decent auth schemes? Too many crappy auth schemes available to focus on unless it's a targeted attack.