X-Force Red, IBM Security’s team of hackers, is hired by a variety of companies to find and help fix vulnerabilities exposing their most important assets to potential attacks. One sector that is increasingly looking into the security of their products is internet of things (IoT) manufacturers that build and sell IoT technologies such as smart home kits, cameras, appliances, televisions, security systems and even smart light bulbs.

Some IoT devices, while “smarter” than their nonconnected brethren, are also known to have more security deficiencies, such as default passwords that cannot be changed, privacy concerns and a lack of encryption. These issues can make IoT devices easier for attackers to access remotely, which is why device manufacturers seek ways to test them for potential risk. In a recent analysis, X-Force Red performed a hardware test on a consumer IoT device, which led to us discovering some interesting issues that could have a detrimental effect on businesses that sell everyday devices and services.

During testing, my team and I often look for vulnerabilities in a device or system that might expose it to an attack from an unknown adversary. The attacker may be a member of a criminal gang, a lone wolf or even a nation-state actor, and can often be well-equipped, experienced and determined to compromise their target. However, what if an attacker does not fit into any of those categories and, instead, is a seemingly legitimate customer? That is a very plausible scenario nowadays.

Vicious Tinkerers in Customer Clothing

Let’s take, for example, a scenario that begins with a manufacturer’s customers purchasing and installing a device that provided a certain service. We will assume here that the manufacturer offering the service did install controls to prevent its customers from getting additional features if they did not pay for them. For example, maybe the customer got a set top box — a device that converts video content to analogue or digital TV signals — that provided conditional access to only the channels the customer had paid for.

Yet in this scenario, and in many others, customers may look to obtain more capabilities without necessarily going through the service provider or paying the extras. They start experimenting with the device, trying to find a way to gain an advantage. After all, the device itself is in their possession, giving them ample time to play around with it in the privacy of their own homes.

By tinkering with a device that’s designed to enable customers to enjoy the services they pay for, the manufacturer’s customers who might abuse their access to it can significantly elevate the risk of an attack against the company. It’s a threat that could be scaled and that the manufacturer may not even consider.

Based on my hardware testing engagements, manufacturers and online service providers rarely consider a customer manipulating a device to be a scalable threat, nor worth worrying about. In other words, they may believe that, most times, the number of customers who are likely to grab a screwdriver and start pulling their device apart is so minimal that there’s really no point in spending time, money or effort trying to prevent it.

But that belief is a misconception. Customer tinkering can be just as dangerous as any other threat and can lead to a compromise of a company’s entire environment.

The problem with that tiny percentage of customers who do pick up the screwdriver and start pulling the device’s hardware apart is that, if they are successful and manage to find some weakness in the device, such as a crypto key or network credentials, it may be used not only to further compromise the manufacturer’s direct offering to them, but also provide access to the company’s entire back-end network.

In many cases, it could potentially enable those enterprising customers to start illicitly selling the original company’s service at a reduced price to an entirely new user base by creating cloned, “fake” hardware and taking a market chunk out of the legitimate vendor’s client base. Even worse, the customer may decide to publish the device’s “secret sauce” on the internet, unbeknownst to the manufacturer, and could cause considerable losses to their business.

Unfortunately, modifying devices has become very common. Whether seeking free access, more features or something that could potentially be more dangerous, end users often look for loopholes that could benefit them. All the while, the device’s provider’s back end bears the extra load, risk of exposure and costs.

So, what can manufacturers do to prevent their customers from creating vulnerabilities while maintaining their paying customers’ satisfaction?

IoT Security From the Ground Up

Security of IoT devices of all types should start from the ground up, using secure by design methodologies. By understanding the potential threats and selecting the right components before the work on building the product even starts, manufacturers can choose and utilize security features specifically designed to reduce the attack surface, minimize exposure and lower overall risk of future abuse. Features such as secure boot and cryptographic coprocessing can make a difference when properly implemented, but these types of controls are nearly impossible to add at a later date, such as after a compromise.

Performing hardware testing against devices, before and after they are released to the market, can also help minimize risk. Manual hardware testing entails ethical hackers, such as our X-Force Red team, pulling apart devices using the same tools, techniques, practices and mindset that customers and attackers might use to compromise them. We do that to find and help fix vulnerabilities that could possibly enable any of those attempts to succeed.

Focusing on IoT threats, X-Force Red recently opened its four global IoT testing Red Labs, one of which we are celebrating in Austin, Texas, this week. Manufacturers can ship their devices to any of our labs for testing. The labs provide a secure facility for our hackers to reverse engineer and assess devices using specialized equipment and skill sets.

To learn more about our X-Force Red Labs, watch the video on our IoT testing page. To learn more about our X-Force Red Penetration Testing Services, which includes hardware hacking, read this white paper.

More from Data Protection

Cybersecurity 101: What is Attack Surface Management?

There were over 4,100 publicly disclosed data breaches in 2022, exposing about 22 billion records. Criminals can use stolen data for identity theft, financial fraud or to launch ransomware attacks. While these threats loom large on the horizon, attack surface management (ASM) seeks to combat them. ASM is a cybersecurity approach that continuously monitors an organization’s IT infrastructure to identify and remediate potential points of attack. Here’s how it can give your organization an edge. Understanding Attack Surface Management Here…

Six Ways to Secure Your Organization on a Smaller Budget

My LinkedIn feed has been filled with connections announcing they have been laid off and are looking for work. While it seems that no industry has been spared from uncertainty, my feed suggests tech has been hit the hardest. Headlines confirm my anecdotal experience. Many companies must now protect their systems from more sophisticated threats with fewer resources — both human and technical. Cobalt’s 2022 The State of Pentesting Report found that 90% of short-staffed teams are struggling to monitor…

The Importance of Modern-Day Data Security Platforms

Data is the backbone of businesses and companies everywhere. Data can range from intellectual property to critical business plans to personal health information or even money itself. At the end of the day, businesses are looking to grow revenue, innovate, and operationalize but to do that, they must ensure that they leverage their data first because of how important and valuable it is to their organization. No matter the industry, the need to protect sensitive and personal data should be…

Meeting Today’s Complex Data Privacy Challenges

Pop quiz: Who is responsible for compliance and data privacy in an organization? Is it a) the security department, b) the IT department, c) the legal department, d) the compliance group or e) all of the above? If you answered "all of the above," you are well-versed in the complex world of compliance and data privacy! While compliance is a complex topic, the patchwork of regulations imposed by countries, regions, states and industries further compounds it. This complexity has turned…