Academia.eduAcademia.edu

Industrialising Blackmail: Privacy Invasion Based IoT Ransomware

2021, Secure IT Systems

Ransomware (malware that threatens to lock or publish victims' assets unless a ransom is paid) has become a serious security threat, targeting individual users, companies and even governments, causing significant damage, disruption and cost. Instances of ransomware have also been observed stealing private data and blackmailing their victims. Worryingly, the prevalence of Internet of Things (IoT) devices and the massive amount of personal data that they collect have opened up another avenue of attack. The main aim of this paper is to determine whether privacy invasion based ransomware would be a viable vector for attackers to use on IoT devices. The secondary aim is to identify countermeasures that can be implemented to prevent such attacks from being used. To accomplish these aims, we examined how private data accessible via IoT devices could be obtained, processed and managed by a ransomware attacker. We identified a number of data sources on IoT devices that can be used to access private data, such as audio and video feeds. We then investigated methods to interpret such data in order to blackmail the device's owner. We then produced proof of concept malware for multiple IoT devices, including an external "collator" that manages the valuable data collected, demonstrating that an attack could be performed at scale. This research shows that attackers can use the functionality of an infected device to invade the privacy of the device's owner, as part of a ransomware attack. We have demonstrated that, given suitable infrastructure, attackers would be able to ransom users for values higher than the cost of the compromised device, as well as heavily damage the trust in the device itself, which would cause further negative impact on the device manufacturer. Finally, we highlight the need for proactive measures to deter this style of attack by applying the suggested countermeasures.

Kent Academic Repository Brierley, Calvin, Arief, Budi, Barnes, David J. and Hernandez-Castro, Julio C. (2021) Industrialising Blackmail: Privacy Invasion Based IoT Ransomware. In: Tuveri, N. and Michalas, A. and Brumley, B.B., eds. Lecture Notes in Computer Science. Secure IT Systems. 26th Nordic Conference, NordSec 2021. 13115. pp. 79-92. Springer ISBN 978-3-030-91624-4. E-ISBN 978-3-030-91625-1. Downloaded from https://kar.kent.ac.uk/92304/ The University of Kent's Academic Repository KAR The version of record is available from https://doi.org/10.1007/978-3-030-91625-1_5 This document version Author's Accepted Manuscript DOI for this version Licence for this version UNSPECIFIED Additional information Versions of research works Versions of Record If this version is the version of record, it is the same as the published version available on the publisher's web site. Cite as the published version. Author Accepted Manuscripts If this document is identified as the Author Accepted Manuscript it is the version after peer review but before type setting, copy editing or publisher branding. Cite as Surname, Initial. (Year) 'Title of article'. To be published in Title of Journal , Volume and issue numbers [peer-reviewed accepted version]. Available at: DOI or URL (Accessed: date). Enquiries If you have questions about this document contact [email protected]. Please include the URL of the record in KAR. If you believe that your, or a third party's rights have been compromised through this document please see our Take Down policy (available from https://www.kent.ac.uk/guides/kar-the-kent-academic-repository#policies). Industrialising Blackmail: Privacy Invasion Based IoT Ransomware Calvin Brierley[0000−0001−8766−822X] , Budi Arief[0000−0002−1830−1587] , David Barnes[0000−0001−6073−0951] , and Julio Hernandez-Castro[0000−0002−6432−5328] School of Computing, University of Kent, Canterbury, England {C.R.Brierley, B.Arief, D.J.Barnes, jch27}@kent.ac.uk Abstract. Ransomware (malware that threatens to lock or publish victims’ assets unless a ransom is paid) has become a serious security threat, targeting individual users, companies and even governments, causing significant damage, disruption and cost. Instances of ransomware have also been observed stealing private data and blackmailing their victims. Worryingly, the prevalence of Internet of Things (IoT) devices and the massive amount of personal data that they collect have opened up another avenue of attack. The main aim of this paper is to determine whether privacy invasion based ransomware would be a viable vector for attackers to use on IoT devices. The secondary aim is to identify countermeasures that can be implemented to prevent such attacks from being used. To accomplish these aims, we examined how private data accessible via IoT devices could be obtained, processed and managed by a ransomware attacker. We identified a number of data sources on IoT devices that can be used to access private data, such as audio and video feeds. We then investigated methods to interpret such data in order to blackmail the device’s owner. We then produced proof of concept malware for multiple IoT devices, including an external “collator” that manages the valuable data collected, demonstrating that an attack could be performed at scale. This research shows that attackers can use the functionality of an infected device to invade the privacy of the device’s owner, as part of a ransomware attack. We have demonstrated that, given suitable infrastructure, attackers would be able to ransom users for values higher than the cost of the compromised device, as well as heavily damage the trust in the device itself, which would cause further negative impact on the device manufacturer. Finally, we highlight the need for proactive measures to deter this style of attack by applying the suggested countermeasures. Keywords: Security · Privacy · IoT · Ransomware · Malware · Cloud Services · Cybercrime · Blackmail. 1 Introduction The increasing popularity of the Internet of Things (IoT) has lead to a corresponding increase in attacks on IoT devices. While IoT devices themselves are used for many different purposes – such as light bulbs, digital video recorders, 2 Calvin Brierley, Budi Arief, David Barnes, and Julio Hernandez-Castro and fridges – when infected, they are typically used to perform either Distributed Denial of Service (DDoS) attacks [2], or to mine cryptocurrency [48]. However, ransomware has also become increasingly prevalent [41, 5, 9], and its success has garnered significant interest in carrying out ransomware attacks on IoT devices. The volume and the relative insecurity of IoT devices make them a potentially profitable target for ransomware authors. To evaluate the potential threat of IoT ransomware, researchers have developed proof of concepts investigating how IoT devices could be attacked [6, 26]. However, as IoT devices rarely store files that their user may consider essential, typical crypto ransomware may not be as effective as they would be on regular personal computers. Instead, early IoT ransomware strains typically “lock” infected devices, preventing them from working correctly unless a payment is made [6]. While this method of ransom may be effective, there are a number of limitations (discussed later in this paper), which may dissuade ransomware operators from using it. Attackers are likely to explore other methods of monetising IoT-based ransomware in the future. One such method involves extracting private data from and/or using the IoT device, which can then be used to extort the user under threat of public release. In this paper, we aim to determine the viability of ransomware attack leveraging privacy invasion techniques on IoT devices, and devise countermeasures that can be implemented to prevent such attacks from being used by cybercriminals. Contributions. The key contributions of our paper are: (i) a demonstration of how attackers may identify and extract private data accessible via IoT devices to facilitate ransomware; (ii) an overview of how such an attack might be structured and managed; (iii) an identification of possible weaknesses that may be introduced by attackers when performing such an attack; (iv) a list of countermeasures that could be used to hinder or prevent such an attack. The rest of the paper is organised as follows. Section 2 covers previous privacy based ransomware attacks and IoT privacy research. Section 3 investigates data sources commonly found on IoT devices, and how they could be accessed by attackers. Section 4 describes how attackers could interpret exfiltrated data to identify private information. Section 5 shows how attackers could collate information extracted from IoT devices during a ransomware campaign. Section 6 demonstrates some of the privacy-invasion techniques on IoT devices with differing sensors and uses. Section 7 discusses countermeasures that could be used to prevent such attacks, the limitations of the current work, and further research that could be performed. Finally, Section 8 summarises our findings. 2 Background and Related Work Ransomware is class of malware that uses a number of techniques to restrict access to assets owned by users, typically requiring a payment in cryptocurrency to be made for access to be returned [34, 30]. As ransomware continues to evolve, new methods have been used to ransom victims more effectively. One of the latest trends is for ransomware operators to steal sensitive data and to threaten Industrialising Blackmail: Privacy Invasion Based IoT Ransomware 3 the owners with its release, unless a ransom demand is paid. This method is particularly effective if the stolen data is confidential or embarrassing in nature, as it could be severely damaging if made public. Multiple companies have already been impacted by this method. In February 2021, CD Projekt Red, a games development company, was subjected to a ransomware attack. As part of the ransom note, the attackers claimed to have stolen source code, employee details and accounting information, which they threatened to release if payment was not made within 48 hours [8]. After CD Projekt Red refused to pay the ransom, the source code was put up for auction [38]. It was later revealed that portions of the data were potentially being leaked online [15]. In December 2020, the Scottish Environmental Protection Agency (SEPA) was also subject to a ransomware attack, with the attackers stealing approximately 1.2GB of files. After refusing to pay the ransom, the attackers publicly released over 4,000 documents on the dark web, including emails and databases used for contracts and commercial services [45, 39]. 2.1 IoT Based Ransomware As both IoT devices and ransomware have become more popular, it is not surprising to see an increased interest in IoT based ransomware – from both security researchers and attackers. Initial attempts to produce IoT based ransomware have implemented various “locking” methods to ransom users, i.e., preventing infected devices from functioning correctly until a payment is made [6, 51, 28]. More complex types of ransomware may require persistence, which while possible, may be difficult to achieve, depending on the design of the device [7]. While these techniques may work in certain circumstances, consumer IoT devices impose two obvious limitations for successful crypto- and locker-based ransomware: replaceability (most IoT devices are designed to be relatively “cheap” when compared to traditional desktop targets – as such, users may instead opt to simply replace the device rather than pay a ransom); and lack of valuable files (IoT devices rarely contain files that are essential to the user, so crypto-based ransomware is unlikely to be as effective). However, as IoT devices are often designed to have access to data associated with their user’s personal environment, they thereby may provide a unique opportunity for attackers. In what follows, we describe how IoT devices may be used by attackers to invade the privacy of their users. 2.2 Privacy Invasion IoT devices often have direct access to sensors within a user’s home, which has lead to a significant amount of research into the privacy of data that they manage or create [42, 29, 43]. This is especially important as IoT devices are, by design, required to be connected to the Internet. Therefore, if a device is found to be exploitable, this information may be exposed to remote attackers. Previous research has investigated how attacks on IoT devices may impact users, including case studies that demonstrate the possible methods attackers 4 Calvin Brierley, Budi Arief, David Barnes, and Julio Hernandez-Castro could use to track user activity [3]. Various attacks have also been performed “in the wild”; for instance, there have been numerous instances of attackers accessing network cameras exposed to the Internet, allowing them to view video feeds inside homes and, in some cases, sell obtained “adult content” to others [47]. In one instance, an attacker used a camera’s speaker to threaten victims and demand a ransom of 50 bitcoin [1]. It is therefore straightforward to see that the natural progression of ransomware attack strategy would be to threaten to leak data belonging to victims in order to encourage payment. It may be possible for attackers to exploit IoT devices’ access to sensors – e.g., by monitoring or turning on a microphone or camera without the owner’s knowledge – in order to capture personal or potentially embarrassing data. In the next section, we will discuss the possible sources of private information that could be exploited by an attacker. 3 Data Sources Many IoT devices – such as wearables, smart toys, and medical devices – process or generate private data that their legitimate users may not want to be publicly exposed. Below, we discuss the data sources commonly found on such IoT devices, and how they could be used by a malicious attacker: – In-built Sensors. An IoT device typically uses sensors to measure aspects of its environment in order to function. Some of the most commonly available sensors are cameras (which are often used in Internet-connected security systems), microphones (which are sometimes used for communication and control) and geolocation sensors (which can be used to determine the current location of the user). – Network Data. IoT devices, by definition, must be able to connect to the Internet, allowing them to communicate with other devices and their users. However, if the device has permissions to send, receive or view any sensitive data, attackers who exploit the device will gain the same privileges. It can lead to security and privacy issues such as passive monitoring, where if the infected device acts as a gateway to the internet (e.g. a router), the attacker may be able to “sniff” the packets sent through it. The attacker may also be able to scan the internal network of the device’s local network, which could lead to the discovery of additional sources of personal information such as network accessible file storage or other vulnerable IoT devices. – Local Configuration settings. While IoT devices are less likely to contain significant amounts of user-created data, they may still store personal information that is of value. An IoT device may request information from their users during the device’s set-up stage – such as their name or email address – which is often stored within the device’s configuration settings. If the location of this information is known to the attacker, it could be extracted to facilitate communication with, or intimidate, the victim. The attacker could also scan the memory of local processes or storage for data with a recognisable structure, such as email addresses or dates, using regular expressions. Industrialising Blackmail: Privacy Invasion Based IoT Ransomware 4 5 Identifying Private Data For privacy based ransomware attacks to be successful, the attacker must first be able to extract data from IoT devices, but more importantly, identify data of value which could be used to extort their victims. For large ransomware campaigns, it is infeasible to manually search through large volumes of collected data to pick out relevant information. Instead, it would be necessary for attackers to develop methods to categorise and sift through the available data automatically and efficiently. Below, we discuss some the methods that could be used. 4.1 Malicious Use of Machine Learning IoT devices typically have access to various types of structured data, such as configuration settings, which would be relatively easy for attackers to access and interpret. However, raw data collected from IoT devices’ sensors will first need to be processed before its “value” can be determined. One approach is to use machine learning tools to automatically classify input data, drastically lowering the amount of manual intervention required by the attacker. This method could exploit two data sources commonly found on IoT devices, as shown below. Identifying Private Images with Image Recognition. Cameras are often considered as a vector to invade a user’s privacy, as if an attacker is able to gain access, they would also be able to extract images from within a victim’s home without their knowledge. However, the attacker must be able to identify which images are likely to be “valuable”. The process for selecting potentially ransomable images could be performed manually by the attacker, but it would be a time-consuming process that would not scale well. Therefore, automating this process would be desirable for the attacker. There are various different models that may assist in identifying ransom-able images, such as: – Theme/Object Recognition. If certain themes or objects are detected – such as cars, buildings, or crowds – it could indicate that the infected device is stationed outside, and are likely to produce images of “low value”. If people or objects likely to be inside, such as furniture, are detected, they will raise the potential value of the images extracted from the device. – Face Detection. Face detection could be used to confirm the presence of human victims within obtained images. If a victim is confirmed to be within the image, it could be very valuable when used in a ransom note as proof of exploitation, especially if the victim was caught in a compromising position. – Explicit Content Detection. Some online services offer explicit content detection for uploaded images/videos. A typical use case would be to prevent the upload/transmission of explicit content on “safe-for-work” platforms. An attacker could use this maliciously by scanning for explicit content taken without the victim’s consent, which could then be used to ransom the victim. 6 Calvin Brierley, Budi Arief, David Barnes, and Julio Hernandez-Castro Identifying and Transcribing Private Conversations. The possibility of eavesdropping via vulnerable IoT devices has been explored in previous research [50, 13] but not in the context of ransomware. For this method, the attacker aims to transcribe using speech-to-text engines private conversations held by the victim. Once the audio has been transcribed, the attacker can use automated methods to search for keywords, such as those related to potentially exploitable activity. 4.2 Network-Based Privacy Invasion There are several techniques that attackers could use to extract private information by interacting with the local network using compromised IoT devices. Intercepting Browsed Domains. If an attacker is able to intercept a user’s Internet traffic via an infected device (such as a router), they may be able to extract sensitive information about the user’s browsing habits. In this case, the attacker may intercept traffic passing through the device and extract domain names of any websites that the user visits from various protocols, such as DNS [33], HTTP [14] or HTTPS [10]. The websites can then be compared against a list of domains associated with illegal or compromising activities. If a match is found, details could then be logged to a Command and Control (C&C) server. Intercepting Web Content. It may also be possible to intercept the content of visited web pages, and the content of websites with known structures could be read to extract important information, such as video titles, usernames or personal information. For HTTP traffic, this is relatively simple, as communication is typically performed in plaintext, allowing attackers to access any transferred content. Increasingly, web traffic is using HTTPS, which encrypts the communication between the client and server when transmitting web content [11, 18]. However, it could still be possible to gain access to encrypted content using “man in the middle” (MitM) attacks, such as SSLStrip, which allows attackers to intercept and modify victim’s web requests to bypass HTTPS encryption [32]. This allows the attacker to catch inattentive users unaware and extract plaintext communication from typically encrypted traffic. A similar style of attack has been previously implemented by the IoT malware VPNFilter to extract usernames, passwords and logins [24]. Identifying Device Locations via WiFi Positioning. The location of the infected device could be used to determine the address of the user. However, in order to ascertain the location of the infected device, the attacker must make use of the available data sources. Some devices need to be aware of their current position in order to function correctly, such as fitness trackers, which may need to periodically acquire the current location of the device to track a user’s running activity and route. Ideally, this type of information would be acquired using a Global Positioning System (GPS), however, most IoT devices are unlikely to implement GPS sensors, especially if they are not designed to be moved often. Industrialising Blackmail: Privacy Invasion Based IoT Ransomware 7 Online WiFi Positioning systems allow users to triangulate their current position by comparing a scan of local WiFi signals to a list of known signal locations stored in an online database. The accuracy of this measurement is dependant on various factors, such as the number of detected signals, or matches found in the service providers’ database. If an infected device has wireless capabilities, attackers may be able to perform a scan to discover the SSIDs, MAC addresses and signal strengths of nearby routers, which can then be sent to the C&C server. The attacker could then upload it to an online service such as Mozilla Location Services or the Google Cloud platform to obtain an estimate of the device’s location [22, 36]. Internal Network Structure. Infected devices could provide attackers with access to other devices on the local network which would be otherwise inaccessible from the Internet. The attackers would then be able to scan or attack previously inaccessible devices, potentially gaining access to further private data. 4.3 Data Processing Once data has been successfully extracted from the device, it must then be processed to identify any potentially ransomable information. For network data, which is typically well structured, this is a computationally inexpensive process. Less structured data, such as that which is collected from device sensors, can be much more difficult to interpret. While the use of machine learning can significantly reduce the amount of manual effort required to identify ransomable data, there are some logistical issues that attackers may need to overcome before it can be considered viable. Many IoT devices are unlikely to have the hardware to run the required machine learning models, and IoT devices’ internal memory is often limited to only what is required to run the system, which may prevent collected data from being locally stored. To circumvent these issues, attackers may instead process, classify, and store images collected by infected devices on remote systems. For example, attackers could choose to process collected data on their own server using publicly available models. However, this may not scale well, and a large ransomware campaign may cause immense network strain on the attacker’s infrastructure, which could be quite costly to maintain. Therefore, it may become necessary to outsource processing to a third party, such as cloud services. 5 Data Collation The privacy invasion methods we have discussed present possible avenues for ransomware authors to extract private information from IoT devices. However, using the extracted information to perform a ransomware attack in a large campaign presents multiple challenges, such as how to manage the collected data, how to generate an effective ransom note, and how the information could be published should the ransom not be paid. In this section, we will examine how these challenges may be approached by future attackers. 8 5.1 Calvin Brierley, Budi Arief, David Barnes, and Julio Hernandez-Castro Data Management As demonstrated in the previous section, there are various methods attackers may use to extract private data from victims. However, the collected data must be correctly managed for threats of publication to be effective. As part of this research, we created a basic proof of concept collator that allows the attacker to manage data collected from various compromised devices. An abstract view of the collator’s operating structure can be found in Appendix A.1 (Figure 4). The collator exposes an API for infected devices to interact with, allowing various types of private data to be uploaded, such as images, audio recordings or browsing history. Once data is received by the collator, it can be processed using the appropriate method, such as those described in Section 4.3. Each data point is associated with the infected device’s MAC address, as it is an easily available unique identifier that is unlikely to change, even through reboots. The attacker can then access the data processed by the collator via a web interface, shown in Appendix A.2 (Figure 5a). Additional features, such as highlighting particularly interesting collected information, such as valuble words in audio transcripts or private browsing activity, could also be implemented. 5.2 The Ransom Once adequate personal information has been collected, a ransom note demanding payment can be generated and displayed to the victim. If any contact information has been extracted from the device, such as an email address, the ransom note could be sent directly to the user. Alternatively, the attacker could attempt to display the ransom note by hijacking communication methods native to the device, such as attached screens or network services [6]. Typically for ransomware attacks, the ransom note would likely contain a description as to what has occurred, a timer, and instructions for paying the ransom. However, unlike ransomware that prevents users from accessing their resources, privacy invasion ransomware threatens to release private information unless a ransom is paid before a certain time. Therefore, including select private information in the ransom note that has been obtained throughout the collection stage may provide sufficient evidence to force the victim into making a payment. By “personalising” ransom notes in this manner, it may lead less technicallyaware victims to conclude that the attack was a manual effort made to target them specifically, which may further encourage payment. 5.3 Publishing Private Information As part of a privacy-based ransomware attack, the victim is threatened with the release of their private information unless a payment is made. Private information could be publicised in a number of ways, varying in complexity. Centralised Publication. One method attackers could use to publicise information is to create a centralised “leaking platform” available via a publicly accessible website. Any victims that do not make a payment would have their Industrialising Blackmail: Privacy Invasion Based IoT Ransomware 9 information published to the website for anyone to view. As part of the ransom note, victims would be encouraged to visit the website for further information or to facilitate payment, acting as form of advertisement. Previous victims’ private information would be visible to the “new users”, which would serve as proof that the attacker will follow through with threats to publicise. “Direct” Publication. Attackers could use information previously gathered about the victim to determine who would be most impacted by its release, such as friends, family or co-workers. For example, if the attacker identifies the victim’s social media accounts during the information gathering stage, they may be able to enumerate people that the victim associates with. They could then attempt to use the same social media platforms to distribute the victim’s private information, such as through the use of automated chat-bots. If this technique is used alongside the aforementioned leaking platform method of distribution, these messages could also serve to advertise it. While this approach could drastically increase the impact of publicising information, it may also increase the complexity of the ransomware, as the attacker would need to automate account identification, enumeration and distribution for supported social media platforms. 5.4 Scale of Operation Previously, such malware would require significant manual oversight. The automation steps outlined above, such as the use of machine learning and managing large volumes of data with a collator, would allow attacks to be performed without needing costly manual labour. 6 Proof of Concepts To test the viability of privacy-based ransomware on IoT devices, we attempted to extract private information from a number of different device types, then collated it such that it could be used to ransom a user. For an attack to succeed, it is assumed that the attacker is able to access the vulnerable service such that they are able to exploit it remotely. 6.1 Netgear R6250 Router As routers often act as the main gateway for Internet traffic in a network, we determined that they would be ideal for testing the network data extraction techniques discussed in Section 4.2. We chose to use a Netgear R6250 router for testing, which could be exploited using a previously discovered command injection vulnerability [31, 37]. Domain Extraction. To test extracting data from network activity, we created a program to sniff local packets using the libpcap library [25], which was crosscompiled to be compatible with the target router’s architecture. The program 10 Calvin Brierley, Budi Arief, David Barnes, and Julio Hernandez-Castro intercepts any packets destined for port 80 or 443 (the default ports for HTTP and HTTPS), extracts visited domain names and compares them against a hardcoded list. If a match is found, an API call is made to the collator, which records the visited domain, a timestamp of the visit, and the device’s MAC address. We created a network consisting of the R6250 router, a phone and a desktop computer. After exploiting the router, we uploaded and ran the application, then browsed various websites using the connected devices. The application successfully identified and reported domains visited using both HTTP and HTTPS to the collator, which the “attacker” was then able to view. For this proof of concept, we did not implement interpretation of any web content, but this could theoretically be implemented by a dedicated attacker in the future. WiFi-Positioning. While the router did exhibit wireless capabilities, we were not able to scan for nearby SSIDs and MAC addresses. This may be due to limitations imposed by the expected usage of the device. However, we were able to view the local MAC address and SSID of the router, which could then be used to query a WiFi-Positioning service. While only one “signal” would be available for reference, which may reduce the result’s accuracy, it should still allow attackers to make an approximate guess of the user’s location, as WiFi signals have a limited range within which they can be detected. Configuration Extraction. During the investigation of the device, we attempted to identify where user settings were being stored. We found that user settings were being saved to the second partition on the flash chip, which was accessible via the /dev/mtdblock1 file. By using a simple grep command, we were able to view sensitive configuration data that was stored in plain text, as shown in Figure 1. Ransom Note. Previous research has shown that it was possible to redirect DNS requests made to a compromised router [6]. Using this technique, an attacker could redirect users browsing the internet to a webpage containing a ransom note. In addition to traditional ransomware elements, such as a timer and a demand for payment, it could also include select personal information Fig. 1: Extracting configuration data Industrialising Blackmail: Privacy Invasion Based IoT Ransomware (a) IBM demo recognising keywords 11 (b) Ransom note hijacking the screen Fig. 2: Attacking the Yealink SIP-T38g collected by the malware to act as “proof of compromise”. An example of how the ransom note could be presented is shown in Figure 5b in Appendix A.2. 6.2 Yealink SIP-T38g Phone The SIP-T38g is an Internet connected IP phone with a built in LCD screen. As the device is designed for direct communication, we used it to test the audio extraction techniques described in Section 4.1. Private Conversation Extraction. The first step for extracting private conversations is to obtain audio from the device when a call is made. While we could have potentially recorded audio directly from the device’s microphone, we instead chose to extract call data from the device’s network activity, as this would allow us to hear both sides of the conversation. To do this, we used VoIPong [12, 4], an open source tool that allows the interception and decoding of VoIP calls. We modified, configured, and cross-compiled a custom version of VoIPong such that it would be able to run natively on the phone. We then exploited the device using a command injection vulnerability present in its web interface, allowing us to upload and run the application, which would then save calls to a pre-defined folder. Unfortunately, the phone had limited storage, with only a collective 60 megabytes of space across all the available partitions. To overcome this, we hosted a Network File System (NFS) share on the collator server, which the phone could then mount and modify as if it were a local directory. The collator then periodically checked for “file close” events within the share folder such that, when recordings were finished, conversations could be transcribed. When the audio is ready to be processed, it is passed to a speech-to-text service for transcription. Initially, we attempted to use a local instance of Mozilla’s “deepspeech” engine with a pre-trained model and scorer [35]. However, audio extracted from the intercepted calls were sampled at a rate of 8kHz, also known as “narrowband”, while the Mozilla model expected a sample rate of 16kHz, which lead to unsatisfactory performance. While a new model could be trained to understand narrowband audio, it was considered to be out of scope for this paper. Instead, we tested various online services to transcribe the call accurately. 12 Calvin Brierley, Budi Arief, David Barnes, and Julio Hernandez-Castro The Google Cloud Services API [23] successfully transcribed conversations with higher accuracy. We also tested using an “IBM Watson Speech to Text” demo [27] (which included support for narrowband audio), to successfully extract key components of the conversation. This demo also featured keyword identification, which could be used by attackers to listen for subjects of interest, as shown in Figure 2a. Finally, we were able to upload the call to YouTube after converting it to a video format. Approximately ten minutes after the initial upload, captions had been automatically added, and could be scraped from the source of the video’s webpage. Given that YouTube provides this feature for free, it could potentially be used by attackers to avoid paying for the use of cloud services. After the conversation has been transcribed, the text and audio file can be inserted into the collator. The attacker can then search for “valuable” words in the text, such as “password” or “address”, as potential blackmail material. This entire process can be fully automated without giving the victim any indication that they are being monitored, until the ransom note is triggered. Ransom Note. As with the R6250 router, the attacker could hijack the device’s web server to display a ransom note, including “proof of compromise” such as recordings of the victim. However, as the web server is unlikely to be accessed in day to day usage, they could also hijack the connected screen [6], as shown in Figure 2b. It could be possible to expand to other communication media, such as using the speakers to play back recorded conversations, but this is unlikely to be unnecessary if the previous approaches are successful. 6.3 DCS-932L Camera The DCS-932L is an Internet connected camera designed by D-Link. We selected this device to test WiFi-positioning based location extraction, and image based privacy invasion. WiFi-Positioning. During our testing, we found that when the camera uses WiFi to connect to the Internet, it was possible to scan for nearby SSIDs and MAC addresses. We used a previously discovered buffer overflow exploit [44] to upload and run a WiFi scanning application, which returned information on three nearby access points. By uploading the access point information to Google Cloud Services we were able to determine our location within 15 meters. Image extraction. As the camera is intended to be used for surveillance, this device was ideal for testing image based privacy invasion techniques. We found that during normal operation, the device would provide a snapshot from the camera to the user when they visited the web server. After infecting the device, we were able to make direct requests to this snapshot at /image.jpg on the local webserver. We uploaded an application that would save, encode and transfer images to the collator, which would then use Google Cloud services [16] to label recognised objects, locations and activities [21]. As shown in Figure 3, the platform was able to recognise and correctly label objects within the extracted images. If required, other services such as face detection [20] or explicit content detection [19] could also be applied with minimal changes. Industrialising Blackmail: Privacy Invasion Based IoT Ransomware 13 Fig. 3: Labelling images extracted from an infected DCS-932L Camera Table 1: Privacy invasion methods used for each device Device Domain Extraction Netgear R6250 3 Yealink SIP-T38g D-Link DCS-932L - Config Audio Image Location Extraction Transcription Recognition Identification 3 Partial1 3 3 3 Ransom Note. The DCS-932L camera did not contain many methods to communicate with the user. As most interaction with the device was performed via the web service (which displays the current view from the camera), the attacker could use the same method as described in Section 6.1 to hijack the webserver to display a ransom note. 6.4 Summary In this section, we demonstrated practical examples of how private information could be extracted from various IoT devices of differing types: router-based information, audio data and image data. We have also shown how the collected data could feasibly be analysed, organised, and used by an attacker to facilitate privacy invasion based IoT ransomware. Table 1 provides a summary of the six privacy invasion methods that can be used, namely Domain Extraction, Config Extraction, Audio Transcription, Image Recognition, and Location Identification. Additionally, Table 1 also shows how these methods fare when applied against the three IoT devices we included in our proof of concepts. 1 Unfortunately, we were unable to fully test the WiFi-positioning method for the R6250 router, as it was only powered when performing our analysis, preventing its MAC address from being detected or stored by any WiFi-positioning services. 14 Calvin Brierley, Budi Arief, David Barnes, and Julio Hernandez-Castro While using IoT devices to invade the privacy of users has been theorised in the past, it has rarely been explored as a practical option for the average attacker. Here, we have shown several examples as to how such privacy invasions could potentially be monetised using ransomware, and how such attacks could be implemented at scale. 7 Discussion Privacy-based IoT ransomware could have very negative impacts on users and their perception of IoT devices. Therefore, it is important to investigate potential countermeasures. Additionally, some limitations of our current work is discussed, along with several ideas for future research. 7.1 Countermeasures There are a number of countermeasures that could be implemented by device developers, cloud providers, or IoT device users, as discussed below. Domain Interception Protections. As shown in Section 6.1, it is possible for an attacker to extract the domains of websites that victims visit. While users can protect themselves by using privacy tools such as VPNs or Tor [46], it is unrealistic to suggest every user use such tools just in case one of their devices is infected with such malware. Alternative methods to secure communication between users and web services must instead be implemented by website hosts. As HTTP traffic is designed to be unencrypted by default and requires the domain to be included within the headers, it is very simple to extract information from any traffic generated by the victim. By using HTTPS, the user can limit the information that an attacker can extract through the use of encryption. However, as mentioned in Sections 4.2 and 4.2, it is still possible to extract the visited domain or perform downgrade attacks. These attacks can be prevented through the use of: – Encrypted Server Name Indication (ESNI). While the contents of HTTPS communication is encrypted, the domain can be extracted from the SNI portion of HTTPS handshake packets. Encrypting this portion of the header using a compatible DNS server will prevent the attacker from being able to discern the visited domain [10]. Encrypted Client Hello (ECH), a more recent protection mechanism, could also be used to prevent domain extraction in the future [40]. – HTTP Strict Transport Security (HSTS). In Section 4.2, HTTPS downgrade attacks were highlighted as a possible method for intercepting the contents of web service communications. HSTS allows web hosts to force clients to only use HTTPS when visiting their domain, preventing such downgrade attacks. Some of the most popular browsers even contain hard-coded lists of HTTPS-only websites by default [17]. Industrialising Blackmail: Privacy Invasion Based IoT Ransomware 15 Malicious Activity Detection in Cloud Services. Currently, attackers may find it difficult to natively implement software on infected IoT devices that can process data collected from its sensors, such as object recognition on captured images. While this may change in the future – either through more cost-efficient machine learning algorithms, or more resources being made available on the average IoT device – attackers are currently more likely to rely on outside processing, such as online cloud services. As such, attackers may need to use these cloud services at scale in order to adequately manage the throughput of infected devices. Cloud providers may be able to detect such malicious behaviour through the measuring of various metrics, such as: – An account using multiple IP addresses to call the API, which may imply that functions are being called directly from infected IoT devices. – “Privacy related” functions being called excessively or in certain sequences, such as facial or object recognition followed by nudity detection. – Whether a trial account is being used, as it may imply that the attacker is aiming to reduce costs by using free processing without payment. If the cloud service provider is able to identify a user as malicious, banning or shutting down the associated account may delay the operation of the malware campaign. A more extreme approach may be to prevent accounts from accessing certain functionality commonly associated with privacy based ransomware until the owner has provided sufficient proof of identity. Data Devaluation. If a victim is threatened with the public release of their private data, there are very few steps that they can take to reduce the impact, as they do not have any method to remove the stolen data from the attacker’s storage. However, it may be possible to reduce the trustworthiness of information attained by the attackers by providing false data to the C&C server, thus reducing the overall value of files that are released. This may also waste the attacker’s time and resources, as they would need to receive, store and analyse any data sent by the fake “victim”. Updating. While this has often been mentioned, it is worth re-enforcing the principle that applying updates and patches, and changing default passwords, are important steps in securing IoT devices against possible compromise. 7.2 Limitations and Further Work Countermeasure Creation. Due in part to the variety in the design of IoT devices, the creation of universal countermeasures is not a simple process. While the countermeasures discussed above can be effective, it could be argued that some are only applicable in certain scenarios. This work highlights the need for further research as to how IoT devices can be designed to limit the effectiveness of privacy-invasion based malware. 16 Calvin Brierley, Budi Arief, David Barnes, and Julio Hernandez-Castro Native Malicious Machine Learning. Currently, the identification and management of data presents a significant hurdle that attackers must overcome in order to create effective privacy invasion based ransomware. The infrastructure required to transfer, store, and process collected data may dissuade malicious actors from attempting to perform these types of attacks. However, as the hardware present in IoT devices continues to improve, and machine learning techniques become increasingly efficient, it may eventually be possible to run machine learning tools natively on infected devices rather than outsourcing the data processing. It may be beneficial to investigate the viability of such native tools, as it may heavily reduce the costs when running a large malware campaign. Psychological Effects. Unlike other malware, which typically targets the restriction of information, privacy based ransomware instead threatens to expose it, which has the potential of being very distressing for victims. A study of the psychological effects of this malware could reveal the non-monetary costs of infection, such as how public perception may change concerning IoT devices, should this affect a significant number of devices. ARP Poisoning. In Section 4.2 we described techniques that intercept network traffic to extract private information. Typically, these require the infected device to be positioned such that it is a “man in the middle” (MitM), with the user’s network activity passing through it. Routers are perfectly positioned for this type of attack. However, devices that do not hold this position, such as network cameras, will only be able to examine their own network activity. A possible way that infected IoT devices could use is an Address Resolution Protocol (ARP) poisoning attack, which would allow attackers to insert themselves in-between the network gateway and another target [49]. If IoT devices are shown to be capable of performing such attacks, they may be able to use MitM attacks on other devices on the same network without acting as the gateway. 8 Conclusions In this paper we investigated how IoT devices could be used to facilitate privacyinvasion based ransomware targeting consumers. To do this, we first examined various data sources commonly found on IoT devices and how they could be leveraged by attackers to extract data. We then proposed methods attackers could use to identify and process that data to extract sensitive user information for the purpose of performing a ransomware attack. We discussed how automated machine learning and data collation could be used to manage data collected from vulnerable IoT devices to perform ransomware attacks at a large scale. We showed how some of the privacy-invasion techniques could be realised on three IoT devices with differing sensors and data sources. During the demonstration, we were able to extract various mock “private data” and send it to a remote data collation service, such that an attacker could easily track and process it. We then discussed potential countermeasures that could be implemented by users or IoT developers to prevent or reduce the impact of such attacks, before finally identifying the work’s limitations and opportunities for future research. Industrialising Blackmail: Privacy Invasion Based IoT Ransomware A A.1 17 Appendices Data Collator Structure Fig. 4: Data Collator Structure A.2 Collator and Ransom Note (a) IoT Collator summarising information (b) An example ransom note, including collected from a router proof of compromise Fig. 5: Collator and example ransom note 18 Calvin Brierley, Budi Arief, David Barnes, and Julio Hernandez-Castro References 1. abcNEWS: Terrifying video of family’s hacked ring camera system (2019), https://abcnews.go.com/GMA/News/video/terrifying-video-familyshacked-ring-camera-system-67704081/ [Accessed: June 2021] 2. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., Kallitsis, M., et al.: Understanding the mirai botnet. In: 26th {USENIX} security symposium ({USENIX} Security 17). pp. 1093–1110 (2017) 3. Arias, O., Wurm, J., Hoang, K., Jin, Y.: Privacy and security in internet of things and wearable devices. IEEE Transactions on Multi-Scale Computing Systems 1(2), 99–109 (2015) 4. Balaban, M.: Voipong user’s manual (2005), http://www.enderunix.org/ voipong/manual/ [Accessed: April 2021] 5. Bitdefender: Security 2020 consumer threat landscape report (2021), https: //www.bitdefender.com/files/News/CaseStudies/study/395/Bitdefender2020-Consumer-Threat-Landscape-Report.pdf [Accessed: July 2021] 6. Brierley, C., Pont, J., Arief, B., Barnes, D.J., Hernandez-Castro, J.: Paperw8: an iot bricking ransomware proof of concept. In: Proceedings of the 15th International Conference on Availability, Reliability and Security. pp. 1–10 (2020) 7. Brierley, C., Pont, J., Arief, B., Barnes, D.J., Hernandez-Castro, J.: Persistence in linux-based iot malware. In: Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings 25. pp. 3–19. Springer (2021) 8. @CDPROJEKTRED: Important update (2021), https://twitter.com/ CDPROJEKTRED/status/1359048125403590660 [Accessed: June 2021] 9. Center, I.C.C.: Internet crime report 2020 (2021), https://www.ic3.gov/Media/ PDF/AnnualReport/2020_IC3Report.pdf [Accessed: July 2021] 10. Chai, Z., Ghafari, A., Houmansadr, A.: On the importance of encrypted-sni ({ESNI}) to censorship circumvention. In: 9th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 19) (2019) 11. Encrypt, L.: Let’s encrypt stats, https://letsencrypt.org/stats/ [Accessed: July 2021] 12. EnderUNIX: Voipong (2011), https://github.com/EnderUNIX/VoIPong [Accessed: July 2021] 13. Fabian Bräunlein, L.F.: Smart spies: Alexa and google home expose users to vishing and eavesdropping (2019), https://www.srlabs.de/bites/smart-spies [Accessed: July 2021] 14. Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., BernersLee, T.: Rfc2616: Hypertext transfer protocol–http/1.1 (1999) 15. Goodin, D.: Cd projekt red does an about-face, says ransomware crooks are leaking data (2021), https://arstechnica.com/gadgets/2021/06/cd-projektred-says-its-data-is-likely-circulating-online-after-ransom-attack/ [Accessed: June 2021] 16. Google: Cloud computing services — google cloud, https://cloud.google.com/ [Accessed: July 2021] 17. Google: Http strict transport security, https://www.chromium.org/hsts/ [Accessed: July 2021] 18. Google: Https encryption on the web, https://transparencyreport.google.com/ https/overview [Accessed: July 2021] Industrialising Blackmail: Privacy Invasion Based IoT Ransomware 19 19. Google: Detect explicit content (safesearch) (2021), https://cloud.google.com/ vision/docs/detecting-safe-search [Accessed: August 2021] 20. Google: Detect faces (2021), https://cloud.google.com/vision/docs/ detecting-faces [Accessed: August 2021] 21. Google: Detect labels (2021), https://cloud.google.com/vision/docs/labels [Accessed: August 2021] 22. Google: Geolocation api (2021), https://developers.google.com/maps/ documentation/geolocation/overview [Accessed: July 2021] 23. Google: Method: speech.recognize (2021), https://cloud.google.com/speechto-text/docs/reference/rest/v1/speech/recognize [Accessed: July 2021] 24. Group, T.I.: Vpnfilter update - vpnfilter exploits endpoints, targets new devices (2018), https://blog.talosintelligence.com/2018/06/vpnfilterupdate.html [Accessed: July 2021] 25. Group, T.T.: Tcpdump/libcap public repository (2021), https://www.tcpdump. org/ [Accessed: July 2021] 26. Hron, M.: The fresh smell of ransomed coffee (2020), https://decoded.avast.io/ martinhron/the-fresh-smell-of-ransomed-coffee/ [Accessed: July 2021] 27. IBM: Speech to text demo, https://speech-to-text-demo.ng.bluemix.net/ [Accessed: July 2021] 28. Ilascu, I.: Hacker used ransomware to lock victims in their iot chastity belt (2021), https://www.bleepingcomputer.com/news/security/hacker-usedransomware-to-lock-victims-in-their-iot-chastity-belt/ [Accessed: June 2021] 29. Kalbo, N., Mirsky, Y., Shabtai, A., Elovici, Y.: The security of ip-based video surveillance systems. Sensors 20(17), 4806 (2020) 30. Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E.: Cutting the gordian knot: A look under the hood of ransomware attacks. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. pp. 3–24. Springer (2015) 31. Land, J.: Multiple netgear routers are vulnerable to arbitrary command injection (2016), https://www.kb.cert.org/vuls/id/582384/ [Accessed: July 2021] 32. Marlinspike, M.: New tricks for defeating ssl in practice. Black Hat DC 2 (2009) 33. Mockapetris, P.: Domain names - concepts and facilities (1987), https: //datatracker.ietf.org/doc/html/rfc1034\#section-5.3.2 [Accessed: July 2021] 34. Mohurle, S., Patil, M.: A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science 8(5), 1938–1940 (2017) 35. Morais, R.: Deepspeech 0.9.3 (2020), https://github.com/mozilla/DeepSpeech/ releases/tag/v0.9.3 [Accessed: July 2021] 36. Mozilla: Geolocate (2020), https://ichnaea.readthedocs.io/en/latest/api/ geolocate.html [Accessed: July 2021] 37. NIST: Cve-2016-6277 detail (2017), https://nvd.nist.gov/vuln/detail/CVE2016-6277 [Accessed: July 2021] 38. Orland, K.: Cd projekt red source code reportedly sells for millions in dark web auction [updated] (2021), https://arstechnica.com/gaming/2021/02/cd-projektred-source-code-reportedly-sells-for-millions-in-dark-web-auction/ [Accessed: June 2021] 39. Palmer, D.: Hackers publish thousands of files after government agency refuses to pay ransom (2021), https://www.zdnet.com/article/hackers-publish- 20 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. Calvin Brierley, Budi Arief, David Barnes, and Julio Hernandez-Castro thousands-of-files-after-government-agency-refuses-to-pay-ransom/ [Accessed: July 2021] Patton, C.: Good-bye esni, hello ech! (2020), https://blog.cloudflare.com/ encrypted-client-hello/ [Accessed: July 2021] SonicWall: Sonicwall cyber threat report (2021), https://www.sonicwall.com/ medialibrary/en/white-paper/2021-cyber-threat-report.pdf [Accessed: July 2021] Sun, K., Chen, C., Zhang, X.: ”alexa, stop spying on me!” speech privacy protection against voice assistants. In: Proceedings of the 18th Conference on Embedded Networked Sensor Systems. pp. 298–311 (2020) Surbatovich, M., Aljuraidan, J., Bauer, L., Das, A., Jia, L.: Some recipes can do more than spoil your appetite: Analyzing the security and privacy risks of ifttt recipes. In: Proceedings of the 26th International Conference on World Wide Web. pp. 1501–1510 (2017) tacnetsol: Cve-2019-10999 (2019), https://github.com/tacnetsol/CVE-201910999 [Accessed: July 2021] Tidy, J.: Cyber criminals publish more than 4,000 stolen sepa files (2021), https: //www.bbc.co.uk/news/uk-scotland-55757884 [Accessed: June 2021] Tor: Tor project — anonymity online, www.torproject.org/ [Accessed: July 2021] TrendMicro: Exposed video streams: How hackers abuse surveillance cameras (2018), https://www.trendmicro.com/vinfo/us/security/news/internet-ofthings/exposed-video-streams-how-hackers-abuse-surveillance-cameras [Accessed: June 2021] TrendMicro: Over 200,000 mikrotik routers compromised in cryptojacking campaign (2018), https://www.trendmicro.com/vinfo/nl/security/ news/cybercrime-and-digital-threats/over-200-000-mikrotik-routerscompromised-in-cryptojacking-campaign [Accessed: July 2021] Whalen, S., Engle, S., Romeo, D.: An introduction to arp spoofing. Node99 [Online Document] (2001), https://www.cavalcantetreinamentos.com.br/ blog/material-sala-de-aula/Seguranca em Redes/Outros/arp_spoofing_ slides.pdf Zhang, N., Mi, X., Feng, X., Wang, X., Tian, Y., Qian, F.: Understanding and mitigating the security risks of voice-controlled third-party skills on amazon alexa and google home. arXiv preprint arXiv:1805.01525 (2018) Zhang, Y., Sun, Z., Yang, L., Li, Z., Zeng, Q., He, Y., Zhang, X.: A11 your plcs belong to me: Ics ransomware is realistic. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). pp. 502–509. IEEE (2020)