Saved transcript

Teenage Hackers Have Cyber Weapons as Powerful as Nation States | VICE: Cyberwar | Blueprint

Channel: Blueprint

A tsunami of insecure devices floods

[music] the internet.

>> Venture capital is just injecting

massive amounts of money into the IoT

craze.

>> Teenage hackers take down the web's

biggest sites. They have access to the

same tools as nation states.

>> With millions of new smart devices

[music] coming online daily,

>> we're very nervous about the impact this

has on the internet as a whole.

>> The threat to all of us is now real.

>> It can't be unfixable and immortal.

From wireless printers to smart baby

monitors to Bluetooth enabled coffee

makers, 5 million [music] new devices

are hooked up to the net every single

day. controlled by your smartphone or

computer. These products make up the

internet of things or IoT and with them

comes the promise of unbridled

convenience. What people don't realize

is 80% of them have weak to no security.

In essence, super hackable. So, I don't

really trust the internet [music] of

things because of the risks it poses to

me personally, but also something like a

stove could be hacked by hacker and burn

down your house or it could be used to

get into your [music] network cuz has

bad security or it could be part of some

sort of zombie botnet that takes out one

of [music] your favorite websites. So,

the question is, are we setting

ourselves up for the internet

apocalypse? I can describe how messed up

the internet of things is, but the IoT

threat was really made tangible during

the second season premiere of the USA

[music] network drama Mr. robot. A woman

comes home to find all her smart devices

taken over by hackers. Lots of people

think this is sensational, [music] but

it's not. With the explosion of IoT, the

threat of your own tech being turned

[music] against you is no longer science

fiction. Is the added convenience really

worth the risks? To find out, I'm in the

Bay Area to meet Ben Actis, a legit

engineer who gets paid to hack IoT

devices for companies.

>> So, we could do we could do a couple

ways. We have a screwdriver here. We

could pop this or if you want to just go

completely Hannibal Lectar, we could.

>> This is getting a weird

>> Yeah, this is getting pretty weird

pretty quick.

>> Poor bastard is getting the cut job.

>> Yeah.

>> Tada.

>> Well done.

>> So, the idea of this little IoT cloud

pet is children will talk to it, sing to

it. The problem with cloud pets was all

these recordings that was sent up to

their web API completely public anyone

could grab which is bad.

>> That's a creepy thing.

>> It's super creepy. Creepy thing,

>> right? Yeah. It It's sketchy.

>> Doesn't it kind of remind you of some

weird like Soviet Cold War era.

>> Oh, the spy on the little

>> It's like a very much a spy thing.

You're like, you know what's inside your

teddy bear?

>> Yeah, that. But that's what we're moving

to, right? Well, all these devices that

I mean, look at this teddy bear is a

regular teddy bear before cloud pets,

right? So someone was like, "Oh, I have

a brilliant idea. We'll make put a mic

in it. We'll make a mobile app." And

they just shoved it in the bear's

bottom.

>> And would you say there's a big

difference between, you know, what they

put inside a teddy bear and what they

put inside a stove top or

>> No, there's not a big difference. And

that's the terrifying thing. If someone

can reverse engineer how your stove

works, right? Yeah.

>> And wants to disable fail safes, right?

Or provide false data, that's a big

issue. Actis and I went to a furniture

store to see some of the IoT devices

currently on the market.

>> So, obviously we're in a furniture

store. Mhm.

>> I mean, how many different types of

devices you're seeing have smart

capabilities?

>> Tons. Uh, okay. There's dishwashers in

here. There's IoT, stove tops, ovens.

>> I mean, what's to stop a bunch of kids?

It's almost like the 2017 version of

egging a house.

>> Yeah.

>> From like just screwing with somebody's

stove from across the street. That's

completely valid. And also the I think

the scariest thing is there's no way of

checking integrity or someone has messed

with it. So even if you can clean a a

phone or a PC, right? How am I going to

scan if my oven's firmware's integrity

is okay? So far, the most visible damage

caused by the internet of things has

come from botn nets. Put simply, an IoT

botnet is a cabal of hacked devices, all

infected with the same malware and

controlled in unison by a single hacker.

With a botnet, an asalent can program

those hacked devices [music] to launch a

distributed denial of service or DDoS

attack that floods their victim with so

much junk internet traffic, it forces

them offline. A massive international

cyber attack that took down some of the

biggest websites on the internet. The

sites were out for several hours this

morning in the eastern part of the

United States. By the afternoon, it had

spread to Europe. [music]

And among the websites were Twitter,

Amazon, Netflix, and Reddit.

This attack from September of 2016 was

unleashed by hundreds of thousands of

Internet of Things devices hijacked to

form the biggest botnet ever assembled.

The botnet named Mariah demonstrated the

risks of IoT. But it wasn't the first

time Mariah had surfaced. A month

earlier, the same IoT botnet had been

used in a DOS attack on tech reporter

Brian Krebs as retribution for his

exposing the identity of a pair of

Israeli cyber criminals.

So, the botnet [music] that attacked

you, what was in the zombie computer

army that was directed your way?

>> Uh, I think it was about 250,000 devices

uh in the bot that that hit my site. The

vast majority of those were digital

video recorders, DVRs, and security

cameras.

>> So, just stuff taken over on the

internet.

>> Exactly. The threat from poorly designed

Internet of Things is probably the

biggest cyber security threat we have

facing us. Most of these devices are

running Linux versions that were 10, 15

[music] years old.

>> In an article from January of 2017,

Krebs lays out how Marai, the largest

botnet of all time, was not the weapon

of some powerful nation state, but was

likely being controlled by a couple of

teenage hackers in New Jersey.

People ask me, you know, what what what

do you think of the chances that

somebody's going to take out the lights,

you know, take out the power grid or

something in a cyber war? And I always

say, first time we see that happen, it's

not going to be a nation state. It's

going to be some bored idiot savant kid

in his parents' basement who gets access

to some place he's not supposed to have

access to and says, "Wonder what happens

if I push this button?"

>> Boom.

>> They have access to the same tools as

nation states today. and they have fewer

reasons not to use them. The individuals

involved in this type of activity were

raised by the internet,

which explains a lot. These guys are

starting to do criminal activity when

they're 12, 13, and 14 years old. These

kids get drawn into these online

communities. They get involved in

identity theft. They get involved in

credit card theft. And left to their own

devices, I believe [music] these forums

generally turn people into sociopaths.

The Maride botnet literally took out

Twitter for a time, but these teenagers

didn't build it just to take out

Netflix. So why did they create such a

powerful cyber weapon? For that answer,

I have to [music] enter the dank

subculture of the online video game

Minecraft.

I'm in the Bay Area looking into the

threat [music] posed by the millions of

vulnerable IoT devices coming online

daily. The dangers of the internet of

things first made international

headlines when the Marai botnet took

down a bunch of the web's biggest sites.

Launched by a couple of underage

hackers, the attack proved teenagers in

New Jersey can wield cyber [music]

weapons as powerful as nation states.

Funny enough though, that weapon wasn't

made to take out websites. It was

initially made to force gamers offline.

>> So, let me get this straight. The thing

that took out parts of the internet,

>> Yeah. This massive DOS attack

>> was essentially incubated to attack

Minecraft servers.

>> Yeah, that's basically its main purpose.

>> This is Robert Quell. [music] At the

mature age of 12, he and his friends

built a Minecraft server, allowing them

to play the popular video game together

online.

What started as a hobby became a

business, and soon strangers [music]

were paying to play Minecraft on

Robert's network. Then they started

getting dodosed by an early version of

the Marai botnet. So you had these bad

Minecraft servers which would attack

other ones and gain a competitive edge

in the market. Right.

>> So the ones basically that would be

making lots of money. They'd shut down

other ones that they were competing

against so that all those players would

then go over to the other server.

>> That's basically how it works. Exactly.

>> The hackers directed the Marai botnet to

knock Robert's server offline.

Frustrated clients [music] who couldn't

access the game would leave Robert's

server and sign on with the Marai

makers. But Robert wasn't cool with

that. So we started a new company that

provided Minecraft servers protection

against these attacks.

>> So you came [music] up with a DOS

mitigation platform yourself,

>> right? So basically,

>> how old were you into this?

>> I was like 14 years old.

>> Yeah.

>> You were 14 years old when you started

doing this.

>> Yeah, definitely. We we had we needed to

do it. Like

>> I was editing houses when I was 14

making DOS mitigation.

>> Yeah.

>> And are you still doing this business?

>> Yeah, we still we still uh sell it as a

service today. like um

>> and you're raking in thousands.

>> Yeah, it it's very lucrative. [laughter]

>> And how old are you now?

>> I'm 19.

>> So the people going after you the same

age as you. So it's kind of this

adversarial

>> dark versus light kind of weird.

>> Yeah, Minecraft's making a lot of really

skilled programmers.

>> So the internet of things is making us

vulnerable to teenage hackers using botn

nets. But are IoT botnets something

governments would ever use? Like a lot

of things in life, I turn to Google for

the answer.

And to learn how big a threat DOS really

is, I'm meeting Damen Menure, Google's

expert [music] on DOS defense.

Now, coming from you and the perspective

of Google, what are the major concerns

surrounding DOSS attacks and botn nets

and IoT?

>> From Google's perspective, we're large

enough that we think we can probably

absorb everything, but we're very

nervous about the impact this has on the

internet as a whole. Um, you know, we

want people to be able to trust that the

internet is always there, that it's

accessible. We want small sites to be

able to exist. Um, thus attacks are

largely used as a method of extortion.

It's it's a financial difficulty for a

small site to survive. And so, we're a

little bit concerned about the risk of

DOSS attacks disrupting the free flow of

information on the internet.

>> I mean, I've heard that DOSS attacks, a

really great one, could quote unquote

take out the internet. It's somewhat

unlikely that a DOSS attack will

intentionally take out the internet.

That said, there can be accidents that

take out portions of the internet.

>> Have you ever seen any evidence of

nation states using DOSS attacks?

>> There was a case in uh this is probably

2012 where there was an attack called

robot that used compromised servers and

it was largely used to attack US banks.

So, financial institutions in the US. uh

this was later attributed by the US

government to the country of Iran and

probably other countries will realize

that this is an an opportunity for them

and do the same.

>> What's the big fear for you going

forward?

>> IoT is sort of changing the game because

now you have even more devices but

they're not managed at all and this is

affecting security on the internet. You

know recently there was a case of an

internet connected dishwasher. I was

trying to figure out why would you need

your dishwasher to be connected to the

internet? like what what benefit do you

get from that and this had some

vulnerability? Well, the user isn't

going to realize that that even has an

internet connection or you know this

need to be patched and so it's never

going to be updated.

I agree with Damian. Do we really need

Wi-Fi enabled dishwashers? Even so, the

internet of things is exploding and it's

not going [music] away. And if the only

thing we really need to worry about is

botnetss and DOS attacks, it's

manageable. But it's not. In fact, I

found other IoT threats that are far

more insidious and way more personal.

This is San Francisco, where I'm looking

for answers on the threats posed by the

Internet of Things. So far, the

high-profile victims of IoT are major

websites like Netflix and Twitter, taken

offline by an IoT botnet in a DOS

attack. But the truth is, you don't need

to be a multi-billion dollar Silicon

Valley Goliath to fear the rise of IoT.

The issue with the whole IoT world and

what's freaky and scary is that there's

the great unknown out there.

>> Morgan Marque is a cyber security

legend, plain and simple. He's also an

expert in how acronym agencies around

the world use cyber weapons.

>> Do you think IoT has made all of us more

susceptible to nation state offensive

actions?

>> More vulnerable to anybody, right? I

mean, you're maybe more vulnerable to

angry kids running Minecraft servers. Is

the internet of things making us less

secure? I mean, the answer is almost

definitely. But I guess a further

question is, do we care? You're probably

not thinking about security when you're

like, I want that bomb smart TV. You

just want to watch the game with your

friends while you eat hot wings. We all

need to start thinking about security

because if you're going to have a smart

lock on your front door, the reality is

it's more than possible to hack and then

physically enter your house [music] or

to use those same IoT locks as a virtual

gateway into your network, then move to

your mobile phone or computer or tablet

[music] and gain access to your entire

life. One of the things that personally

worries me, right, is that it has become

cheap enough to produce tiny computers

to control all manner of devices from

Barbie dolls to televisions to watches

to fitness monitors to light bulbs. Um,

teddy bears.

>> Teddy bears, right? I want as few

remotely controllable listening devices

around me in my house as possible. So if

everything from like a teddy bear to my

fridge is being produced in a way that

is insecure, I mean whose responsibility

is it?

>> Who is at fault here? Or who should

carry the liability? And that's a loaded

word, right? Because liability suggests

law and money um

>> payouts

>> and payouts, right? And and you know the

technology industry isn't that into the

idea of software liability because you

know we'll stifle innovation. It it it

looks as though we might possibly be

moving towards an era where we need

someone to be culpable, you know, if if

the insecurity of devices causes

widespread problems. But it's really

important that we fix the obvious

problems in these technologies before

they're widely deployed because by the

time I need that heart monitor, I'm

like, I I would like it to be incredibly

difficult to mess with.

>> Morgan's not the only one who would like

to see better security for the internet

of things. It's already a huge issue for

US corporations, losing hundreds of

millions every year to IoT breaches.

Justin Fear used to work with US

intelligence [music]

extensively. Nowadays, he's a director

for Dark Trace, a security firm on the

front lines of IoT security. So, first

thing I ask a customer how many devices

they expect to see on their network. Um,

and on 100% of the time, they

underestimated by almost 15 to 20%. And

of those underestimated devices, it's

typically IoT devices. all of the TVs in

the conference rooms, the uh

thermostats, the vending machines, etc.

So, for instance, we have a client here

uh had a fingerprint scanner, and what

happened was that scanner all of a

sudden became internet exposed. We then

started to see unusual activity between

the scanner and the database server that

keeps all the fingerprints.

>> What kind of target was this?

>> I I can't say what industry they were

in. Uh but it was a highly secure

facility. And when it comes to IoT, you

have anything that can be exploited and

owned.

>> I mean, if there's a a camera in

something, can you own the camera and

then

>> Absolutely. Yeah. We actually in one of

our clients found um one of their video

conferencing systems. They turned the

microphone on and recorded uh the calls

for about 2 weeks. Um and this was

actually in the board of directors

conference room. So, probably the most

sensitive discussions within the

company. I mean, how many more devices

are just popped up on networks, period?

>> Hundreds of thousands of millions. I

mean, if you look at the current climate

right now, venture capital is just

injecting massive amounts of money into

the IoT craze. I'd say every connected

device on your network is a potential

doorway into your company and your

network. I think if you wanted to

foreshadow and look into the future,

we'll look at ransomware. It's been

wildly successful. I kind of think that

the two are going to converge. I think

we're going to move from the virtual

world to the physical world and that's

kind of scary and eventually somebody's

going to find a way to lock you out of

your house until you pay a ransom.

>> I think part of the problem in terms of

making people understand just how

insecure all these devices are is that

they think that these wild examples

aren't possible,

>> right?

>> Um,

>> but they totally are.

>> I would say anything you've seen on TV

is actually possible. Having your

company's secrets stolen or board

meetings spied on is the antithesis of

convenience promised by the internet of

things. Are there any fixes to these

problems? You might think I'm headed to

more tech wizzes in California for the

[music] solutions, but instead I found

some of the answers in the pastures of

Rhode Island.

Like it or not, the internet of things

is making us all more connected. [music]

And that also means that with the added

convenience of IoT comes serious risks.

What do you think should be done with

all these devices lying around that

[music] the fix is device manufacturers

need to ensure that their devices have

at least basic security and also a way

to automatically patch themselves

[music] so that if a security flaw is

detected in the future that they can fix

that flaw.

>> We have a tremendous amount of of

hardware makers that are just pushing

out hardware and letting somebody else

design the software. They tend to have

very very poorly written software

[music] powering the devices.

>> Brian Krebs and Damen Venture see the

solution lying with the manufacturers.

But Justin Fear of Dark Trace believes

the answer is with machine learning and

artificial intelligence [music] using

algorithms to monitor the flow of data

on your network.

>> So unfortunately what we've been doing

for the last 5 years is just not going

to work anymore. Uh which is really why

I think companies need to start adopting

new technology. So the only answer to

all this is really machine learning, AI.

>> Yeah. I I mean I I hate saying it

because you know it's it's a buzz word

that's being thrown around quite a bit

but there is a lot of power there and

that's why technology like machine

learning is just absolutely required in

order to detect these [music] sort of

things.

>> Justin fear isn't the only one who

thinks our future is in the hands of the

machines. Dan Gear is possibly the

world's most respected voice in cyber

security. Period. The Central

Intelligence Agency tapped [music] him

to be the head of information security

for their tech firm, and he IDed the

threat posed by the Internet of Things

over a decade ago. I met with him at his

horse farm in Rhode Island, a setting as

disconnected from the world of smart

devices as you can pretty much imagine.

>> Having algorithms to protect you from

algorithms is the future, I suspect. I'd

rather have an analog circuit breaker

than a

digital one. In the year 2000, there was

a big to-do about whether when the clock

struck

>> Y2K,

>> Y2K. When the clock struck midnight,

would the elevator stop running or the

planes fall out of the sky or whatever.

I remember quite vividly the head of the

water department in New York said, "We

don't have a problem. We still have

valves and we know where they are." Can

imagine if it was a bad thing, somebody

would be out climbing into a hole with a

big ass wrench and cranking a a valve

opener shut. Um, the ability to do that

is, I think, a

a prudent requirement for

going over to a dependence on the

internet of things. We certainly will

see it, I think, that uh on a day-to-day

basis, it will make life much better.

Um, if it ever comes completely apart,

it'll make life much worse. Do you think

it's the internet of too many damn

things at this point?

>> Not yet. It's going to be. If you want

me to pick something that I view as

somewhat scariest, the vehicle-tovehicle

communication for the autodriving cars

that would allow them to stack up

thicker on the highway. And as such, you

get a free, if you want to call it that,

free expansion of roadway capacity.

Think about it. It's just irresistible.

Yet at the same time, that all works

until the day it doesn't.

>> Nothing comes for free. So, what is all

this convenience costing us? I asked Dan

what we're giving up as our world

becomes more interconnected and complex.

>> You remember the thing about complexity

is that because risk is is proportional

to dependence,

you're only at risk of things you depend

on. Thing about complexity is it hides

dependencies. If you put a device on a

network, I think you have to make a

choice. And I only think there are two

alternatives. One is it has to have a

remote management interface so that can

be modified, [music] turned off,

upgraded, something that's one option.

Can be reached, you know where it is.

You can fix it. Or if it can't be

reached or it can't be fixed, it can't

live forever. It has to have a finite

lifetime.

>> So what you're saying is the IoT devices

that are being built today, you think

that they should be built in order to

die at some point?

It can't be unfixable [music]

and immortal.

The two of those together are [music]

anathema.

In our quest for convenience, we've

created an insecure future with teenage

hackers just as dangerous as powerful

nation states. Dan gear is right. We

need to rethink how these IoT devices

are being built. But without pressure,

manufacturers will never be motivated to

care about security. The pressure can

come from consumers or it can come from

government. Either way, one thing's for

sure. Until something changes, [music]

the risks to all of us are only going to

get worse.

[music]