Vedere Labs reveals the riskiest connected devices in networks

Daniel dos Santos, Head of Security Research, Forescout Vedere Labs

Forescout’s Vedere Labs unveiled research into the riskiest IT, IoT, OT and IoMT devices across enterprise networks. The study uncovers what makes them risky and how to mitigate cyber risks affiliated with them. The growing number and diversity of connected devices in every industry presents challenges for firms to manage the risks they are exposed to.

What were the findings of the research?

Most organisations host a combination of interconnected IT, OT and IoT devices in their networks that has increased their attack surface. According to a report by the Ponemon Institute, 65% of responding companies say that IoT/OT devices are one of the least secured parts of their networks, while 50% say that attacks against these devices have increased.

IT security practitioners in 88% of those companies have IoT devices connected to the internet, 56% have OT devices connected to the internet and 51% have the OT network connected to the IT network. Threat actors are well aware of these trends.

Forescout recently reported on how ransomware groups have started massively targeting devices such as NAS, VoIP and hypervisors. Not surprisingly, most of these devices were among the riskiest identified in the 2020 Enterprise of Things Security Report.

Many of the device types observed among the riskiest in 2020 remain in the list, such as networking equipment, VoIP, IP cameras and programmable logic controllers (PLCs). However, new entries such as hypervisors and human machine interfaces (HMIs) are representative of trends including critical vulnerabilities and increased OT connectivity.

What are 2022’s riskiest connected devices?

Using Forescout’s scoring methodology, Vedere Labs identified the five riskiest devices in four device categories: IT, IoT, OT and IoMT.

  • IT: Router, computer, server, wireless access point, and hypervisor
  • IoT: IP camera, VoIP, video conferencing, ATM, and printer
  • OT: PLC, HMI, uninterruptible power supply (UPS), environmental monitoring, and building automation controller
  • IoMT: DICOM workstation, nuclear medicine system, imaging, picture archiving and communications system (PACS), and patient monitor

How can organisations mitigate risk?

“We have seen two recurring themes in Vedere Labs’ research, which this report reinforces. First, attack surfaces are growing quickly due to more devices being connected to enterprise networks, and second, threat actors are increasingly able to leverage these devices to achieve their goals,” said Daniel dos Santos, head of security research at Vedere Labs.

“The attack surface now encompasses IT, IoT and OT in almost every organisation across the globe, with the addition of IoMT in healthcare. It is not enough to focus defences on risky devices in one category, as attackers will leverage devices in different categories to carry out attacks. Vedere Labs has demonstrated this with R4IoT, demonstrating how an attack that starts with an IP camera (IoT), can move to a workstation (IT) and disable PLCs (OT).”

Forescout advises organisations to undertake proper risk assessment to understand how their attack surface is growing. Granular classification information including device type, vendor, model, and firmware version are required for accurate assessment.

Once this assessment is complete, organisations should mitigate risk with automated controls that are not reliant on security agents, and that apply to the whole enterprise, instead of silos like the IT network, the OT network, or specific types of IoT devices.

Once the risk assessment is complete, organisations need to mitigate risk with automated controls that do not rely only on security agents and that apply to the whole enterprise, instead of silos like the IT network, the OT network, or specific types of IoT devices.

Forescout Continuum enables these controls by accelerating the deployment of dynamic network segmentation across the digital terrain while automating policy enforcement by enabling countermeasures to mitigate threats, incidents and compliance gaps.