Posts Tagged Cloud security

The Security Risk of Wireless Alarm Systems: Lessons from Recent Detroit Burglaries

 

In recent years, technological advancements have brought about significant improvements in home security systems, making it easier than ever to protect our homes and loved ones. Wireless alarm systems, in particular, have gained popularity for their convenience and accessibility. However, as the saying goes, “with great power comes great responsibility.” Recent high-end burglaries in Detroit, specifically in Oakland County, have highlighted the security risks associated with wireless alarm systems. In this article, we will delve into these security concerns and explore the lessons we can learn from these unfortunate incidents.

The Detroit Burglaries: A Wake-Up Call

Since September of 2023, the city of Detroit has been rocked by a series of high-end burglaries that sent shockwaves through the community. Millions of dollars’ worth of valuables were stolen from homes across Oakland County, leaving homeowners shocked and law enforcement agencies scrambling to find answers. Two articles, one from ClickOnDetroit 1 and the other from Fox2Detroit 2, shed light on the situation, revealing that these heists were linked to a sophisticated Chilean crime ring.

While the details of these burglaries are indeed alarming, what’s equally unsettling is the fact that several of the targeted homes had wireless alarm systems in place. This raises a critical question: are these systems providing the level of security homeowners believe they are?

The Vulnerabilities of Wireless Alarm Systems

Wireless alarm systems have gained popularity because of their ease of installation, convenience, and scalability. However, they are not without their vulnerabilities, as the recent Detroit burglaries have shown. Here are some key security risks associated with wireless alarm systems:

  1. Signal Jamming: Wireless alarm systems rely on radio frequency signals to communicate between sensors and the control panel. Sophisticated burglars can use signal jammers to disrupt these signals, rendering the alarms useless.  These jammers are inexpensive and readily available, with a short learning curve on how to use them.  In some cases, just broadcasting with a small handheld radio on a specific frequency can disable a wireless door or window sensor.
  2. Hacking: In an era of interconnected devices, wireless alarm systems can be vulnerable to hacking attempts. Cybercriminals can gain access to your system and disarm it remotely, leaving your home exposed.
  3. Device Vulnerabilities: The devices themselves, such as door/window sensors and motion detectors, can be physically tampered with or disabled, making it easier for burglars to breach your home undetected.
  4. Limited Range: Wireless alarm systems typically have a limited range, making it essential to position sensors and repeaters strategically. If not done correctly, it can create blind spots that burglars can exploit.
  5. False Alarms: Wireless alarm systems are also prone to false alarms, which can lead to complacency on the part of homeowners or law enforcement agencies, potentially jeopardizing your home’s security.

Lessons Learned and Steps to Enhance Security

The recent Detroit burglaries serve as a stark reminder that even the most advanced security systems have their limitations. However, this doesn’t mean you should abandon wireless alarm systems altogether. Instead, consider the following steps to enhance your home’s security:

  1. Professional Installation: Opt for professional installation to ensure your wireless alarm system is set up correctly and securely.  Where possible, have sensors connected via hard wire, not wireless.  It may be more expensive initially, but is immune to signal jamming and the sensors don’t need battery replacements.
  2. Encryption: Choose a system with robust encryption to protect against hacking attempts.  Minimum encryption should be AES128 or better.
  3. Backup Power: Invest in a backup power supply to keep your system operational during power outages.  Backup power should last a minimum of 48-hours.
  4. Regular Updates: Keep your system’s firmware and software up to date to patch vulnerabilities.
  5. Supplement with Physical Security: Enhance your system with physical security measures like sturdy locks, reinforced doors, and security cameras.  Recorded video should be local to the camera (SD card) and a reliable video recorder on premises and/or in the cloud.
  6. Monitoring Services: Consider subscribing to a professional monitoring service that can alert authorities in case of an intrusion.  This is also beneficial for things like fire alarm monitoring, where they central station can dispatch the Fire Department to your house even if you’re not home.

Conclusion

Wireless alarm systems can be a valuable addition to your home security arsenal when used correctly and in conjunction with other security measures. However, it’s essential to be aware of their vulnerabilities and take steps to mitigate the risks. The recent high-end burglaries in Detroit remind us that staying informed and proactive about our home security is the key to protecting our homes and loved ones in an increasingly connected world.

As part of our services, Protective Resources performs dozens of Risk Assessments every year, sometimes for high-end executive residences of Fortune 500 corporations and other entities.    Many of these systems utilize wireless sensors or wireless internet connections for signaling or alarm notification.  While this is convenient, it opens up a potential attack surface for gaining entry to the premises.

References:

  1. “Millions of Dollars Lost in High-End Burglaries Across Oakland County” – ClickOnDetroit
  2. “High-End Michigan Burglaries Tied to Chilean Crime Ring Prompts Police Task Force” – Fox2Detroit

Posted in: Security Technology, Vulnerability Analysis

Leave a Comment (0) →

Another installment of (in)secure Cloud storage

Chinchero Airport, Peru | EJAtlas

We know we sound like a broken record when we tell our clients “If you don’t own your server, you don’t own your data. Don’t put anything in the cloud you don’t want potentially exposed to the public.”, but time after time we show examples of why we keep repeating this mantra.

What Happened:

A major data leak by Securitas that affected several Latin American airports and other related companies was discovered by a cybersecurity firm called SafetyDetectives. In late January a team discovered that an Amazon S3 bucket had been left unsecured and exposed to public access, and contained over 1 million files relating to airport and security personnel.

Securitas, a large, well known multinational security company that has been in business for almost a century, has not made any public statements around the incident as of this posting. This isn’t the first time Securitas has had cybersecurity issues. In 2017 the Securitas CEO Alf Göransson had his personal identification stolen at the end of March, when someone applied for a loan in his name. The Stockholm District Court then declared Göransson bankrupt without informing the CEO prior to its decision.

The Breach (From SafetyDetectives briefing):

Securitas left its Amazon S3 bucket open and accessible, without any authentication procedures in place. The misconfigured bucket has therefore exposed almost 1.5 million files, equating to about 3TB of data.

The bucket’s exposed information included employee Personally Identifying Information and sensitive company data of at least four airports in Colombia and Peru: El Dorado International Airport (Bogota D.C, COL), Alfonso Bonilla Aragón International Airport (Valle del Cauca, COL), José María Córdova International Airport (Antioquia, COL), and Aeropuerto Internacional Jorge Chávez (Lima, PE). As mentioned, unobserved files may have exposed other airports and places throughout Colombia, the rest of Latin America, or even the rest of the world.

They observed two main datasets containing the information of Securitas employees and airport employees: photos of ID cards and other unmarked photos.

Photos of ID cards featured on the bucket. There were an estimated 1 million files of this type on the Securitas misconfigured bucket. These files revealed the personal information of employees at the four aforementioned airports that are using Securitas’ services.

Photos of ID cards reveal several forms of employee Personally Identifying Information, including:

  • Full names, incl. first names and surnames
  • Photos of employees
  • Occupations
  • National ID Number

What Was Leaked?

Other unmarked photos featured among the bucket’s content too. There were about 300,000 files of this type. These photos leaked the data of airports, airport employees, and associated companies.

Specifically, these files exposed employees’ personal data, sensitive client data (airports), and the sensitive data of associated companies, such as airlines. Exposed data includes:

  • Photos of employees
  • Photos of planes
  • Photos of fueling lines
  • Photos of luggage being loaded/unloaded

What Was Leaked?

 In addition to the information mentioned above, the two primary datasets analyzed on the bucket (photos of ID cards and other unmarked photos) contained Exchangeable Image File Format (EXIF) data that exposed specific information related to each photo.   Exposed EXIF data includes:

  • Device models (of the cameras used)
  • GPS locations of photos, incl. coordinates and GPS maps
  • Time & date of photos

What Was Leaked?

What it Means to Us

It may be some time before there is any assessment of the extent of damage the data breach, but this obviously serves as an example of how careless data management can cause serious security implications for your firm or those of your clients.   In evaluating software application strategies for our clients, we always ask these simple questions:

  1. What is the criticality if this information if it is leaked to the public?
  2. Can the solution be self-hosted on the Client’s own private network?
  3. Does it really NEED to be a cloud application?
  4. If so, how can we mitigate the potential damage if there is a breach?

Additional measures like a Type I or Type II SOC report are helpful, but likely wouldn’t have prevented the Securitas data breach discussed above.  Regular and ongoing security audits, along with well defined and enforced data management and security policies and procedures are the only real defense against these kinds of mishaps.

This won’t be the last time we see this either, as the Cloud becomes more and more integrated into corporate IT strategies, it will happen again, and again, and again.

 

 

 

Posted in: Security Consulting, Security Technology

Leave a Comment (0) →