Sepio Systems Launches Solution to Protect against Rogue Hardware Cyberattacks

Illustration: Bigstock

Sepio Systems has announced the introduction of a software solution that offers mitigation of hardware-based cyberattacks.

The advanced mitigation capabilities protect against manipulated peripherals, transparent network devices, and firmware vulnerabilities, the company said in a release.

Sepio's solution has been deployed in over 20 mid to large banks, insurance, and telecom companies in the US, Singapore, Brazil, and Israel. The current install base secures over 600,000 workstations and network ports.

Rogue device cyberattacks are rapidly growing as demonstrated by recent reports of European banks losing tens of millions of dollars after hackers implanted hardware attack tools that compromised the secured infrastructure, the company adds.

“These attacks are just the ‘tip of the iceberg’ as most remain undisclosed,” said Yossi Appleboum, CEO of Sepio Systems. “In many cases, hitting an organization is as simple as replacing a trusted peripheral with a manipulated one. For example, we discovered multiple Raspberry Pi computer modules, which include wireless connectivity, implanted in keyboards that were used for exfiltration attacks. The implant was emulating keyboard keystrokes to infect the workstation and steal data and was running undetected before Sepio’s RDM was deployed.”

In another incident, an off-the-shelf network router was used for infiltrating a Tier 1 bank. This tiny device was plugged in-line between a printer and the enterprise network, allowing covert remote access into the bank’s IT systems. Sepio’s software was able to trace this rogue device based on its physical fingerprint.

“Manipulated devices, intentionally used by insiders or socially engineered employees, are causing significant damages. We also witness an increasing number of penetrated uncontrolled supply chains that deliver infected equipment,” said Appleboum. “While companies were focused on their software cyber risks, they overlooked the threat coming from their hardware. Users can not install unregulated software on a corporate computer but can easily connect an uncontrolled hardware accessory.”

 

 

img
Rare-earth elements between the United States of America and the People's Republic of China
The Eastern seas after Afghanistan: the UK and Australia come to the rescue of the United States in a clumsy way
The failure of the great games in Afghanistan from the 19th century to the present day
Russia, Turkey and United Arab Emirates. The intelligence services organize and investigate