Security

Release the hounds! Securing datacenters may soon need sniffer dogs

Nothing else can detect attackers with implants designed to foil physical security


Sniffer dogs may soon become a useful means of improving physical security in datacenters, as increasing numbers of people are adopting implants like NFC chips that have the potential to enable novel attacks on access control tools.

So claims Len Noe, tech evangelist at identity management vendor CyberArk. Noe told The Register he has ten implants – passive devices that are observable with a full body X-ray, but invisible to most security scanners.

Noe explained he's acquired access cards used to enter controlled premises, cloned them in his implants, and successfully walked into buildings by just waving his hands over card readers.

Unless staff are vigilant enough to notice he didn't use a card, his entrance appears to be a normal, boring, instance of an RFID being scanned.

But like most electronics, Noe's implants include a chemical called triphenylphosphine oxide that has a bunch of uses, including flame retardation, and does find its way into the manufacturing of electronics. Sniffer dogs have thus been trained to sniff out the chemical to detect electronic devices.

Noe thinks hounds are therefore currently the only reliable means of finding humans with implants that could be used to clone ID cards.

He thinks dogs should be considered because attackers who access datacenters using implants would probably walk away scot-free. Noe told The Register that datacenter staff would probably notice an implant-packing attacker before they access sensitive areas, but would then struggle to find grounds for prosecution because implants aren't easily detectable – and even if they were the information they contain is considered medical data and is therefore subject to privacy laws in many jurisdictions.

Noe thinks plenty of other attacks could be mounted using implants. He outlined a scenario in which a phishing mail is stored in an NFC implant – an attacker gains access to a victim's smartphone, uploads the mail, and sends it. Hardy anyone checks their Sent mail file, he noted, and mails sent from known good corporate inboxes are less likely to be considered a risk.

Happily, Noe believes that only 50,000 to 100,000 people worldwide have had electronics implanted in their bodies, and perhaps one percent of those have the tech or the capability to use them for evil – rather than applications like keyless entry to a Tesla.

But he told The Register he's aware of red teams adopting the tech, with some success, and pointed out that cyber-crims are always looking for new tools. He also feels that the issue of implants being used as a weapon deserves some consideration as brain-computer interfaces like Neuralink evolve.

In the here and now, Noe explained that tools to defeat implants are already available in the form of multi-factor authentication. He suggests that datacenters require a combination of a card swipe and a keyed code, or biometrics, to defeat implant-packing attackers.

And maybe consider going to the dogs, too – in the best possible way. ®

Send us news
35 Comments

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happened

Security biz Verkada to pay $3M penalty under deal that also enforces infosec upgrade

Allowed access to 150K cameras, some in sensitive spots, but has been done for spamming

Security boom is over, with over a third of CISOs reporting flat or falling budgets

Good news? Security is still getting a growing part of IT budget

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

White House thinks it's time to fix the insecure glue of the internet: Yup, BGP

Better late than never

Microsoft security tools questioned for treating employees as threats

Cracked Labs examines how workplace surveillance turns workers into suspects

CrowdStrike's meltdown didn't dent its market dominance … yet

Total revenue for Q2 grew 32 percent

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

WHO-backed meta-study finds no evidence that cellphone radiation causes brain cancer

The signal may not rot your mind, we can't say the same for the content

Watchdog warns FBI is sloppy on secure data storage and destruction

National security data up for grabs, Office of the Inspector General finds

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks