Archives: Resources

Securing Data Centers from Cellular, RF and Wireless Intrusion Threats

Join our CTO, Brett Walkenhorst, Ph.D., to learn more about securing your Data Center from Cellular, RF, and Wireless Intrusion threats.

Watch the webinar to learn about the latest data exfiltration techniques and different types of wireless vulnerabilities threatening Data Center security.

In the webinar we cover Data Exfiltration techniques such as:

Rogue Wi-Fi access points and data ex-fil devices

Rogue cameras

Bluetooth-based data harvesting devices

Cellular voice, data and video ex-fil devices, which can bridge physical networks

Industrial Control System jammers, blockers and signal interfering devices

Any one of these threats can impact system stability, deny access to or steal data from applications, or compromise the integrity of the cloud infrastructure.

Data exfiltration via a rogue wireless device is a clear and present danger, yet goes largely unmonitored until a breach occurs, and then it is too late. Due to the nature of RF, there is no cable, no obvious connection, and so the threat often remains unseen by physical security.

Dr. Walkenhorst will also cover Data Exfiltration prevention techniques including:

Geofencing Data Centers to Detect and Alert on intruding wireless devices

Enforcing a No Cell Phone Policy or Using a Nuanced Wireless Device Policy

Detecting Data Exfiltration by Cellular, Bluetooth, BLE, Wi-Fi or IoT devices

Locating Rogue Devices: Non-authorized RF/wireless devices, networks & hotspots

Speaker:

Dr. Brett Walkenhorst, CTO at Bastille and former Director of the Software Defined Radio Lab at Georgia Tech

Cell Phone Spyware and Vulnerabilities Update

SPYWARE AND USB CABLES

Cell Phone Spyware and Vulnerabilities Update
In this webinar Dr. Baxley will update you on the latest on the Pegasus Cell Phone Spyware, which affects billions of devices. Dr. Baxley will also review our own research into the variety of Cell Phone Spyware vendors and capabilities. Plus, he will review findings from our recent Cell Phone Spyware survey.

While the news about Pegasus Spyware focused on the individuals whose phones were hacked, the real story is the organizational secrets that were revealed because innocent people carried spy devices (their phones) into classified conversations.

Cell Phone Spyware hit the headlines again recently, with news that Spyware has been found on cell phones used by the US State Dept.

The latest spyware versions send a message to the phone that the user never sees. It arrives with no notification and gives itself its own permission to install the spyware without the user’s knowledge – meaning any employee no matter how loyal or security conscious can be a vehicle for carrying spyware into your most secret facilities and meeting rooms.

This is why enterprises and government agencies must not simply brush this off as a “it couldn’t happen here” scenario. It can happen anywhere!

Even worse “Turning off your phone” won’t work. Modern cell phones are never really off. They are in different states of hibernation and spyware can wake them up when it wants. What’s the fix? Sadly, the only answer is to keep cell phones out of your most classified meetings, which is where Bastille can help.

PLUS learn how your USB Cable may really be a Spyware device…..

Speaker:

Dr. Bob Baxley, CTO and co-founder, Bastille (bio here). Prior to Bastille, Bob was the Director of the Software Defined Radio Lab at Georgia Tech, where he led basic and applied research projects for organizations including NSF, ONR, Army, DoD, Air Force, and DARPA.

Cellular, Bluetooth, Wi-Fi, IoT Spyware and Vulnerabilities Update 2021

PEGASUS SPYWARE, DEF CON AND BLACK HAT UPDATES

Cellphone Spyware and Vulnerabilities Update
In this webinar Dr. Bob Baxley, CTO and head of the Bastille Threat Research Team explains how hackers use the Pegasus cellphone spyware and other vulnerabilities to bypass your security, gain access to your systems, and exfiltrate data and voice information. Dr. Baxley will also review the latest RF vulnerabilities presented at Black Hat and DEF CON.

While the news about Pegasus Spyware focused on the individuals whose phones were hacked, the real story is the organizational secrets that were revealed because innocent people carried spy devices (their phones) into classified conversations.

The latest spyware versions send a message to the phone that the user never sees. It arrives with no notification and gives itself its own permission to install the spyware without the user’s knowledge – meaning any employee no matter how loyal or security conscious can be a vehicle for carrying spyware into your most secret facilities and meeting rooms.

This is why enterprises and government agencies must not simply brush this off as a “it couldn’t happen here” scenario. It can happen anywhere!

Even worse “Turning off your phone” won’t work. Modern cell phones are never really off. They are in different states of hibernation and spyware can wake them up when it wants. What’s the fix? Sadly, the only answer is to keep cell phones out of your most classified meetings, which is where Bastille can help.

Speaker:

Dr. Bob Baxley, CTO and co-founder, Bastille (bio here). Prior to Bastille, Bob was the Director of the Software Defined Radio Lab at Georgia Tech, where he led basic and applied research projects for organizations including NSF, ONR, Army, DoD, Air Force, and DARPA.

Bastille and CIS Mobile: Enabling the Safe Use of Employees Cell phones in Secure Facilities

LEARN HOW TO USE BASTILLE WITH CIS MOBILE TO ENABLE EMPLOYEES TO SAFELY ENTER SECURE FACILITIES WITH CELL PHONES.

Bastille and CIS Mobile Integration
Using Bastille with CIS Mobile’s altOS solution can allow employees to safely bring personal cell phones into secure facilities. CIS Mobile’s altOS “secure mode” solution can lock cell phone communication abilities when entered into the system. Then, with Bastille’s cell phone, Wi-Fi, Bluetooth, and IoT detection capabilities, you can verify that the device in question is not actively transmitting in any of those modes.

Once “secure mode” is activated on the device, the employee can safely bring their device into the facility. While in the building, “secure mode” will remain on. The device will only reappear on the Bastille user interface if “secure mode” is off, as shown in the integration video from the webinar. Once the employee leaves the secure facility, “secure mode” can be turned off, and the device will then reappear on the Bastille interface.

Speakers:

Dr. Bob Baxley, CTO and co-founder, Bastille (bio here). Prior to Bastille, Bob was the Director of the Software Defined Radio Lab at Georgia Tech, where he led basic and applied research projects for organizations including NSF, ONR, Army, DoD, Air Force, and DARPA.

Simon Hartley is a Sales and Marketing Executive, formerly with Kaprica Security and RunSafe Security, now leading US Sales CIS Mobile (bio here). He is a Certified Ethical Hacker, CIPP, and CISM.

Demos

See Demos of Bastille integrated with the CIS Mobile Solution.

Bastille for Red and Blue Teams

LEARN HOW TO USE THE MITRE ATT&CK FRAMEWORK TO IDENTIFY AND LOCATE NEW ADVANCED PERSISTENT THREATS FOR DATA EXFILTRATION

Red or Blue Team? We work with both Red and Blue teams to increase their knowledge of Advanced Persistent Threats and Vulnerabilities from Cellular, Bluetooth, Wi-Fi and IoT devices.

Time and again we hear “If you want to hunt threats, you have to have data”, while networks provide lots of data about devices connected to them, there is far less data available about devices in your facilities that form part of the “Shadow IT” environment.

Bastille provides full visibility into RF-enabled devices operating in or close to your environment. Bastille detects the persistent threats that other network-only solutions cannot detect sending data, of up 150 fields per device, to your SIEM and existing enterprise infrastructure to give you all the information you need to identify and locate threats.

During the webinar Bob discusses use cases and techniques, plus demonstrates the Bastille FlyAway Kit, a portable kit for detecting and locating near-network devices and data exfiltration threats. Bob covers how Bastille integrates with enterprise infrastructure and fits within the MITRE ATT&CK framework.
Bastille & MITRE ATT&CK Framework – sections in orange indicate where Bastille can assist
Bastille & MITRE ATT&CK Framework – sections in orange indicate where Bastille can assist

Demos: See Demos of the Bastille system detecting Cell phones, IoT, Wi-Fi and Bluetooth devices such as wearables.

Presenter: Dr. Baxley is CTO, Bastille and former Director of the Software Defined Radio Lab at Georgia Tech (bio here), where he led projects on SIGINT, Electronic Warfare and Covert Communications for DOD and IC customers.

Zero Trust Security Posture

PROTECTING ORGANIZATIONS FROM ROGUE ACCESS

Zero Trust centers on the belief that we should not automatically trust anything inside or outside our perimeters. Instead of trusting a device’s authenticity, we must verify anything and everything that may attempt to connect to systems before granting access.

Bastille provides full visibility into devices as they enter and exit your facilities. While devices may authenticate, many may not, and yet they are still inside your buildings, forming a shadow IT infrastructure capable of data capture and exfiltration. These devices should be under the same policy as your authorized devices that use Zero Trust policies.

Use Case: Integration with your NAC system to ensure Zero Trust policies are maintained

In the webinar Dr. Baxley details how Bastille shows you the authorized and unauthorized devices operating in or close to your environment. When integrated with a NAC such as Cisco ISE, Forescout or Aruba ClearPass this enables a complete Zero Trust policy to be maintained over all devices, whether they are already known to be using facility Wi-Fi, or radio systems beyond existing Zero Trust policies, such as Bluetooth, Cellular and IoT devices.

Presenter: Dr. Baxley is CTO, Bastille and former Director of the Software Defined Radio Lab at Georgia Tech (bio here), where he led projects on SIGINT, Electronic Warfare and Covert Communications for DOD and IC customers.

Bastille Tactical Solutions

PORTABLE KITS FOR CELLULAR & RF BASED THREAT DETECTION AND LOCATION

Learn how to Detect and Locate unauthorized Cellular, Bluetooth, BLE, Wi-Fi and IoT devices at temporary sites such as forward deployed, conference/hotel, tent, and other remote locations using Bastille’s tactical deployment kits.

Bastille Tactical Solutions
Our portable tactical kit comes in specialized versions for government and commercial use. For deployment in a range of scenarios we offer kits capable of providing situational awareness in temporary locations from 5,000 square feet to 20,000 square feet in size.

In the webinar, Dr. Bob Baxley demonstrates customer use cases from Defense and Civilian Agencies including how they:

Enforce Flexible ‘Cell Phone’ or device policy: Enforce no cell phone policy for a temporary or forward deployed facility, or use Bastille to enable a more flexible policy.

Secure meeting areas: Detect transmitting electronic devices in secure meeting areas.

Prevent voice and data exfiltration: Detect wireless devices and Red Alert Upon events such as Bluetooth Pairing.

Scan tent sites, buildings and remote offices: Scan a room or building to understand the presence and location of all emitters/transmitters and building systems.

Demos: See Demos of the Bastille system detecting Cell phones, IoT, Wi-Fi and Bluetooth devices such as wearables.

Presenter: Dr. Baxley is CTO, Bastille and former Director of the Software Defined Radio Lab at Georgia Tech (bio here), where he led projects on SIGINT, Electronic Warfare and Covert Communications for DOD and IC customers.

Cyber Threat Hunting – Wireless Device APTs

FROM CELLULAR, BLUETOOTH, BLE AND IOT DEVICES

Bastille’s threat detection capabilities allow full visibility into RF devices operating in or close to your environment. Bastille detects the persistent threats that other enterprise threat hunters cannot detect, sending data to your SIEM and existing enterprise infrastructure to give you all the information you need to identify and locate the threat
Bastille-Threat-Hunting-Image-NO-Shadow.png
devices by protocol.gif
Use Case: Data Exfiltration — Mobile Devices Remaining Suspiciously Static and / or Transmitting Inside OR Outside your buildings.
When a cellular near-network device such as a cell phone comes inside your building or comes suspiciously close to your buildings, but never comes inside, the Bastille API will communicate with your SIEM to provide this data to the SOC. If the device is then static for several hours or days in an unusual location (inside or outside), and is exhibiting tell-tale signs of data exfiltration such as transmitting data, then Bastille can trigger an investigation using your existing security systems and personnel.

Bastille Threat Hunter offers constant monitoring and visibility into risks of data exfiltration from near-network devices using radio frequencies from 25 MHz to 6 GHz. This includes but is not limited to:
Bastille Threat Hunter for Near-Network Devices
Bastille Threat Hunter for Near-Network Devices

Cellular

Wi-Fi

Bluetooth and BLE

IoT protocols (Zigbee, Z-Wave, LoRa and more)

Plus many proprietary channels

During the webinar Bob will discuss use cases and techniques, plus demonstrate the Bastille Threat Hunter, a portable kit. Bob will also cover how Bastille integrates with enterprise infrastructure and fits within the Mitre ATT&CK framework.

Presenter: Dr. Baxley is CTO, Bastille and former Director of the Software Defined Radio Lab at Georgia Tech (bio here). Bob is the former Director of the Software Defined Radio Lab at Georgia Tech, where he led projects on SIGINT, Electronic Warfare and Covert Communications for DoD and IC customers. During the webinar, Dr. Baxley will discuss Bastille’s research about RF and wireless based APTs and vulnerabilities. He will also demonstrate how the Bastille Threat Hunter can add unique data into your Threat Hunting systems and practice.

Who should watch:

Threat Hunters

Network and Cyber Security Professionals

Network Operations Professionals

Anyone concerned with data exfiltration risks

Enhanced Threat Hunting to include Wireless APTs

FROM CELLULAR, BLUETOOTH, BLE AND IOT DEVICES

Time and again we hear “If you want to hunt threats, you have to have data.” Advanced Persistent Threats and Vulnerabilities from near-network devices using Cellular, Bluetooth or one of the many IoT protocols are invisible to most enterprise threat hunters, as few have any solution to collect the data regarding these devices. Without the data for threat hunters to investigate, the devices and threats persist, making the threat invisible.

Bastille’s threat detection capabilities allow full visibility into near-network devices operating in or close to your environment. Bastille detects the persistent threats that other enterprise threat hunters cannot detect, sending data to your SIEM and existing enterprise infrastructure to give you all the information you need to identify and locate the threat
devices by protocol.gif
Use Case: Data Exfiltration — Mobile Devices Remaining Suspiciously Static and /or Transmitting Inside OR Outside your buildings.
When a cellular near-network device such as a cell phone comes inside your building or comes suspiciously close to your buildings, but never comes inside, the Bastille API will communicate with your SIEM to provide this data to the SOC. If the device is then static for several hours or days in an unusual location (inside or outside), and is exhibiting tell-tale signs of data exfiltration such as transmitting data, then Bastille can trigger an investigation using your existing security systems and personnel.

Bastille Threat Hunter offers constant monitoring and visibility into risks of data exfiltration from near-network devices using radio frequencies from 25 MHz to 6 GHz, this includes but is not limited to:
Bastille Threat Hunter for Near-Network Devices
Bastille Threat Hunter for Near-Network Devices

Cellular

Wi-Fi

Bluetooth and BLE

IoT protocols (Zigbee, Z-Wave, LoRa and more)

Plus many proprietary channels

During the webinar Bob will discuss use cases and techniques, plus demonstrate the Bastille Threat Hunter, a portable kit. Bob will also cover how Bastille integrates with enterprise infrastructure and fits within the Mitre ATT&CK framework.

Presenter: Dr. Baxley is CTO, Bastille and former Director of the Software Defined Radio Lab at Georgia Tech (bio here). Bob is the former Director of the Software Defined Radio Lab at Georgia Tech, where he led projects on SIGINT, Electronic Warfare and Covert Communications for DoD and IC customers. During the webinar, Dr. Baxley will discuss Bastille’s research about RF and wireless based APTs and vulnerabilities. He will also demonstrate how the Bastille Threat Hunter can add unique data into your Threat Hunting systems and practice.

Who should watch:

Threat Hunters

Network and Cyber Security Professionals

Network Operations Professionals

Anyone concerned with data exfiltration risks

Radio Frequency IoT Threats

Dr. Bob Baxley, CTO and Head of the Bastille Threat Research Team examines Radio Frequency IoT vulnerabilities which enable hackers to bypass your security, gain access to your systems, and exfiltrate data and voice information.

Using research from the Bastille Threat Research team as well as analysis of data from the National Vulnerability Database, Dr. Baxley will examine Radio Frequency IoT Threats to Security.

Presenter: Dr. Baxley is CTO, Bastille and former Director of the Software Defined Radio Lab at Georgia Tech (bio here).

The Latest IoT threats to your Security, which:

Affect Billions of Devices

Allow Hackers to use RF as a Vector for Cybercrime

Affect All Networks and Locations

Impact the Devices we use Everyday

Disrupt our Networks, Buildings and National Infrastructure

How to use RF detection and location technologies to:

Detect, Locate and Isolate Devices Vulnerable to Attack

Integrate RF Security into your Security Infrastructure

Geofence Sensitive Areas and Receive Alerts

Conduct Forensic Analysis of Threats

Tag Devices by Manufacturer

Protocols Covered:

Zigbee

DECT

LoRA

Proprietary peripheral protocols

and other IoT protocols

PLUS a recap of threats from Bluetooth and BLE devices from the previous webinar