Tactic: Initial Access

Technique: Default Credentials

Standard protocols and services often come with default passwords set by the manufacturer of the robot*. If the owner of the robot does not change these default credentials, an attacker can try to access the machine by using these credentials, which are often publicly available.

*https://www.roboticstomorrow.com/article/2018/04/securing-the-robots/11719 https://www.csoonline.com/article/3187459/robots-lots-of-features-not-much-security.html

Technique in practice

Article: attackers using default credentials to target businesses
Article: risks of default passwords on the internet
Vaak kunnen default credentials online gevonden worden.

Mitigations

The default password of any protocol that is publicly accessible should be changed to something unique. A strong password should be assigned to it instead. A strong password usually has a minimal character limit of atleast 8, atleast one uppercase, one number and a special character. This increases the amount of characters to check for every position and makes password cracking take a lot longer.

Detections

It is very hard to detect unlawful access through default credentials, since the traffic looks exactly the same as lawful access. It is best not to try and detect this technique, but instead to always apply the mitigation, since it has no costs except implementation. If any detection method is to be applied, the defender can monitor logon sessions for default credentials to log what machines have accessed the robot.

Documented incidents with autonomous robots

During a pentest on a Jackal robot from Clear Path Robotics, default administrator credentials were pulled from the internet. The credentials on the robot were not changed by its owners, and the default credentials granted admin access on the machine.

Documented incidents in other domains

    [2022] Attackers using default credentials to target businesses, Raspberry Pi and Linux top targets