Pi400 is it 100x safer than Pi4?

Pi400 is it 100x safer than Pi4

The Raspberry Pi Foundation has recently announced the launch of a new product; the Raspberry Pi400-is it 100x safer than Pi4? This is an excellently integrated device whereby the computer is embedded in a compact keyboard with a 1.8GHz ARM CPU. This is slightly faster than the previous Raspberry Pi model. Additionally, the device comes with 4GB of RAM, Wi-Fi, Bluetooth 5.1, Bluetooth low energy and Gigabit Ethernet. A microSD card is used for the operating system and to store data.

This new design takes most of the work out of setting up a Raspberry Pi 4 as a computer. The user only needs a few cables, a monitor and a mouse to use the Pi 400. Plugging the keyboard into a monitor using one of its two micro HDMI ports, inserting a microSD card, and attaching a power cord and a mouse is all that needs to be done to set up the device.

The design, and price (only $70) of this device is intended to make it more attainable and user-friendly. This is great for those wanting to learn how to code or continue a hobby. But what about when it is used by malicious actors? The device, not only being relatively inexpensive, looks extremely unsuspecting. Thus making it an appealing tool to use by bad actors seeking to cause damage.

Increased Appeal of Raspberry Pi

Increasing its appeal is the fact that, when plugged in, it is recognized as a genuine HID by the computer, thereby not raising any alarms. Moreover, many hacking and pen testing tools are optimized for Raspberry Pi devices. This means that an attack using such a device is easy to carry out. And the Pi 400 is able to carry out a variety of perilous attacks that can have major consequences for the victim. Hence, the Raspberry Pi 400 presents a major cyber security risk to enterprises and awareness of the tool is imperative. This is especially due to its manipulative characteristics. Without visibility into hardware assets, an attack can last months, if not years; and no organization is immune – just ask NASA.

US Federal Agency Incident

History has shown that attackers are fully aware of specific “blind’ spots that enterprises have when using platforms like Raspberry Pi. One such incident happened when the US Federal Agency was hacked in 2019 by a Raspberry Pi… In this case, 500 megabytes of data from 23 different files were stolen. The attack went unnoticed for almost a year, causing a significant data breach and resulting in two linked organizations choosing to disconnect from the agency’s – not to mention the reputational damage that was done. By accessing NASA’s network with the Raspberry Pi, the attackers were able to move freely between the various systems within the network, intensifying the damage caused by the attack.

The considerable depth in which the attackers went provided them with access to several sensitive operations which could have caused a major national security risk. Because of NASA’s reduced visibility into devices connected to its network, the attackers were able to successfully infiltrate the agency for a long period of time. Evidently, device visibility is essential for all organizations to ensure that they know what they have and can protect what they own. Hence, Hardware Access Control should be a vital part of any enterprise’s cyber security scheme to enhance protection and avoid attacks conducted by malicious hardware devices. So, Pi400, is it 100x safer than Pi4? No, the Raspberry Pi400 is not 100x safer than Pi 4. In fact, when in the wrong hands, it might just be 100x more dangerous.

Sepio platform uses a novel algorithm, a combination of physical layer fingerprinting module coupled with a Machine Learning module – providing the sought-after visibility and enforcement level, it is further augmented by a threat intelligence database – ensuring a lower risk hardware infrastructure.

Hardware Assets Control solution for iot security

Sepio Hardware Access Control HAC-1, provides 100% hardware device visibility.

HAC-1 enables Hardware Access Control by setting rules based on the devices characteristics.

HAC-1 instantly detects any devices which breach the set rules and automatically block them to prevent malicious attacks.

The idea is to Verify and then Trust that those assets are what they say they are.

With greater visibility, the zero-trust architecture can grant access decisions with complete information.

Thus, enhancing the enterprise’s protection within, and outside of, its traditional perimeters.

The Hardware Access Control capabilities of HAC-1, block Rogue Devices as soon as they are detected

Our HAC-1 solution stops an attack at the first instance, not even allowing such devices to make network access requests.

Sepio Hardware Access Control HAC-1 provides 100% hardware device visibility. No device goes unmanaged. Rogue Devices are block as soon as they are detected. HAC-1 solution stops an attack at the first instance, not even allowing such devices to make network access requests.

Physical Layer Fingerprinting

Sepio is the only company in the world to undertake Physical Layer fingerprinting . HAC-1 detects and handles all peripherals; no device goes unmanaged.

With this total visibility, a stronger cyber security posture is achieved. There is no longer needed to rely on manual reporting or employee compliance. Sepio manage security and provides answers to questions such as:

  • Do we have an implant or spoofed device in our network?
  • How many IoT devices do we have?
  • Who are the top 5 vendors for devices found in our network?
  • Where are the most vulnerable switches in our network?

Having visibility across all hardware assets provides a more comprehensive cyber security defense.

Reduce the risk of a hardware attack being successful and our private health data being stolen.

Founded in 2016 by cybersecurity industry veterans from the Israeli Intelligence community, Sepio’s HAC-1 is the first hardware access control platform that provides visibility, control, and mitigation to zero trust, insider threat, BYOD, IT, OT and IoT security programs.

Sepio’s Technology

Sepio’s hardware fingerprinting technology discovers all managed, unmanaged and hidden devices that are otherwise invisible to all other security tools.

Sepio is a strategic partner of Munich Re, the world’s largest re-insurance company, and Merlin Cyber, a leading cybersecurity federal solution provider.

Heavy spending on cybersecurity should bring a high return on investment, yet gaps in visibility limit this.

HAC-1 fingerprinting technology and MouseJack Attacks

Sepio Hardware Access Control (HAC-1) solution provides a panacea to gaps in device visibility to ensure you are getting the most out of your cybersecurity investments.

HAC-1 integrates with existing solutions, such as NAC, EPS, SIEM and SOAR, to enhance the organization’s cybersecurity posture.

HAC-1’s deep visibility capabilities mean no device goes unmanaged; the solution identifies, detects, and handles all IT/OT/IoT devices.

Moreover, HAC-1’s policy enforcement mechanism and Rogue Device Mitigation capabilities instantly block any unapproved or rogue hardware.

In doing so, ultimately, HAC-1 enables a Zero Trust Hardware Access approach which stops attackers at the first line of defense.

Sepio supporting compliance

Sepio Hardware Access Control (HAC-1) solution provides entities with the Physical Layer coverage they need to obtain complete device visibility. And, in doing so, also provides protection against hardware-based attacks.

As the leader in Rogue Device Mitigation (RDM), Sepio’s solution identifies, detects and handles all peripherals; no device goes unmanaged.

HAC-1 fingerprinting technology

HAC-1 uses Physical Layer fingerprinting technology and Machine Learning to calculate a digital fingerprint from the electrical characteristics of all devices and compares them against known fingerprints.

In doing so, HAC-1 is able to provide organizations with ultimate device visibility and detect vulnerable devices and switches within the infrastructure.

In addition to the deep visibility layer, a comprehensive policy enforcement mechanism recommends on best practice policy and allows the administrator to define a strict, or more granular, set of rules for the system to enforce.

When a device breaches the pre-set policy, HAC-1 automatically instigates a mitigation process that instantly blocks unapproved or Rogue hardware.

Furthermore, HAC-1’s RDM capabilities support compliance with Section 8 of the EO, which concerns the government’s investigative and remediation capabilities.

Section 8 focuses on enhancing data collection efforts in order to improve the investigation and remediation processes following an incident. HAC-1 logs all hardware asset information and usage and maintains such data for a period defined by the system administrator.