How to hack a security CCTV camera (video) » TechWorm

How to hack a security CCTV camera (video) article at http://www.techworm.net/2016/10/hack-security-cctv-camera-video.html talks on issue on IoT device hacking.

This video shows how bad IoT CCTV camera security really is. It also tells about Android security.

Security cameras are a fine value addition to the security apparatus because they offer irrefutable proof of people in the act of breaking and entering. However, the very same security cameras in the hands of criminals can be a security nightmare. In fact, security cameras are most vulnerable internet connected devices at the moment.

Last week we have had hackers use such one million vulnerable CCTV cameras to build botnet army to attack their enemies with DDoS attacks. I have reported those attacks in Brian Krebs site hit with 665 Gbps DDoS attack and IoT used for censorship and more.

The issues that security cameras can be hacked is not new, the fact that many are vulnerable has been known for years. The trends now is connecting those cameras to botnet using Linux.Mirai Trojan, a DDoS nightmare. If Cybersecurity is just too much trouble for the general public then the future could be that the future of the Internet could be that Millions of rogue fridges will render it unusable. Hopefully not.

1 Comment

  1. Tomi Engdahl says:

    Nearly 200,000 Wi-Fi Cameras Are Open To Hacking
    https://it.slashdot.org/story/17/03/09/2212227/nearly-200000-wi-fi-cameras-are-open-to-hacking

    What started as an analysis of a simple security flaw in a random wireless IP camera turned into seven vulnerabilities that affect over 1,250 camera models and expose nearly 200,000 cameras to hacking. The flaws affect a generically named product called Wireless IP Camera (P2P) WIFICAM, manufactured by a (currently unnamed) Chinese company, who sells it as a white-label product to several other camera vendors.

    Nearly 200,000 WiFi Cameras Open to Hacking Right Now
    https://www.bleepingcomputer.com/news/security/nearly-200-000-wifi-cameras-open-to-hacking-right-now/

    What started as an analysis of a simple security flaw in a random wireless IP camera turned into seven vulnerabilities that affect over 1,250 camera models and expose nearly 200,000 cameras to hacking.

    The flaws affect a generically named product called Wireless IP Camera (P2P) WIFICAM, manufactured by a (currently unnamed) Chinese company, who sells it as a white-label product to several other camera vendors.

    Security researcher Pierre Kim says the firmware produced by this Chinese vendor comes with several flaws, which have all made their way down the line into the products of other companies that bought the white-label (unbranded) camera. In total, nearly 1,250 camera models based on the original camera are affected.

    According to Kim, the cameras are affected by a total of seven security flaws. The biggest ones are listed below.

    Backdoor account – Telnet runs by default, and everyone can log in with the following credentials

    Pre-auth info and credentials leak – An attacker can bypass device authentication procedures by providing empty “loginuse” and “loginpas” parameters when accessing server configuration files

    Pre-auth RCE as root – An attacker can bypass the authentication procedure and execute code on the camera under the root user just by accessing an URL with special parameters.

    Streaming without authentication – An attacker can access the camera’s built-in RTSP server on port 10554 and watch a live video stream without having to authenticate

    Cloud – The camera provides a “Cloud” feature that lets customers manage the device via the Internet. This feature uses a clear-text UDP tunnel to bypass NATs and firewalls. An attacker can abuse this feature to launch brute-force attacks and guess the device’s credentials.

    Nearly 200,000 vulnerable cameras available online right now

    Yesterday, Kim said that around 185,000 vulnerable cameras could be easily identified via Shodan. Today, the same query yields 198,500 vulnerable cameras.

    “I advise to IMMEDIATELY DISCONNECT cameras [from] the Internet,” Kim said in a blog post. “Hundreds of thousands [of] cameras are affected by the 0day Info-Leak. Millions of them are using the insecure Cloud network.”

    Reply

Leave a Reply to Tomi Engdahl Cancel reply

Your email address will not be published. Required fields are marked *

*

*