Now Reading
Is Your Webcam A Backdoor?

Is Your Webcam A Backdoor?

by Justin OConnellJanuary 13, 2016

While stories appear every day regarding the vulnerabilities of smart fridges and TVs, IoT technologies like webcams represent a far more desirable target for hackers.

Vectra Threat Labs, a research arm of Vectra Networks, detailed today how consumer-grade Internet of Things products – in this case, a Wi-Fi security camera – are hackable and programmable as “permanent backdoors.”

According to the Lab, this allows “potential attackers to remotely command and control a cyber attack without being detected by traditional security products.” A hacker could thus gain full-time access to a network without needing access to a laptop, workstation or server.

“Consumer-grade IoT products can be easily manipulated by an attacker, used to steal an organization’s private information and go undetected by traditional security solutions,” said Gunter Ollmann, CSO of Vectra Networks, in the company’s statement. “While many of these devices are low-value in terms of hard costs, they can affect the security and integrity of the network, and teams need to keep an eye on them to reveal any signs of malicious behavior.”

Vectra Threat Labs purchased a D-Link Wi-Fi webcam and successfully reprogrammed the approximately $30 camera to work as a backdoor. It functioned still like a camera.

“The irony in this particular scenario is that Wi-Fi cameras are typically deployed to enhance an organization’s physical security, yet they can easily become a network security vulnerability by allowing attackers to enter and steal information without detection,” said Ollmann.

The research provides a foundational framework for the case that consumer-grade networked devices can be hacked and, therefore, pose a threat to a home or organization’s overall security.

“The vast majority of people do not yet know or understand the hidden capabilities of the devices they are purchasing and deploying throughout their homes and businesses,” Ollmann told Hacked. “These hidden capabilities, and the methods of exploiting them are unfortunately not known to  hackers and are in the process of being used as tools to attain perpetual access and control of the networks they are deployed upon.”

Industry experts say that web-based cameras, and other consumer grade IoT products, feature similar designs, and thus similar vulnerabilities. While the consumer has acclimated to security products like firewalls for computers and smartphones, many other devices do not yet offer such security products.

Everyday consumer devices can be hacked and used as backdoors into the network to which they connect. Since it remained operational as a webcam, it would be nearly impossible to detect the breach in the D-Link camera, which is designed similarly to many mass-produced consumer-level electronics.

“Devices that can be easily attached to the network and remotely controlled or managed via the Internet tend to be soft targets,” Ollmann added. “It doesn’t help that many of the popular ‘small footprint’ operating systems popularly used for mass-produced network devices are poorly secured themselves.” D-Link shed more light on the vulnerability exposed by Vectra Threat Labs.

“[It] is a complicated and atypical hack that involves splitting the camera open by the potential hacker to gain access to the PCB and flash the camera manually,” a representative for D-Link told Hacked. “While the vulnerability is not a common occurrence and one that is difficult to protect against due to the modification of the device, D-Link is evaluating solutions including, signed and encrypted firmware, and more advanced methods using secure hardware elements to  prevent these types of vulnerabilities.”

Featured image from Shutterstock.

Advertised sites are not endorsed by us. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
What's your reaction?
Love it
Hate it