• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Do Not Sell My Personal Information
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Default settings leave surveillance cameras susceptible to botnet operations

Updated on Oct 26, 2015 by Guest Authors

A new security research released by Incapsula has revealed that hundreds of surveillance cameras are being used to perpetrate a massive disruption of Internet services through a network of botnets.

The findings lead to the conclusion that cyber attackers have easier methods of hacking surveillance cameras that are left in their default settings – a configuration set at the factory level. Users are supposed to change default configurations, but instead the researchers found that this is often disregarded in most surveillance cameras purchased worldwide.

surveillance-camera

These cyber criminals use these surveillance cameras in order to complete their fleet of botnets that are responsible for spreading their attacks and any other malicious activities online. These botnets are what cause denial-of-service attacks that interrupt online services and to a certain degree take down websites by driving a huge traffic to that site.

Surveillance cameras are now easier than ever to target because they are connected in what is casually called the Internet of Things – a universe of connected devices and appliances. Since these types of cameras are a component of botnets that rely on IoT, it is not surprising that CCTVs were the major contributors to the sharp increase in botnet activities in 2014 worldwide.

The Incapsula team accidentally discovered that most of the IPs used to launch online service disruptions in the past year belong to surveillance cameras. There was a remarkable uptake in traffic through these connected cameras due in a major way to factory set configurations that cyber crooks easily maneuvered.

In all of these compromised cameras, the BusyBox Unix utility bundle has been found. A kind of malware was then used to scan the network devices since that malware only works on cameras that have the BusyBox installed in them.

The malware will go on to look for Telnet systems that can be brute forced after the device has been discovered through the malware. It is from there that a DDoS attack can be launched.

The researchers can confirm that the cameras have been subjected as botnets since the cameras were logged from various locations, demonstrating further that cyber attackers can now easily locate and target surveillance cameras anytime they want to and in whatever location.

The only way for now to at least reduce the severity of these botnets would be to alter the factory settings of surveillance cameras in order to prevent hackers from gaining access to the devices. For example, some CCTVs come with a default username and password. These credentials must be changed for security.

Disclosure: As an Amazon Associate, I earn from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

HPRT MT810 Mobile Printer Review – Portable Printer Gets Better Than Ever

OAK & IRON Launched ONE and ONE PRO Cordless Electric Tire Inflators

BREEZOME JH03 vs JH04 Air Purifier – Which One Should You Buy?

WINCENT Multi-Function Gun Safe Cabinet Review

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • BLUETTI Power Week – B230 and B300 Discounts
  • HPRT MT810 Mobile Printer Review – Portable Printer Gets Better Than Ever
  • BLUETTI AC500 and B300S – Achieve Power Independence with The Upgraded Power Station
  • CIGA Design Mechanical Watch – Magician (M-Series) Launched on IndieGogo

Copyright © 2022 · All Rights Reserved