• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Write for Us
  • Contact
  • Advertise
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Do Not Sell My Personal Information
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Default settings leave surveillance cameras susceptible to botnet operations

Updated on Oct 26, 2015 by Guest Authors

A new security research released by Incapsula has revealed that hundreds of surveillance cameras are being used to perpetrate a massive disruption of Internet services through a network of botnets.

The findings lead to the conclusion that cyber attackers have easier methods of hacking surveillance cameras that are left in their default settings – a configuration set at the factory level. Users are supposed to change default configurations, but instead the researchers found that this is often disregarded in most surveillance cameras purchased worldwide.

surveillance-camera

These cyber criminals use these surveillance cameras in order to complete their fleet of botnets that are responsible for spreading their attacks and any other malicious activities online. These botnets are what cause denial-of-service attacks that interrupt online services and to a certain degree take down websites by driving a huge traffic to that site.

Surveillance cameras are now easier than ever to target because they are connected in what is casually called the Internet of Things – a universe of connected devices and appliances. Since these types of cameras are a component of botnets that rely on IoT, it is not surprising that CCTVs were the major contributors to the sharp increase in botnet activities in 2014 worldwide.

The Incapsula team accidentally discovered that most of the IPs used to launch online service disruptions in the past year belong to surveillance cameras. There was a remarkable uptake in traffic through these connected cameras due in a major way to factory set configurations that cyber crooks easily maneuvered.

In all of these compromised cameras, the BusyBox Unix utility bundle has been found. A kind of malware was then used to scan the network devices since that malware only works on cameras that have the BusyBox installed in them.

The malware will go on to look for Telnet systems that can be brute forced after the device has been discovered through the malware. It is from there that a DDoS attack can be launched.

The researchers can confirm that the cameras have been subjected as botnets since the cameras were logged from various locations, demonstrating further that cyber attackers can now easily locate and target surveillance cameras anytime they want to and in whatever location.

The only way for now to at least reduce the severity of these botnets would be to alter the factory settings of surveillance cameras in order to prevent hackers from gaining access to the devices. For example, some CCTVs come with a default username and password. These credentials must be changed for security.

Disclosure: As an Amazon Associate, I earn from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Keychron K4 Wireless Mechanical Keyboard Review – The Biggest & The Best?

Keychron K6 Wireless Mechanical Keyboard Review – Nice Balance Between Design and Function

AuthenTrend AT.Wallet Fingerprint Cryptocurrency Wallet Review – The Coolest One You Can Buy

Yeedi K650 Robot Vacuum Review – A Good Basic Vacuum

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • Samsung Galaxy S21 Ultra Model Number SM-G998* Differences
  • Samsung Galaxy S21+ 5G Model Number SM-G996* Differences
  • Samsung Galaxy S21 5G Model Number SM-G991* Differences
  • How to Read and Write to NTFS Drives on Apple M1 Mac?

Copyright © 2021 · All Rights Reserved