How internet-facing webcams could put your organization at risk

SpacemanSpiff

Known around here
Joined
Apr 15, 2021
Messages
1,458
Reaction score
2,432
Location
USA
I know a countless number of members here regularly speak to this point. Thought an article from an outside source might help with encouraging those who are hesitant to secure their cams.

How internet-facing webcams could put your organization at risk
www.techrepublic.com/article/how-internet-facing-webcams-put-organization-risk

by Lance Whitney in Security
on March 13, 2023, 3:24 PM EDT
By exploiting webcams and other IoT devices, hackers can spy on private and professional conversations, potentially giving them access to sensitive information, says BitSight.

Imagine a cybercriminal hacking into an internet-facing webcam set up in your organization and spying on a meeting, a manufacturing process or an internal training session. Then imagine what that person could do with the information they obtained. That’s exactly the scenario laid out by cyber risk company BitSight.

For a new report about insecure IoT devices, BitSight discovered that one in 12 organizations with internet-facing webcams or similar devices failed to properly secure them, leaving them vulnerable to video or audio compromise. Specifically, 3% of organizations tracked by BitSight had at least one internet-facing video or audio device. Among those, 9% had at least one device with exposed video or audio feeds, giving someone the ability to directly view those feeds or eavesdrop on conversations.

Which organizations are most at risk to this hacking?
The organizations analyzed included ones in the hospitality, education, technology and government sectors. Out of these, the education area was at the greatest risk, with one in four using internet-facing webcams and similar devices susceptible to video or audio compromise.

Further, Fortune 1000 companies suffered the greatest exposure, including a Fortune 50 technology subsidiary, a Fortune 100 entertainment company, a Fortune 50 telecommunications company, a Fortune 1000 hospitality company and a Fortune 50 manufacturing company.

Which devices were analyzed in this cyber risk survey?
Most of the devices analyzed by BitSight use the Real-Time Streaming Protocol to communicate over the internet, though some use HTTP and HTTPS protocols. With RTSP, users can send video and audio content and run commands to record, play and pause the feed.

Though many of the devices examined for the report were webcams, the analysis also included network video recorders, smart doorbells and smart vacuums. Some devices were actually set up for security purposes.

Why the devices are at risk of being hacked

The internet-facing devices analyzed were not behind a firewall or VPN, leaving them open to fingerprinting and threats. Certain exposed devices were improperly configured, with some lacking any type of password set by the user. Other devices were stuck with a security flaw, with many hit by a specific access control vulnerability called an insecure direct object references vulnerability.

IDOR vulnerabilities have become more worrisome as of late, according to BitSight. In 2022, BitSight discovered several critical such vulnerabilities in a popular vehicle GPS tracker. Labeled as CVE-2022-34150, this flaw could allow a hacker to grab information from any device ID regardless of the user account signed into the device.

At the very least, the video or audio feed should be protected by access control measures; however, many of them were not secured in this way, allowing attackers to view video feeds and spy on conversations. A savvy hacker could even alter the exposed feeds to spread false information, BitSight explained.

What are possible security impacts of such hacks?
Vulnerable webcams and other IoT devices open the door for several types of threats. An attacker could view private meetings and other conversations, enabling them to gather personal data or compromising information through a video or audio feed. The actual locations of employees and other people could be exposed. A hacker could also access business-related activities and conversations, allowing them to pick up sensitive information not only of the company but of any third parties.

The exposed information could threaten physical security. Some of the webcams analyzed by BitSight control secure doors and rooms, potentially giving criminals the information needed to thwart the security. Further, an organization’s overall cybersecurity could be at risk. Access to vulnerable audio and video devices gives attackers more data to compromise your internal systems and networks.

Some of the areas with vulnerable webcams included manufacturing facilities, laboratories, meeting rooms, school buildings and hotel lobbies.

How to reduce the risk from exposed webcams and IoT devices
To help your organization lessen the risk from internet-facing webcams and other IoT devices, BitSight offers a few tips.

First, identify any video or audio devices deployed across your organization and your business partners. Then analyze the security of these devices.

Put any vulnerable devices behind a firewall or VPN.

Set up access control measures to protect any devices that lack the proper authentication.

For devices that suffer from a software vulnerability, the developer needs to step in to provide a patch or otherwise secure the device. If the vendor can’t or won’t do this, your only option may be to switch to a different device or brand.

“This research shows that even everyday technologies, such as webcams, can leave organizations highly vulnerable if exposed,” BitSight Chief Risk Officer Derek Vadala said in a press release. “Understanding how these devices can increase an organization’s attack surface and taking the steps to deploy them in a manner that limits potential threats is critical.”
 

TonyR

IPCT Contributor
Joined
Jul 15, 2014
Messages
16,458
Reaction score
38,187
Location
Alabama
Joined
Aug 8, 2018
Messages
7,386
Reaction score
25,889
Location
Spring, Texas
If you read the story and listen to her videos, someone was hacking in and when they went to change the password via her iPhone, the utility stated that the NEW password she was attempting to use was found in a list of leaked passwords. So it was not that password that was used to get into the cam, but rather she was trying to use a recycled password and that one was compromised. This is what happens when people that know nothing about IT security post crap on TikTok that is actually mis-information.

She kept saying it was due to it being WIFI, which would mean that it was not a data breach from the cam vendor, but her home WIFI that was breached.
 
Top