- Mar 9, 2014
- 36,892
- 21,407
Kawboy, if you're referring to the "Hacked" message at lower right, I believe all the red flags will have "hacked" in the cam image. The yellow flags are for "vulnerable" hik cams.Some kindly soul left a message on this camera-
Its explained in the comments, it added lots of clutter to the map...point is made with hikvision alone and the article mentions that the result would have been over 5k if the 80+ hikvision OEM brands were added...They filtered for US only locations, and for some reason only Hik-branded cameras rather than rebranded Hiks. No sense blaming Hikvision for the sins of their partners I guess? It's the parent company's faulty firmware though, so whatever...
It has nothing to do with lawsuits...hikvision nor any of the other rebrands have ANY basis for a claim. The article clearly statesI saw that. Still, clutter doesn't matter when you zoom in. As for any unmentioned reasons for not outing US-based companies when it took time and effort to remove them? I suspect that as a lawyer you might be able to guess at least one. They made their point in a way least likely to get them sued, although I'm sure some end users of rebrands would prefer to find out that their cams are vulnerable and fix them.
how so?It would, however, reduce the number of potential hotheads, yes?
This vulnerability only affects cameras directly exposed to the net, not behind vms and or NVR's...additionally by the time this scan was done, many of these cameras were either offline or repaired...most folks would call their installer or take action if "hacked" appears on their feed. The map also relies on Shodan which may have not caught everything..Kawboy,
Interesting comment. Yes, rebrands were scrubbed from the map, diminishing the visual impact.
Instead of an interactive with ALL hik manufactured cams, a non-interactive jpg might have graphically shown the extent of "vulnerable" and "hacked" systems.
I drilled down to the Seattle area, and looked at the 10 or so locations posted. I was surprised it was so few. I didn't read the article closely enough - a graphic may have caught my attention,, though....
how so?
So now you think he's protecting us based oems? Why? Posted direct links to those oem... He could have locked the entire post... your logic is once again flawed...The less shit disturbed, especially with inflammatory evidence like pics from cameras exposed, the less likely that someone is going to react negatively. Even if it's not IPVM that would take much direct heat, I'd expect that if a group of people, even a small group, or even just a lawyer looking to drum up business, thought that a company would sell consumers cameras, port forward them, and not advise them that they'd been made vulnerable that there's the possibility of a class action lawsuit. US rebranders and/or larger installers would probably stand to lose the most from this. Hikvision just sees flaws and fallout like this as a PR problem that might affect future marketing rather than something to feel guilt over or, gasp, really try and prevent in the future.
I also realize that many of these affected cameras running old unpatched firmware may be unupgradable cheapos bought on the grey market from AliExpress and therefore would have no official standing. Bought as is, where is- buyer beware.