After investigating a collection of generic Chinese hidden camera modules, I identified several critical vulnerabilities that enable attackers to gain full control over a target device from anywhere in the world. The problem is that these modules are components in various devices sold online (on stores such as Amazon), and are listed under various brand names. All the attacker needs is your device's serial number, which users sometimes disclose in online reviews. It is also possible that an attacker may obtain your serial through enumeration or other means. Possible attacks (that I have demonstrated) include:
Many cheap IoT devices commonly use peer-to-peer technology to enable remote access. These systems are flawed by design, and expose your devices to the internet. This is what makes the attacks listed previously possible from anywhere in the world. In addition to the flaws found in the spy cameras, my research identifies an encryption flaw in the peer-to-peer system that exposes all devices connected to the network. This network is used by over 50 million IoT devices – not just spy cameras!
I hope this research will be eye-opening to consumers and will prompt manufacturers to design their products with security as a priority.
You can access the full paper here: [2306.00610] Spying on the Spy: Security Analysis of Hidden Cameras.
- Bypassing the user's (in-app) password
- Downloading the user's password (in plaintext)
- Live streaming video
- Extracting the user's WiFi password
- Extracting the entire filesystem (including historic video data)
- Opening a reverse-shell
- Attacking other devices in the user's home network
Many cheap IoT devices commonly use peer-to-peer technology to enable remote access. These systems are flawed by design, and expose your devices to the internet. This is what makes the attacks listed previously possible from anywhere in the world. In addition to the flaws found in the spy cameras, my research identifies an encryption flaw in the peer-to-peer system that exposes all devices connected to the network. This network is used by over 50 million IoT devices – not just spy cameras!
I hope this research will be eye-opening to consumers and will prompt manufacturers to design their products with security as a priority.
You can access the full paper here: [2306.00610] Spying on the Spy: Security Analysis of Hidden Cameras.