Vulnerabilities / Threats

6/29/2016
09:05 AM
50%
50%

Over 25,000 IoT CCTV Cameras Used In DDoS Attack

Probe uncovers attacks generated from 105 global locations and delivering 50,000 HTTP requests per second.

More than 25,000 IoT CCTV devices located worldwide have been hacked and are being used for a denial-of-service botnet attack, reports Network World quoting security research firm Sucuri. The botnet, discovered during a jewelry store DDoS attack probe, was found to deliver 50,000 HTTP requests per second.

“It is not new that attackers have been using IoT devices to start their DDoS campaigns,” says Sucuri. “However, we have not analyzed one that leveraged only CCTV devices and was still able to generate this quantity of requests for so long.”

According to Sucuri, the attacks, “a variation of the HTTP flood and cache bypass attack,” were initiated from 25,513 unique IP addresses in 105 countries with 5% of the IPs being IPv6. The most compromised CCTV devices were located in Taiwan, USA, Indonesia, Mexico, Malaysia and Israel, Italy, Vietnam, France and Spain, says Sucuri adding that around 46% of the cameras had default H.264 DVR logos.

Sucuri believes the CCTV devices may have been hacked via the remote code execution (RCE) flaw recently found to affect CCTV-DVR devices sold by some vendors.

Read full story at Network World.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
uRock
50%
50%
uRock,
User Rank: Apprentice
7/1/2016 | 11:31:31 AM
Where can we find which vendors?
I have a Swann system and would like to know if it is vulnerable. 

I am sure mine isn't being used as it is not connected to any router with internet access. It would still be nice to know if I should worry about this if I were to put it on my regular LAN.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2016 | 1:04:52 PM
Re: CCTV
I would think some level of functionality would need to be maintained otherwise the owner of the CCTV would be alerted pretty quickly.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 11:18:48 AM
Compromised CCTV
" The most compromised CCTV devices were located in Taiwan, USA, Indonesia, Mexico, Malaysia and Israel, Italy, Vietnam, France and Spain, says Sucuri "

Another question; are these the countries using CCTV devices most?
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 11:16:08 AM
Re: RCE
Or follow up question, do they know that their devises are vulnerable? :--))
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 11:14:40 AM
CCTV
A question came to my mind: What happens when CCTV is attacked, it does not record? That is a good way of disabling cameras in secure areas.

 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2016 | 9:50:27 AM
RCE
Has there been a patched released by the vendors to mitigate this RCE flaw?
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20168
PUBLISHED: 2018-12-17
Google gVisor before 2018-08-22 reuses a pagetable in a different level with the paging-structure cache intact, which allows attackers to cause a denial of service ("physical address not valid" panic) via a crafted application.
CVE-2018-20167
PUBLISHED: 2018-12-17
Terminology before 1.3.1 allows Remote Code Execution because popmedia is mishandled, as demonstrated by an unsafe "cat README.md" command when \e}pn is used. A popmedia control sequence can allow the malicious execution of executable file formats registered in the X desktop share MIME typ...
CVE-2018-20161
PUBLISHED: 2018-12-15
A design flaw in the BlinkForHome (aka Blink For Home) Sync Module 2.10.4 and earlier allows attackers to disable cameras via Wi-Fi, because incident clips (triggered by the motion sensor) are not saved if the attacker's traffic (such as Dot11Deauth) successfully disconnects the Sync Module from the...
CVE-2018-20159
PUBLISHED: 2018-12-15
i-doit open 1.11.2 allows Remote Code Execution because ZIP archives are mishandled. It has an upload feature that allows an authenticated user with the administrator role to upload arbitrary files to the main website directory. Exploitation involves uploading a ".php" file within a "...
CVE-2018-20157
PUBLISHED: 2018-12-15
The data import functionality in OpenRefine through 3.1 allows an XML External Entity (XXE) attack through a crafted (zip) file, allowing attackers to read arbitrary files.