Vulnerabilities / Threats

6/29/2016
09:05 AM
50%
50%

Over 25,000 IoT CCTV Cameras Used In DDoS Attack

Probe uncovers attacks generated from 105 global locations and delivering 50,000 HTTP requests per second.

More than 25,000 IoT CCTV devices located worldwide have been hacked and are being used for a denial-of-service botnet attack, reports Network World quoting security research firm Sucuri. The botnet, discovered during a jewelry store DDoS attack probe, was found to deliver 50,000 HTTP requests per second.

“It is not new that attackers have been using IoT devices to start their DDoS campaigns,” says Sucuri. “However, we have not analyzed one that leveraged only CCTV devices and was still able to generate this quantity of requests for so long.”

According to Sucuri, the attacks, “a variation of the HTTP flood and cache bypass attack,” were initiated from 25,513 unique IP addresses in 105 countries with 5% of the IPs being IPv6. The most compromised CCTV devices were located in Taiwan, USA, Indonesia, Mexico, Malaysia and Israel, Italy, Vietnam, France and Spain, says Sucuri adding that around 46% of the cameras had default H.264 DVR logos.

Sucuri believes the CCTV devices may have been hacked via the remote code execution (RCE) flaw recently found to affect CCTV-DVR devices sold by some vendors.

Read full story at Network World.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
uRock
50%
50%
uRock,
User Rank: Apprentice
7/1/2016 | 11:31:31 AM
Where can we find which vendors?
I have a Swann system and would like to know if it is vulnerable. 

I am sure mine isn't being used as it is not connected to any router with internet access. It would still be nice to know if I should worry about this if I were to put it on my regular LAN.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2016 | 1:04:52 PM
Re: CCTV
I would think some level of functionality would need to be maintained otherwise the owner of the CCTV would be alerted pretty quickly.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 11:18:48 AM
Compromised CCTV
" The most compromised CCTV devices were located in Taiwan, USA, Indonesia, Mexico, Malaysia and Israel, Italy, Vietnam, France and Spain, says Sucuri "

Another question; are these the countries using CCTV devices most?
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 11:16:08 AM
Re: RCE
Or follow up question, do they know that their devises are vulnerable? :--))
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 11:14:40 AM
CCTV
A question came to my mind: What happens when CCTV is attacked, it does not record? That is a good way of disabling cameras in secure areas.

 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2016 | 9:50:27 AM
RCE
Has there been a patched released by the vendors to mitigate this RCE flaw?
WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/19/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
NC Water Utility Fights Post-Hurricane Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  10/16/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.