Vulnerabilities / Threats
6/29/2016
09:05 AM
50%
50%

Over 25,000 IoT CCTV Cameras Used In DDoS Attack

Probe uncovers attacks generated from 105 global locations and delivering 50,000 HTTP requests per second.

More than 25,000 IoT CCTV devices located worldwide have been hacked and are being used for a denial-of-service botnet attack, reports Network World quoting security research firm Sucuri. The botnet, discovered during a jewelry store DDoS attack probe, was found to deliver 50,000 HTTP requests per second.

“It is not new that attackers have been using IoT devices to start their DDoS campaigns,” says Sucuri. “However, we have not analyzed one that leveraged only CCTV devices and was still able to generate this quantity of requests for so long.”

According to Sucuri, the attacks, “a variation of the HTTP flood and cache bypass attack,” were initiated from 25,513 unique IP addresses in 105 countries with 5% of the IPs being IPv6. The most compromised CCTV devices were located in Taiwan, USA, Indonesia, Mexico, Malaysia and Israel, Italy, Vietnam, France and Spain, says Sucuri adding that around 46% of the cameras had default H.264 DVR logos.

Sucuri believes the CCTV devices may have been hacked via the remote code execution (RCE) flaw recently found to affect CCTV-DVR devices sold by some vendors.

Read full story at Network World.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
uRock
50%
50%
uRock,
User Rank: Apprentice
7/1/2016 | 11:31:31 AM
Where can we find which vendors?
I have a Swann system and would like to know if it is vulnerable. 

I am sure mine isn't being used as it is not connected to any router with internet access. It would still be nice to know if I should worry about this if I were to put it on my regular LAN.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2016 | 1:04:52 PM
Re: CCTV
I would think some level of functionality would need to be maintained otherwise the owner of the CCTV would be alerted pretty quickly.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 11:18:48 AM
Compromised CCTV
" The most compromised CCTV devices were located in Taiwan, USA, Indonesia, Mexico, Malaysia and Israel, Italy, Vietnam, France and Spain, says Sucuri "

Another question; are these the countries using CCTV devices most?
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 11:16:08 AM
Re: RCE
Or follow up question, do they know that their devises are vulnerable? :--))
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/29/2016 | 11:14:40 AM
CCTV
A question came to my mind: What happens when CCTV is attacked, it does not record? That is a good way of disabling cameras in secure areas.

 
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2016 | 9:50:27 AM
RCE
Has there been a patched released by the vendors to mitigate this RCE flaw?
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.