Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Camera. Show all posts

The Corona Mirai Botnet: Exploiting End-of-Life IP Cameras

The Corona Mirai Botnet: Exploiting End-of-Life IP Cameras

A recent report by Akami experts highlights a troubling trend: the exploitation of a five-year-old zero-day vulnerability in end-of-life IP cameras by the Corona Mirai-based malware botnet. This blog delves into the details of this issue, its implications, and the broader lessons it offers for cybersecurity.

The Vulnerability in AVTECH IP Cameras

The specific target of this malware campaign is AVTECH IP cameras, which have been out of support since 2019. These cameras are no longer receiving security patches, making them prime targets for cybercriminals. The vulnerability in question is a remote code execution (RCE) zero-day, which allows attackers to inject malicious commands into the camera’s firmware via the network. This particular exploit leverages the ‘brightness’ function in the camera’s firmware, a seemingly harmless feature that has become a gateway for malicious activity.

The Corona Mirai-Based Malware Botnet

The Corona Mirai-based malware botnet is a variant of the infamous Mirai botnet, which has been responsible for some of the most significant distributed denial of service (DDoS) attacks in recent history. By exploiting the RCE vulnerability in AVTECH IP cameras, the malware can gain control over these devices, adding them to its botnet. Once compromised, these cameras can be used to launch DDoS attacks, overwhelm networks, and disrupt services.

The Implications of Exploiting End-of-Life Devices

The exploitation of end-of-life devices like AVTECH IP cameras underscores a critical issue in cybersecurity: the risks associated with using outdated and unsupported technology. When manufacturers cease support for a device, it no longer receives security updates, leaving it vulnerable to new threats. In the case of AVTECH IP cameras, the lack of patches for the RCE vulnerability has made them easy targets for cybercriminals.

This situation highlights the importance of regular updates and patches in maintaining the security of devices. It also raises questions about the responsibility of manufacturers to provide long-term support for their products and the need for users to replace outdated technology with more secure alternatives.

Experts Suggest These Steps

  • Ensuring that all devices receive regular updates and patches is crucial in protecting against new vulnerabilities. Users should prioritize devices that are actively supported by manufacturers.
  • Manufacturers should clearly communicate end-of-life policies and provide guidance on replacing outdated devices. Users should be aware of these policies and plan for timely replacements.
  • Implementing network segmentation can help contain the impact of compromised devices. By isolating vulnerable devices from critical systems, organizations can reduce the risk of widespread damage.

Hacker Gang Holds Amazon's Ring to Ransom

 

Amazon's Ring, a popular brand of home security cameras, is facing a major cybersecurity threat. The company has been targeted by a ransomware gang, which has threatened to release sensitive data about Ring's customers if the company does not pay up.

According to reports, the ransomware gang, known as 'Grief,' gained access to Ring's systems through a vulnerability in the company's app. The gang then demanded a ransom of $50 million, threatening to release data on Ring's customers if the company did not comply.

The ring has stated that it will not pay the ransom, and has instead launched an investigation into the attack. The company has also said that it is working with law enforcement to identify and prosecute the perpetrators.

The attack on Ring is just the latest in a series of high-profile cyber attacks that have targeted companies and organizations around the world. These attacks are becoming increasingly sophisticated, and are often carried out by organized criminal groups.

One of the reasons that cyber attacks are becoming more common is that companies are not doing enough to protect themselves. Many companies still use outdated software and security systems, which are vulnerable to attack. In addition, many companies are not investing enough in cybersecurity, either because they do not see it as a priority or because they do not have the resources to do so.

In the case of Ring, the company has come under fire for its lack of transparency and its use of third-party trackers in its app. The Electronic Frontier Foundation (EFF) has raised concerns about the app's use of third-party trackers, which can collect data on users without their knowledge or consent.

Overall, the cyber attack on Ring is a reminder of the importance of cybersecurity in the increasingly digital world. Companies must take steps to protect themselves from attacks, and consumers must be aware of the risks that come with using connected devices. With cyber-attacks becoming more frequent and sophisticated, it is essential that we all take cybersecurity seriously.



Vulnerability in allows hackers to steal private pictures from digital cameras




The International Imaging Industry Association has devised a 'standardised protocol' known as  Picture Transfer Protocol  (PTP) to move digital pictures from camera to PC seeing as Modern Cameras which connect with a PC by means of USB or WiFi systems are said to have been vulnerable against ransomware and malware attacks.

A research report from Check Point Research ascribes the danger to Picture Transfer Protocol (PTP) used to transfer digital pictures from camera to PC.

For their research, Check Point utilized Canon's EOS 80D DSLR camera which supports both USB and WiFi, and basic vulnerabilities in the PTP were found. Given that the protocol is standardized and installed in other camera brands, it is reasonable for expect that comparable vulnerabilities can be found in cameras from different sellers too.

The transfer protocol was at first centered around picture transfer, but it evolved further to incorporate many various commands that support anything from taking a live picture to overhauling the camera's firmware.

Eyal Itkin, Security Researcher, Check Point Software Technologies says that, “Any ‘smart’ device, including the DSLR camera, is susceptible to attacks; cameras are no longer just connected to the USB, but to the WiFi network and its surrounding environment. This makes them more vulnerable to threats as attackers can inject ransomware into both the camera and PC it is connected to. The photos could end up being held hostage until the user pays the ransom for them to be released.”

Here are some important measures the camera owners can take in order to avoid being infected:

  • Ensure your camera is utilizing the most recent firmware version, and install a patch if available.
  • Turn off the camera's WiFi when not being used
  • When utilizing Wi-Fi, take a stab at utilizing the camera as the Wi-Fi___33 access point (basically, design the camera to go about as a Wi-Fi hotspot), instead of connecting your camera to an open Wi-Fi network.