Monday, March 20, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

How internet-facing webcams could put your organization at risk

Researcher by Researcher
March 14, 2023
in Cybersecurity
0
How internet-facing webcams could put your organization at risk
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


By exploiting webcams and other IoT devices, hackers can spy on private and professional conversations, potentially giving them access to sensitive information, says BitSight.

A webcam on a monitor.
Image: Peter/Adobe Stock

Imagine a cybercriminal hacking into an internet-facing webcam set up in your organization and spying on a meeting, a manufacturing process or an internal training session. Then imagine what that person could do with the information they obtained. That’s exactly the scenario laid out by cyber risk company BitSight.

For a new report about insecure IoT devices, BitSight discovered that one in 12 organizations with internet-facing webcams or similar devices failed to properly secure them, leaving them vulnerable to video or audio compromise. Specifically, 3% of organizations tracked by BitSight had at least one internet-facing video or audio device. Among those, 9% had at least one device with exposed video or audio feeds, giving someone the ability to directly view those feeds or eavesdrop on conversations.

Related articles

undetected since 2021 and resists firmware update

undetected since 2021 and resists firmware update

March 20, 2023
Sentra Raises $30 Million for DSPM Technology

New ‘Trigona’ Ransomware Targets US, Europe, Australia

March 20, 2023

Jump to:

Which organizations are most at risk to this hacking?

The organizations analyzed included ones in the hospitality, education, technology and government sectors. Out of these, the education area was at the greatest risk, with one in four using internet-facing webcams and similar devices susceptible to video or audio compromise.

Further, Fortune 1000 companies suffered the greatest exposure, including a Fortune 50 technology subsidiary, a Fortune 100 entertainment company, a Fortune 50 telecommunications company, a Fortune 1000 hospitality company and a Fortune 50 manufacturing company.

Which devices were analyzed in this cyber risk survey?

Most of the devices analyzed by BitSight use the Real-Time Streaming Protocol to communicate over the internet, though some use HTTP and HTTPS protocols. With RTSP, users can send video and audio content and run commands to record, play and pause the feed.

Though many of the devices examined for the report were webcams, the analysis also included network video recorders, smart doorbells and smart vacuums. Some devices were actually set up for security purposes.

Why the devices are at risk of being hacked

Must-read security coverage

The internet-facing devices analyzed were not behind a firewall or VPN, leaving them open to fingerprinting and threats. Certain exposed devices were improperly configured, with some lacking any type of password set by the user. Other devices were stuck with a security flaw, with many hit by a specific access control vulnerability called an insecure direct object references vulnerability.

IDOR vulnerabilities have become more worrisome as of late, according to BitSight. In 2022, BitSight discovered several critical such vulnerabilities in a popular vehicle GPS tracker. Labeled as CVE-2022-34150, this flaw could allow a hacker to grab information from any device ID regardless of the user account signed into the device.

At the very least, the video or audio feed should be protected by access control measures; however, many of them were not secured in this way, allowing attackers to view video feeds and spy on conversations. A savvy hacker could even alter the exposed feeds to spread false information, BitSight explained.

What are possible security impacts of such hacks?

Vulnerable webcams and other IoT devices open the door for several types of threats. An attacker could view private meetings and other conversations, enabling them to gather personal data or compromising information through a video or audio feed. The actual locations of employees and other people could be exposed. A hacker could also access business-related activities and conversations, allowing them to pick up sensitive information not only of the company but of any third parties.

The exposed information could threaten physical security. Some of the webcams analyzed by BitSight control secure doors and rooms, potentially giving criminals the information needed to thwart the security. Further, an organization’s overall cybersecurity could be at risk. Access to vulnerable audio and video devices gives attackers more data to compromise your internal systems and networks.

Some of the areas with vulnerable webcams included manufacturing facilities, laboratories, meeting rooms, school buildings and hotel lobbies.

How to reduce the risk from exposed webcams and IoT devices

To help your organization lessen the risk from internet-facing webcams and other IoT devices, BitSight offers a few tips.

First, identify any video or audio devices deployed across your organization and your business partners. Then analyze the security of these devices.

Put any vulnerable devices behind a firewall or VPN.

Set up access control measures to protect any devices that lack the proper authentication.

For devices that suffer from a software vulnerability, the developer needs to step in to provide a patch or otherwise secure the device. If the vendor can’t or won’t do this, your only option may be to switch to a different device or brand.

“This research shows that even everyday technologies, such as webcams, can leave organizations highly vulnerable if exposed,” BitSight Chief Risk Officer Derek Vadala said in a press release. “Understanding how these devices can increase an organization’s attack surface and taking the steps to deploy them in a manner that limits potential threats is critical.”

Read next: Top industrial IoT security solutions (TechRepublic)



Source link

Tags: InternetFacingorganizationputriskWebcams
Share76Tweet47

Related Posts

undetected since 2021 and resists firmware update

undetected since 2021 and resists firmware update

March 20, 2023
0

A possible Chinese attack campaign on compromised unpatched SonicWall SMA edge devices stayed undetected since 2021 and could persist even...

Sentra Raises $30 Million for DSPM Technology

New ‘Trigona’ Ransomware Targets US, Europe, Australia

March 20, 2023
0

A new ransomware family has proven highly active over the past several months, cybersecurity firm Palo Alto Networks warns. Dubbed...

Biden administration sees dangers in cloud, but users must protect perimeters

Biden administration sees dangers in cloud, but users must protect perimeters

March 19, 2023
0

Image: Maksym Yemelyanov/Adobe Stock President Joe Biden’s administration, as part of its recently released National Cybersecurity Strategy, said critical sectors...

Huawei Has Replaced Thousands of US-Banned Parts With Chinese Versions: Founder

Huawei Has Replaced Thousands of US-Banned Parts With Chinese Versions: Founder

March 19, 2023
0

Chinese technology giant Huawei has replaced thousands of product components banned by the United States with homegrown versions, its founder...

How to prevent data theft by existing and departing employees

How to prevent data theft by existing and departing employees

March 19, 2023
0

Some 12% of employees take customer details, health records, sales contracts and other confidential data when leaving a company, according...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
undetected since 2021 and resists firmware update

undetected since 2021 and resists firmware update

March 20, 2023
Sentra Raises $30 Million for DSPM Technology

New ‘Trigona’ Ransomware Targets US, Europe, Australia

March 20, 2023
What’s the Best Way to Sack People?

What’s the Best Way to Sack People?

March 20, 2023
Biden administration sees dangers in cloud, but users must protect perimeters

Biden administration sees dangers in cloud, but users must protect perimeters

March 19, 2023

Recent Posts

undetected since 2021 and resists firmware update

undetected since 2021 and resists firmware update

March 20, 2023
Sentra Raises $30 Million for DSPM Technology

New ‘Trigona’ Ransomware Targets US, Europe, Australia

March 20, 2023
What’s the Best Way to Sack People?

What’s the Best Way to Sack People?

March 20, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved