Reports are currently circulating about another “hack” that should actually lead to the manufacturers of the affected devices being held accountable. Because the cause is simply limitless negligence.
In the course of the incident, the attackers from the “Advanced Persistent Threat 69420” group were able to gain access to around 150,000 networked surveillance cameras. These are systems from the manufacturer Verkada, which not only offers online access to the camera images but also switches on AI-supported analysis tools with face recognition and other functions.
Initial reports show the break into the systems as a hack that was not too complicated but involved a bit of effort. On closer inspection, however, it was not. Rather, the attackers exploited a mixture of negligence and a blatantly poor security concept. This is shown in a report by ThreadPost.
It could hardly be worse
Because the hacker group simply stumbled upon an admin password that could be found openly on the net. With this, they could log into the Verkadas platform and got direct access to all connected systems. Ultimately, this also means that company employees can just as easily examine the customers’ pictures. In view of the fact that surveillance cameras are also used in sensitive areas, this is likely to weigh heavily on trust in the manufacturer.
Read This: Ryuk Trojan Attacking Via WiFi Networks
But the matter also shows how carelessly users deal with such systems. Surveillance cameras were found hanging in Tesla’s production areas, in hospitals, schools and fitness studios and streaming their recordings live to the AI servers in the cloud. Ultimately, this is how sensitive recordings arrive on computers, on which they can completely slip out of control.
Manager at Research Snipers, RS-NEWS, Digital marketing enthusiast and industry professional in Digital Marketing, Social Media, Business News, and Technology News, with vast experience in the media industry, I have a keen interest in business technology, News breaking.