Get all access to the world's best video surveillance information.

Is Hacking IP Cameras A Major Risk?

by John Honovich, IPVM posted on Aug 02, 2009 About John Contact John

Fears are rising that IP cameras can and willl be hacked. At Defcon, a demonstration showed an IP camera's feed intercepted and replaced by a fraudulent video, allowing a hypothetical suspect to steal an object right in front of the surveillance camera; thus bringing Hollywood to 'real life.'

What Do You Think?

Demo of the Hack

Here's a demo of the hack (the theft occurs at the end of the clip). Note the company that does the hack sells software to prevent it.

Bigger Risks Routinely Accepted

As titilating as this demo may be, there are far bigger risks that most real-world security organizations accept every day, such as:

  • Most security cameras are not watched live. For all those cameras, there's no need for any fancy hacks. Just walk on in. On the way out, find the recorder and take it with you.
  • When security cameras fail, almost no one responds immediately. At best, a trouble ticket or call is opened and the camera is checked in the next few business days. If the cameras are being monitored live, simply shut down the recorder or the power to the recorder/cameras. Most operations will see this as a nuisance but will not shut down the building (casinos, as always, the exception).
Difficulty to Do in a Real Environment
It's one thing to do this in a demo, it's far harder to pull this off in a real environment. Let's say you are one of the very few organizations who both watches cameras live and takes immediate action to cameras going out. The attacker would still need to:
  • Get access to the internal LAN of the target organization.
  • Pull this hack off against many cameras. These types of organizations are going to have dense camera coverage, which means 3, 5, 10 or more cameras need to be commandeered.
  • The attacker will also have to figure out where these cameras are - which generally is not easy. Steal the CAD drawings? Hack in to the VMS system to see the layout? Certainly theoretically possible but not easy to do.
  • The demo presumes the use of standard signaling protocols and CODECs. IP video surveillance is famous for its lack of standards. The attacker will have to know which proprietary interface each camera uses and have solutions for each variety. Good luck.
If the attacker is this cunning, intelligent and determined, wouldn't there be higher value targets? Steal critical information, access financial accounts, etc. Or do this legally by becoming a quant at an investment bank?
Security Theatre
This type of attack is security theater - the type of risk that sounds exciting and threatening but is simultaneously unrealistic and ignores more fundamental risks that should be addressed. Maybe maximum level security operations should examine this but I suspect even they have more basic flaws in their video surveillance that need to be addressed first.

Most Recent Industry Reports

Testing Axis' Top Low Light Camera Q1635 on Nov 23, 2015
Low light performance continues to improve, first driven by advances in image processing and now increasing number of 1/2" imagers in 1080p HD cameras. IPVM has recently tested new super low light...

Audio Analytics Aggression Tested on Nov 20, 2015
What if you could use your IP cameras to detect fights before they start?  That is the goal of Louroe / Sound Intelligence with their recently released Aggression Detector audio analytics. Cl...

Pelco Optera 12MP Multi-Imager Tested on Nov 09, 2015
This summer, Pelco came out firing against Arecont, touting the superior performance of its new multi-imager line vs Arecont's. But is this really the case? We bought a Pelco Optera 180° multi...

IP Camera Bootup Shootout 2015 on Nov 04, 2015
IP cameras, like PCs, take some time to boot up. And just like PCs, the amount of time can vary greatly. Many people do not care but some people find it annoying. Perhaps more importantly, in surve...

Live From China on Nov 02, 2015
China's growing influence, if not dominance, of the global video surveillance market is unquestionable. To better understand this, IPVM has gone to China. Our first stop is CPSE, which claims ~100...

Network Cabling for Video Surveillance Guide on Oct 30, 2015
In this 14 page guide, we teach the fundamentals of network cabling for video surveillance networks, how they should be installed, and the differences in testing them for production networks. Spec...

Large Video Surveillance Systems Guide on Oct 29, 2015
This 14 page guide explains the key uses, design factors, and players in the large system surveillance market. A global group of 80 integrators responded, each offering insig...

Sony 20MP / 4K Camera Tested on Oct 26, 2015
For 18 month, Sony has been hyping 4K cameras, a year before they even announced a 4K network camera. Now, amidst intense competition and price pressure, Sony has released their long awaited 2...

ONVIF Screen Capture Tested on Oct 23, 2015
Recording a PC's screen to a VMS has several uses, but historically has required expensive dedicated encoders or specialized software for each VMS. Now, a new offering called Screen ONVIF has...

Milestone Arcus VMS Tested on Oct 21, 2015
For more than a decade, Milestone was a Windows only VMS. With the Internet shifting power away from Windows OSes, Milestone launched a new VMS, called Arcus, which can be embedded onto Linux ...