Get all access to the world's best video surveillance information.

Is Hacking IP Cameras A Major Risk?

by John Honovich, IPVM posted on Aug 02, 2009 About John Contact John

Fears are rising that IP cameras can and willl be hacked. At Defcon, a demonstration showed an IP camera's feed intercepted and replaced by a fraudulent video, allowing a hypothetical suspect to steal an object right in front of the surveillance camera; thus bringing Hollywood to 'real life.'

What Do You Think?

Demo of the Hack

Here's a demo of the hack (the theft occurs at the end of the clip). Note the company that does the hack sells software to prevent it.

Bigger Risks Routinely Accepted

As titilating as this demo may be, there are far bigger risks that most real-world security organizations accept every day, such as:

  • Most security cameras are not watched live. For all those cameras, there's no need for any fancy hacks. Just walk on in. On the way out, find the recorder and take it with you.
  • When security cameras fail, almost no one responds immediately. At best, a trouble ticket or call is opened and the camera is checked in the next few business days. If the cameras are being monitored live, simply shut down the recorder or the power to the recorder/cameras. Most operations will see this as a nuisance but will not shut down the building (casinos, as always, the exception).
Difficulty to Do in a Real Environment
It's one thing to do this in a demo, it's far harder to pull this off in a real environment. Let's say you are one of the very few organizations who both watches cameras live and takes immediate action to cameras going out. The attacker would still need to:
  • Get access to the internal LAN of the target organization.
  • Pull this hack off against many cameras. These types of organizations are going to have dense camera coverage, which means 3, 5, 10 or more cameras need to be commandeered.
  • The attacker will also have to figure out where these cameras are - which generally is not easy. Steal the CAD drawings? Hack in to the VMS system to see the layout? Certainly theoretically possible but not easy to do.
  • The demo presumes the use of standard signaling protocols and CODECs. IP video surveillance is famous for its lack of standards. The attacker will have to know which proprietary interface each camera uses and have solutions for each variety. Good luck.
If the attacker is this cunning, intelligent and determined, wouldn't there be higher value targets? Steal critical information, access financial accounts, etc. Or do this legally by becoming a quant at an investment bank?
Security Theatre
This type of attack is security theater - the type of risk that sounds exciting and threatening but is simultaneously unrealistic and ignores more fundamental risks that should be addressed. Maybe maximum level security operations should examine this but I suspect even they have more basic flaws in their video surveillance that need to be addressed first.

Most Recent Industry Reports

The 4MP Shootout - Dahua vs Hikvision on Sep 30, 2015
4MP cameras are an important emerging trend in video surveillance, aiming to replace 1080p. This is being driven by new sensors from OmniVision that deliver almost twice the pixel count of 1080p a...

33 New Products Directory - Fall 2015 on Sep 28, 2015
 New products or major tech isssues that IPVM has reported on this summer / fall: Axis Releases Their Own Video Analytics Axis Non-IP Camera / DVR Kit Is Here BluB0X - The Most ...

Axis YouTube Livestreaming Camera App Tested on Sep 25, 2015
Broadcasting live video has historically been complex and costly, with manual setup and pricey monthly subscriptions required. Now, Camstreamer is aiming to change that, with an Axis Camera A...

Anixter/Tri-Ed Northern Video Tested on Sep 18, 2015
ADI is an IP video manufacturer now (see IPVM's ADI W Box test results). And now, their top rival, Anixter's Tri-Ed arm has also entered the IP video manufacturering business, under the North...

Axis Digital Autotracking Tested on Sep 16, 2015
As camera resolutions continues to climb, the likelihood that you will ever display any camera at full resolution on a monitor declines. This is even more improbable for the normal configuration of...

Access Control Book 2015 on Sep 16, 2015
This book is the textbook for our Access Control Course, today is the last day to get in the course. This is the best, most comprehensive access control training in the world, based on o...

Hikvision iVMS-4200 Tested on Sep 14, 2015
Though best known for their camera and recorders, mega Chinese manufacturer also makes their own VMS software. In this report, we share test results of Hikvision's iVMS-4200, their VMS that works ...

Google Breaks Surveillance Browser Support on Sep 09, 2015
Now you have a choice. Broken video surveillance web browser support or an insecure, prone to crashing interface. As Google has been warning for ~2 years, Chrome has now discontinued NPAPI suppor...

The $28 Million Video Doorbell Ring Tested on Sep 08, 2015
In 2015, video doorbells are big business. Ring landed $28 million in funding from Richard Branson and others who are betting that this is the next big thing. However, when Ring's first generation...

5 Low Cost IR Illuminators Tested on Sep 03, 2015
IR illumination has increased in popularity, with built in IR becoming a common feature in low-cost models. But when low light needs exceed the relatively short ranges of these cameras (usually 100...