X
Get all access to the world's best video surveillance information.
Logo 8fbbe83a6ce128d4940dbb3787cc2aeaf3d9938b15d0b711b17d116501531882
2016 book promo

Is Hacking IP Cameras A Major Risk?

Author: John Honovich, Published on Aug 02, 2009

Fears are rising that IP cameras can and willl be hacked. At Defcon, a demonstration showed an IP camera's feed intercepted and replaced by a fraudulent video, allowing a hypothetical suspect to steal an object right in front of the surveillance camera; thus bringing Hollywood to 'real life.'

What Do You Think?

Demo of the Hack

Here's a demo of the hack (the theft occurs at the end of the clip). Note the company that does the hack sells software to prevent it.

Bigger Risks Routinely Accepted

As titilating as this demo may be, there are far bigger risks that most real-world security organizations accept every day, such as:

  • Most security cameras are not watched live. For all those cameras, there's no need for any fancy hacks. Just walk on in. On the way out, find the recorder and take it with you.
  • When security cameras fail, almost no one responds immediately. At best, a trouble ticket or call is opened and the camera is checked in the next few business days. If the cameras are being monitored live, simply shut down the recorder or the power to the recorder/cameras. Most operations will see this as a nuisance but will not shut down the building (casinos, as always, the exception).
Difficulty to Do in a Real Environment
It's one thing to do this in a demo, it's far harder to pull this off in a real environment. Let's say you are one of the very few organizations who both watches cameras live and takes immediate action to cameras going out. The attacker would still need to:
  • Get access to the internal LAN of the target organization.
  • Pull this hack off against many cameras. These types of organizations are going to have dense camera coverage, which means 3, 5, 10 or more cameras need to be commandeered.
  • The attacker will also have to figure out where these cameras are - which generally is not easy. Steal the CAD drawings? Hack in to the VMS system to see the layout? Certainly theoretically possible but not easy to do.
  • The demo presumes the use of standard signaling protocols and CODECs. IP video surveillance is famous for its lack of standards. The attacker will have to know which proprietary interface each camera uses and have solutions for each variety. Good luck.
If the attacker is this cunning, intelligent and determined, wouldn't there be higher value targets? Steal critical information, access financial accounts, etc. Or do this legally by becoming a quant at an investment bank?
Security Theatre
This type of attack is security theater - the type of risk that sounds exciting and threatening but is simultaneously unrealistic and ignores more fundamental risks that should be addressed. Maybe maximum level security operations should examine this but I suspect even they have more basic flaws in their video surveillance that need to be addressed first.


4 reports cite this report:

Wireless Video Surveillance Hijacking Threat on Mar 25, 2011
An Australian investigative report is highlighting the risk that video surveillance systems face ...

Stopping Surveillance 'Videojacking' on Feb 16, 2011
A rising fear among security professionals is that surveillance video can be 'hijacked' and put o...

Network Security Concerns Examined on Nov 05, 2009
At an ISC West 2009 presentation, Slayton Solutions spoke in detail on the vulnerabilities of net...

Guidelines for Commenting on Reports on Aug 21, 2009
With over 2000 total comments so far, comments are one of the most useful and important elements ...

Other Reports on IP Cameras

Network Ports for IP Video Surveillance Tutorial on Jan 20, 2016
Network ports are critical for remote video viewing and recording and without proper configuratio...

H.265 / HEVC Codec Tutorial on Jan 19, 2016
H.265 / HEVC has been promised for many years as the next big CODEC and the successor to H.264. N...

Camera Course Winter 2016 (Closed) on Jan 13, 2016
Here is what is new for the 2016 course: HD analog: Expanded coverage on non-IP HD offerings...

IP Camera Pricing and Markups Statistics 2015 on Dec 11, 2015
100+ integrators told IPVM their average IP camera pricing and markups. In this note, we share s...

Camera AoV / Focal Length Comparison on Nov 24, 2015
Use the IPVM Camera Calculator to better understand the tradeoffs between different Angle of View...

How a Security Camera is Made on Nov 18, 2015
While in China, we toured factories, seeing how cameras were made. In the 15 minute video inside...

IP Camera Trolling - Cybersecurity Showcase on Nov 09, 2015
If you want to convince your customers about the importance of cybersecurity and the risk of bein...

Network Connectors for IP Cameras Guide on Nov 05, 2015
Fewer installation tasks are as nuanced as terminating cables and attaching connectors. Fortunate...

IP Camera Bootup Shootout 2015 on Nov 04, 2015
IP cameras, like PCs, take some time to boot up. And just like PCs, the amount of time can vary g...

Network Cabling for Video Surveillance Guide on Oct 30, 2015
In this 14 page guide, we teach the fundamentals of network cabling for video surveillance networ...


Most Recent Industry Reports

Hikvision Video Analytics Tested on Feb 04, 2016
We tested Hikvision's video analytics on six Hikvision models, ranging from entry level to high e...

Last Chance - IP Networking Course on Feb 04, 2016
Today is the last day to get into the course. Our most popular course starts next week (February...

Add Your Preferred Camera Manufacturer to the Calculator on Feb 03, 2016
One of the most popular features of our Camera Calculator is choosing specific models. Indeed, me...

Axis vs Avigilon vs FLIR vs Hikvision vs Samsung Camera Pricing on Feb 03, 2016
The 'race to the bottom' is a big issue, with average prices dropping sharply over the past few y...

Network Security for IP Video Surveillance Guide 2016 on Feb 03, 2016
Keeping surveillance networks secure can be a daunting task, but there are several methods that c...

Resolution Usage Statistics 2016 on Feb 02, 2016
In the past few years, 4MP, 6MP, 4k (8.3MP) and 12MP cameras have become increasingly commonplace...

Avigilon H4 HD Cameras Released on Feb 01, 2016
Avigilon has announced a new generation of cameras, the H4. In this note, based on speaking with...

Honeywell Pro-Watch Access Control Profile on Feb 01, 2016
Inside we examine Honeywell Pro-Watch access control line: Comparing Honeywell to their compet...

Axis Acquires Video Analytics Firm Citilog on Feb 01, 2016
Axis rarely makes acquisitions. They get acquired, of course, (i.e., by Canon for $2.8 billion US...

Face Recognition Camera Tested (Netatmo) on Jan 29, 2016
Can face recognition make home security "better"? That is the bold claim from startup Netatmo wit...