Hikvision NA CEO Declares IPVM "The Most Outrageous Behavior I Have Seen In My 27 Years In The Global Security Industry."
If you thought that the most outrageous behavior would be to ship tens of millions of cameras with a magic string backdoor so easy a 5 year old could exploit it, you would be wrong, according to Hikvision NA CEO Jeffrey He.
The truly most outrageous behavior, according to Hikvision, was IPVM releasing an 84 second video demonstrating how their backdoor worked, embedded below:
Jeffrey He declared:
I must point out that there are misperceptions about Hikvision. These misperceptions were intentionally spurred by a single source which misleads our community on the real risks we are all facing. That third party is here to distract from combatting criminal and terrorist activities which should be the main focus of the security industry. Even worse, that third party provided step-by-step video tutorials on how to hack vital security equipment on the end-user premises. This is the most outrageous behavior I have seen in my 27 years in the global security industry. [emphasis added]
Jeffrey is embarrassed, it is understandable. What can he say? Another 'coding error' by 1 'bad' engineer out of their claimed 10,000 'engineers'?
It is much easier to place blame on others than to fix their underlying engineering problems or, worse, their ownership and control by the Chinese government.
Why the video?
- To show Hikvision backdoor's insertion was no 'coding error.'
- To show how severe the risk was of the backdoor, given its ease of exploit.
- To leverage the instructions that were already distributed globally to hackers and researchers.
- To educate our industry about these problems in an extremely quick, visual manner.
The fact that the video was only 84 seconds shows how badly and simple to exploit the backdoor is.
If Hikvision wants to complain that they are the victims of outrageous behavior, fine by us. It will, though, keep it in public conscious and do nothing to solve Hikvision's actual problems.
10/24/17 10:28pm
What Hikvision is really saying:
You MFers! If you kept quiet about this we coulda fixed everything at our own pace without anyone knowing or complaining about this! For all we know, it's YOUR fault people are exploiting this now!
This is the most outrageous behavior I have seen in my 27 years in the global security industry.
Mr. He has led a sheltered life and needs to stop engaging IPVM aka The Blogger.
That third party is here to distract from combatting criminal and terrorist activities which should be the main focus of the security industry.
So tired of reading these type of statements from politicians, Hollywood and executives that are designed to get sheeple to nod their heads yes without thought. IPVM has taught me tons and has never distracted me.
That third party is here to distract from combatting criminal and terrorist activities which should be the main focus of the security industry.
Brian*: Bad news Sir, Interpol is getting ready to move in on another ISIS terrorist cell.
Head Honchovich: I see... What do we have left in the unreleased exploits vault?
Brian: We’re down to 5 Dahua hacks, a couple of Vivoteks and that last Hik hack... And bashis is taking a personal day today, so...
Head Honchovich: Again? Whatever... Prepare to release the Magic String Video! That’ll keep ‘em busy for a while, eh?
*Either
Whose your daddy now, huh! That’s right, that’s Mr. Blogger to you.
Today it’s an 84 second clip, tomorrow it will be 83 seconds. Take that!
I am just glad we are a Dahua house...
Sh*$ never mind.....
I would be interested in knowing exactly what his "27 Years" of experience in the Global Security industry really is. Or uh yeah maybe we don't want to know :)
Hikvision CEO believes people will think the back doors were a mistake in coding because he is the CEO.
Few points maybe worth consideration.
Call any major US facility in DC and ask them how many times per day they get hacked by China. 8 years ago, it was only at 30,000 attempts per month. Now it is estimated to be in 1000s per week or day per US building.
Ask top ranking people in DOD why they don't buy Chinese cameras. Why they have labs to look for backdoors and Trojans to separate networks.
How many times has China been caught with backdoors in hardware, SW, cameras??????
What would be an easy way for a country to see what goes on in other countries would be to have thousands and thousands of "EYES" everywhere.
NSA has known about Chinese backdoors for years, cameras, SW, hardware.
Well maybe most of the people in the US will be gullible and believe the Hikvision CEO
In regards to 27 years in security were they to protect security.
You guys are really cynical in putting Jeffery down and just slamming his credentials in general. Do you know the man? Have any of you (besides John) ever met him? Or spoken to him? I have had that opportunity and Jeffery is a kind, soft spoken, gentleman that does not deserve to be lambasted just because he has a differing opinion. If you have something negative to say about Jeffery he has a habit of making himself available at every Major trade show so show up there and say it to his face.
Guys he is Chinese representing a Chinese State controlled manufacturer, what else was he going to say? No matter what his credentials are or even his actual thoughts on the matter. What He comes out with would be carefully orchestrated and most likely put upon the gentleman. One thing is sure, he will never speak his own mind in public, you don't do that in China. The newly permanently elected members of the Communist Party would get mighty upset if he did I suppose which would not be good for his career.
For anyone out there to think that any representative of Hik would ever openly admit to any wrong doing by Hik, causing millions of 'security' devices to be not fit for purpose, is simply outrageous...
Hik and it's employees will keep distracting from the real issue(s) by blaming others like He did at the top.
Thats awesome and hilarious... I'm biting my tongue right now!!
IPVM, thank you for doing the world a service. This is the only way manufacturers will pick up their game.

FYI, Hikvision is not the only one that has or did have this problem:
Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker
I treat all cameras as hackable. I use specific network hardware for a reason.

10/30/17 12:47pm
Nice guy or not... shipping security devices with a hard coded back door is the outrageous part (and I suspect HIK is not alone in this).
And now we've found out that Mr. He is technically competent enough to KNOW that hard coded backdoors are a threat to a security installation.
Everything else he (and Marty?) says on this topic are simply an attempt to re-direct blame or obfuscate the issue.

10/30/17 01:07pm
I'm a huge fan of IPVM and, I think it's a great source for information.
That noted and in my humble opinion, IPVM has focused enough (if not too much) on Hikvision and it's faults, the influence of the Chinese government, and even the likelihood of intentional weaknesses of its security. There are many other topics that can be pursued. For example, information on network switches that are ideal for the security industry would be helpful. A study/comparison on high-end storage solutions would also be good.
At a certain point, bashing Hikvision (even for good reason) starts making IPVM look less independent than it claims. One thought is, take Hikvision out of IPVM completely including the Camera Finder and other tools.
Again, just my opinion.
Apple, Microsoft, Google and others pay for this service. IPVM is providing it for free.
System hacks have been around since the inception of software. Every major manufacturer has had to deal with the fact that their software is a target. The major players all pay whitehats to identify these holes so they can be fixed.
The video and information IPVM posted online is similar to what the software giants had to deal with in the past. Since they did not want the bad press, it was initially easier to blame the whitehats identifying the issues then to admin the programming was flawed.
It seems that Hikvision has to learn this lesson.
Hack Apple, get paid -- by Apple
In a first for Apple, the company will pay up to $200,000 to researchers who find security problems in its systems.
Software giant Microsoft has revealed it is paying a hacker over $100,000 (£62,760) to find holes in its products.
Google will pay you $1,000 to hack some of Android’s most popular apps.
Hikvision need to take responsibility for its product. Since denial has been the normal response, publications such as IPVM, have taken on the issues and are notifying the end users of the flaws that they may encounter, and the security risks the product brings to their organizations.
Identify and posting the backdoor hack of the Hikvision product does increase the public's knowledge of the issues and will be used by blackhats to attack the existing systems. But its Hivision's responsibility to correct these issues. Blaming the end-users for lack of security and publications for posting flaws is counterproductive to all parties, including the manufacturer.
Here is the reality of capitalism a free market and freedom of speech. If the product is at a good price point, it works as advertised and fills a need it will likely succeed.
If the product has issues, consumer groups, consumers and competitors will take every opportunity to identify the flaws.
After so many years of denial and spin, Hikvision is feeling the market forces bearing down. Fixing the issues with the code is the easy part of the equation, fixing the market perception as a solid quality product is their long, very hard road.
Ed
Browsing through a news site, this article came to my attention. As everyone knows, HIK's success in the world market is based on their huge domestic market. Chinese government, the biggest buyer of the surveillance products and technologies, had to have a home grown supplier who they could control. The article gives some insight in China's political background behind rapid growth of Chinese security/surveillance industry. I wonder what brand is the PTZ camera in the picture.
Why don't we just cut to the chase and say raise your prices, or else it will continue.....
You only need to be half bright to realize under cutting security folk with cheap hardware and laxed security features would get you eaten alive.
Newest Discussions
Discussion | Posts | Latest |
---|---|---|
Started by
David Leinenbach
|
8
|
less than a minute by Undisclosed Manufacturer #1 |
Started by
Undisclosed #1
|
3
|
28 minutes by Undisclosed #2 |
Started by
Undisclosed Integrator #1
|
7
|
18 minutes by Undisclosed Manufacturer #3 |
Started by
Brian Rhodes
|
1
|
less than a minute by Brian Rhodes |
Started by
John Honovich
|
18
|
2 minutes by John Honovich |