Using IP cameras to hack into networks
Ars Technica: Infrared signals in surveillance cameras let malware jump network air gaps
Using IP cameras to hack into networks
Ars Technica: Infrared signals in surveillance cameras let malware jump network air gaps
Creative, I'll give them that!
But since it can't "jump network air gaps" unless the camera is already infected, its far less dangerous than it might seem at first. Here's the video:
The basic idea has already been commercialized:
Does the camera need to be infected or could malware on the network use the cameras?
The wide body of attacks starts with the assumption the attacker has already infected the target with malware. The research shows that air-gaps alone aren't always sufficient for ensuring an attacker can't transfer data into and out of mission-critical networks. Countermeasures against the aIR-Jumper include placing surveillance cameras in restricted zones that are optically inaccessible to attackers.
Ask questions and get answers to your physical security questions from IPVM team members and fellow subscribers.