‘Experts' Fail On Dumbo IP Camera ‘Hack'

Author: Brian Karas, Published on Aug 24, 2017

Dumbo, revealed by Wikileaks, has become big news.

Unfortunately, 'experts' in the security industry have gotten it wrong, incorrectly contending that Dumbo hacks IP cameras.

In this report, we examine Dumbo, the erroneous claims and the impact that such errors have on cybersecurity.

*****, ******** ** *********, *** ****** *** ****.

*************, '*******' ** *** ******** ******** **** ****** ** *****, incorrectly ********** **** ***** ***** ** *******.

** **** ******, ** ******* *****, *** ********* ****** *** the ****** **** **** ****** **** ** *************.

[***************]

Dumbo *** *******

***********'* ********* *** ***** ***** *** ************** * ******** *********** ******** ** *** *******, **** ********, and ******* ******** ****** ******** ** ******* ********. ** ** executed ******* ** *** ******* ***** *************, ********* **** * USB *****. ***** ***** ** *** ** ******, ***** ***** require ************* ****** ** *** ******* ***** *************.

** ********, ********* ** ** ****** **** ** ******* *** do ** ******* ********* **** *** *****, ****** ******** **** 'Dumbo' ******** ** ******* *** *** ** ** *******.

No ** / *** **********

*** ***** ****** ***** ** ********* ** ** ******* (** any ** ******* *** **** ******), *** *******, ***-** ***********, or *** **** ** ******/********* ******, ***********, ** ******. ** does ******* ***/*** ******* *** ***********, ** ***** ** *** machine ******* *** ********.

Erroneous **** ** *****

*** **** **** ***** ***** ** **** ** ******** ******* did *** **** **** **** ******* ****** ** ** * threat.

*** ******** "*********: *** ********* ** ****** ****"******* ******** **** ***** ****** *** *** ** "**** *** IP ******* ** *********** ** * ******** ****** ******* ****** in", * ***** ***** ** *** ****** ** ********. *************, SDM **** ***** ** ***** ********** ***** ******** *************** ** IP *******.

*** "******** ** ****** *********"******* ********:

*** **** ************* ******* ** *****'* ************* **********,******* **********, *** ****** *** **** **** ************** ** ******** ******** "*** *** ******* ******** ******* ****** Operations":

*** **** *** ****** ****** ** ********.

**** ****** *** ** *** ************ ** *** ****, ** tries ** ****** *** *** ************** ******* ** ******* *** post:

Lots ** ****** *** **** ** *******

**** *** *** **** **** ** **** ** *******? *********. But ** *** **** ** ****** ****** ** *** ********. The ****** ** ******* ** ********* ******** *************** ******** ** grow. ** *** *******, ******** *** **** ***** ******* *** be ******* ********* ** ******** ******** ************* ****** ********* ******. *** *** *** **** **** *** ** **** *** number ** ****** *** *** ****** *** ******** *** *** a ******.

***** ***** *** **** **** ** **** ******* ** *******, there ** ** ******** ***** ** *** ** ****.

Downside ** ******* ***** ******** *********

* *** ***** ***, ***** ******** *** ****** ********* ** the ******** ********, *** *** ** *** ****** * ******* topic. ***** *** ******* ********* ** ****, *** ******** ** that **** ************ *** ********* **** *** **** ** * hot ***** ** ********** **, ******* ** ****** ********* ** researched ****** ** ***** ******** ******* ******.

Worse **** *****'* *** ** ********

**** ** ******* **, *** ***** ****, *** ***********'* *** ****** ******** ********, ***** ** ***** ********* ** ******, ************ *******. *****, the ******** ******* ****** *****'* *** ***** ************ ****** ********** to *** ***** ********* *** *********** ********, ************* *** **** of ***** ******** ******.

Caution ******* ** ***** ******** ******

************ ****** ******** ******* ***** ******** ** ***** ****** ********** proof, *** ************* ******** ***** ******** ***** ******* ******* ***** or ******** ******** ** ******** ******** ****** ** ******** **** caution ****** ******* ** **** ***********.

Comments (20)

"*** ******** "*********: *** ********* ** ****** ****"******* ******** **** ***** ****** *** *** ** "**** *** IP ******* ** *********** ** * ******** ****** ******* ****** in", * ***** ***** ** *** ****** ** ********. *************, SDM **** ***** ** ***** ********** ***** ******** *************** ** IP *******."

******'* ** ** ****** ** **** *** ***** ** *** building, ** *** ****** *****?

**, ******* **** **** ***** **** *** ****!

**** ***** *** *********** **** **** **** **** ** *** Watergate *****

** **** **... :*

**** *** **** **** ****** ***

******'* ** ** ****** ** **** *** ***** ** *** building, ** *** ****** *****?

****, * ** *** ***** *** *** *** *** ************* to **** *** ***** ** * ******** ** **** ** demand, ******* **** ******* *************.

********, *** *** *****'* ********* ********** ** *** ****** *** borders ** *** ****** ******, ** "******* *************" *** *** be *********.

-=[****** "******** ************" ****]=-

d'oh

******** * ***** **** **** *** ******** **** ** *******,** ***** *********** ****** **** *******, ** *******, ******** **** cases.

***** ** ******* ** ******* **** *** ***** **** ***** is **** **

"**** *** ** ******* ** *********** ** * ******** ****** sending ****** **"

** *****.

********, *** **** ******* ** ***** ** ** ***** ****** to ****** *****/***** ******** ** * ******** ************** ****** **** ****** ******,** ***** ***** ******. ****'* *** **'* ** * ***** drive; ****** ***** ** ** *** *** *** *** ** at *** *******.

** **** ***, ***** ** * **** ** **** ******** and ****** *** ***** **** ******* ***** ** ******** ** the ***** ** **

  1. *********** *** *******/***********
  2. *********** *** ********* ********** **** ***** *******
  3. *********** *** **** ***** ********** **** ***** *********
  4. ********/******** ***** *****

**** ** * ******* **** ** ** ******* ** *** documentation, ***** *****.

**** *** ****** **** ***** ******* *** ****** ** ****. If ** **** ******* *** ******** *** ***** ********** ******* of * ***** ******** ******, *** ***** ***** ******** *********** ********** ******, **** ****** ** *******. ****.

***** ***** **** ***** ******* ** ** ******** ***** ** similarly ********.

**** ****, * ***** **** *** ******* ** **** ******* as ** *** ******* **************** *** **************** ** *** ******** and ****** ** *****.

*** *** ******* ** *** ***** ******* ** *****. * wanted ** **** **** **** *** **** **-***** *********** ** it, ** **** *** *** *** **** ***** ** *** report.

*****, ***** ******* ** "*****" ***, *** *******, *** ********* not ** ******* (****** ***** ** ***** **** ****** ***** ***** ******* ***** ** ******). *** ***-*****-**-***-** ******* ** ******* ** ********* **** ***** have **** ** **** ****, *** ******. ***** *** **** points **** ****** ******* ******* *** ********* ***** ****** ** able ** ****** *** *******, ** **** **** **.

...****** ***** ** ***** **** ****** ** *** ***** ******* Based ** ******).

*** **** ** ** * ****** ****** ** **** ********* work ** ******* ******** ** ;)

********* *** ******** ** *** ********** ** *** ********** ******, as ** **** **** ** *** ********* ****:

** ********** ********* ******* **** ******* *** ***********,either ******* ** ********* ** ******** (*********, ****) ** ***** ********.

***, *** ** **** ****:

******** ********, ******* *** ********** ********** *** ********* ******* ** a ****** ******** ******* *** ********* ******* ********* *****.

**** ** *** *** ********** *** "***** ** *******" *** of ****.

**** ** *** *** ********** *** "***** ** *******" *** of ****.

* ***'*.

*** * *** *** **** ******* ***-******** ******* *** ******** that * **** ** * ****** **** *** ******* ******* monitoring ******* ** * ***** ******* ***** *********** ** * VMS ****, (**** ****** ** *** **** ** ***** *** do **** ************* *******).

**** **** ******** ******** ******** ** ** '** ****** ****' and ***** *** **** **.

** ***** ** **** ** ********* ****'* **** **** ********* statement ** *** ***********, ** ******'* **** ****** '** ****** hack' **** *** ****.

*****/********?

**** **** ******** ******** ******** ** ** '** ****** ****' and ***** *** **** **.

**** ** **** ********* *** *****'* "************* **********" *** ***** able ** ****** *** *** ****** ***** ******?

**** ** **** ********* *** *****'* "************* **********" *** ***** able ** ****** *** *** ****** ***** ******?

********? ******* ** **** **** ****** **** *******:

*** *** ******** ******** ******* ****** *********-***** **********

***** ** ********* *******, ****** ***

  1. *** ***** ****** '******** *******'
  2. *** ******** ******* ***** **** *** *******
  3. **** ************** ****** **** *** ********* ***** **** ****:

*** ***** *** ******* ******** * *** ***** ***** ******** with * ******* ******* **** **** *** ******** ********* ******* and ***********, ******connected *******, ***** ** ********** *** ********* ** **-**.

***** *** ********** ***** ******, '******** *******' ******* '** ******' and '********' ******* '****'.

****'* **** *********?

****'* **** *********?

**** ** *** ******** ***** ** *** ******: ****** *** hold ********** ** ** ***** ********* ** ******* ****** ******* did *** ** ****** ******** ** *** **** ********* ****** making ***** ******.

* ***** **** ****** ******** '*******' *** '** *******' **** though ** ****** ***** *** ********* *****, **** *** *********.

** **** ******** *** ***** ****** ********** *********, * ***** expect ************* **** **********.

**** ** *** ******** ***** ** *** ******: ****** *** hold ********** ** ** ***** ********* ** ******* ****** ******* did *** ** ****** ******** ** *** **** ********* ****** making ***** ******.

****, **** ******** ** *** ********** ***** ** *** ******. Rather, *** ***** **** *** "**** *********" ** *** ******* the ******** ***********, *** ********:

*** **** **** ***** ***** ** **** ** ******** ******* did *** **** **** **** ******* ****** ** ** * threat.

***, *** ****** ***** ** * ******* ** '** ****** research' ** *** ***. ******* ***** ** ***************** ** **** materials. ** ***, *** **** ****************** '******** *******' ** * ********* ****** ** *****, ***** confuses *** *****.

***********, ***** ******** ** ***** **** *** ******* ** *********** ***, ******* **** **** ******* ** ***, **** ************* options, *** ******* ********* *** ********** ** ***** ************ **************.

*****, * ***** **** '** ****** ****' ** ******* ** best *** ****** ** ****** ***, ******* ***** *** ******* misleading ******** ** *** **** ********* *** *** **** ********* that ****** ***** ***************** ** *** ****.

* ***** **** **** *** ** *******. ***** ** ***** manipulating ***** ** * ****** ******** ** * ******** (** "installed ******".) * ***** *** ***** *** ********* "** ******" and "****** ** * ********** ** * **, ******* ********* to * *******/*** ********" *** ** *****.

** *** *** *** ***** ********** *** ************* **********. ***** account, *** *** *******, **** **** ***** ****'* ** **** directory. ******* * *** ******* ******** ******* *.* **. ******* interesting. ** ***** ******* ** **** ***** ***** *** ** to ***** *** *****. ** ******* **** ** *** **** walk ******* *** ******* **** ** **** *** **** ***** to ****** ***** ***** ** ******.

*** ***** * *** ****** ** *** **** (*** ** older *******) *** ****:

***** * ******* ***** ** *** ********** ** *** ** arbitrary ******* *****, **** ** *********'* ********.*********.*******.**** *** *******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Winter 2019 IP Networking Course on Jan 10, 2019
Today is the last day to register for the Winter 2019 IP Networking course. This is the only networking course designed specifically for video...
Bosch VDOO 2018 Vulnerability on Dec 20, 2018
Security research firm VDOO has discovered a critical vulnerability in Bosch IP cameras. Inside, we cover the available details of this new...
Genetec UL Cybersecurity Certificate (2900-2-3) Examined on Dec 19, 2018
Proving a company is cybersecure has become a major concern for security companies. But how trustworthy are these certificates? Earlier in 2018, a...
Scam Research And The $86 Billion IP Camera Market on Dec 19, 2018
Scam. The most widely cited research numbers in many, if not most, industries come from a growing number of Indian 'market research firms'. We...
No GDPR Penalties For UK Swann 'Spying Hack' on Nov 20, 2018
The UK’s data protection agency has closed its investigation into Infinova-owned Swann Security UK, the ICO confirmed to IPVM, deciding to take “no...
Axis: "No One Wants To Buy A Camera" on Nov 09, 2018
Axis has, in its own description, made a bold declaration: The industry is changing so rapidly that the following statement might seem bold but...
HID: Stop Selling Cracked 125 kHz Credentials on Nov 05, 2018
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...
"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...
China Hacks Video Servers Causing Uproar on Oct 05, 2018
An incident causing an international uproar is hitting home in the video surveillance industry as a Bloomberg report, "The Big Hack: How China...
Genetec Takes Aim At 'Untrustworthy' 'Foreign Government-Owned Vendors' on Sep 24, 2018
Genetec is taking aim at 'untrustworthy' 'foreign government-owned vendors'. This is not a new theme for Genetec as nearly 2 years ago, Genetec...

Most Recent Industry Reports

The IP Camera Lock-In Trend: Meraki and Verkada on Jan 18, 2019
Open systems and interoperability have not only been big buzzwords over the past decade, but they have also become core features of video...
NYPD Refutes False SCMP Hikvision Story on Jan 18, 2019
The NYPD has refuted the SCMP Hikvision story, the Voice of America has reported. On January 11, 2018, the SCMP alleged that the NYPD was using...
Mobile Surveillance Trailers Guide on Jan 17, 2019
Putting cameras in a place for temporary surveillance where power and communications are not readily available can be complicated and expensive....
Exacq Favorability Results 2019 on Jan 17, 2019
Exacq favorability amongst integrators has declined sharply, in new IPVM statistics, compared to 2017 IPVM statistics for Exacq. Now, over 5 since...
Testing Bandwidth Vs. Low Light on Jan 16, 2019
Nighttime bandwidth spikes are a major concern in video surveillance. Many calculate bandwidth as a single 24/7 number, but bit rates vary...
Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
UK Fines Security Firms For Illegal Direct Marketing on Jan 16, 2019
Two UK security firms have paid over $200,000 in fines for illegally making hundreds of thousands of calls to people registered on a government...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Gorilla Technology AI Provider, Raises $15 Million, Profiled on Jan 15, 2019
Gorilla Technology is a Taiwanese video analytics manufacturer that recently announced a $15 million investment from SBI Group, saying this...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact