China Surveillance Vulnerabilities Being Used To Attack China, Says China

By Charles Rollet, Published Apr 07, 2020, 07:13am EDT

While China video surveillance vulnerabilities have been much debated in the West in the past few years, China is now saying those vulnerabilities are being used to attack China.

IPVM Image

This news comes from the PRC's main cyber threat monitoring body, which stated a recent hacking campaign's use of longstanding vulnerabilities is "sounding the alarm" on PRC IoT security, illustrating the risk associated with devices from that country.

In this post, we examine this news, including:

  • Attack Background
  • CNCERT Gives Update on Hacking Methods, Impact
  • China Manufacturers Especially Vulnerable
  • Cybersecurity Expert PenTestPartners Feedback: DVR Vulnerability from 2016
  • CNCERT: Hack "Sounded The Alarm" on China IoT Security
  • CNCERT Recommends Manufacturers, Users Beef Up Security
  • Prior Warning: PRC IoT Devices May Be "More Susceptible"

Attack **********

** ***-********,**** ************ '*********'-********** ***-***** ********* were ********* ***** ***** surveillance ********* ** **** of * ***********-********* ******* campaign ******* *** *** government ******#********:

IPVM Image

*** ******** *** ** discernible ****** ** ********** PRC ************* **** *********, Dahua, ** ******* (***** the ********* ******* ** have ***** **** ********* USA's *******, **** *** never ********* *** ********* denied ** *********). *** one ****************** *** ************ **********, which ********* * ******** update.

CNCERT ***** ****** ** ******* *******, ******

IPVM Image

*** ***'* ***** ***** threat *******,******,****** ** ****** ** March ******* *** ******* ** this ******* ********, ********** that ******* **** ***** main *******:

*** ****** *********** ********* from *** ******** [*******] shows **** **** ***** attack ******** ****** **** three ***** ** ***************: remote ******* ********* ***************, malicious **** ************, *** login ****** ***************.

China ************* ********** **********

***** ***** ** *************** have **** *********** ****** for ***** *** ************* ranging **** ***** ******* manufacturers ** ******* **** known ********* - *** our********* ** ***** ************ Cybersecurity *************** *** ********.

****** **** ****** *** hackers **** "********* ****" that *** ******** ** "different ******** ** *** Mirai ******". *** **** Mirai **** ****** *** driven ** ********** ******* from ***** *** ***** surveillance ***-*******************.

Hack ****** ******* *********

****** ****** *.** ******* attacks **** ******** ** 450,000 ** *********, ***** 10,157 ***** ****** ******** were ******** ** ****. CNCERT *** *** ****** specific ********* ******** ** the ******** ****** ** the *******. *** **** of *** ** ********* affected **** ******* ** China's ******* *********, ***** most ***** ************ ************* takes *****.

Expert ********: *** ************* **** ****

****** *******, *** ******** ********** for***************, ******** *** ****** report *** **** **** these **** *** *************** which *************** "********* ** a ****** ** **** back ** ****" ** his **** **** "****** **** *******":

IPVM Image

******* **** *** ****** of ********** **** *** grown *****:

***** **** *** ** these ******* ****, *** there *** *** **** 100k. **** ** *** newer **** ** **** bought **** **** ***** fixed, *** **** ***'*.

*** ******* ***** **** the ****** ****** "***'* hugely **********" ***** **'* obvious ***** ******* ***** get ******:

*** ****** ***'* ***** a ***** **-**** *** exposed ** *** ******** like **** ******. **'* too **** * **** - ****'** **** ***** as ******** **** *** time *****.

**** ******* **** **** technical ******** - *******, it ** ******* **** such *** *************** *** still ***** ********* *** still ******* *****, *** China's *** *********.

CNCERT: **** "******* *** *****" ** ***** *** ********, ***** *******

***** ****** ****** *** intensity ** *** ***** were "*** ****", ** also **** *** ******** "sounded *** *****" ***** how ********** *****'* *** network ******** *** [******** added]:

*** ********* **this ****** ** ******** ************* ** *** ****. However, this attack shows that the IoT device has become an important target for hackers, and it sounded *** ***** *** *** ******* ******** of the IoT device.

****** ***** ****** *** hacks *** *******:

**** *** ***** ******* effect ** **** ****** event, ****** *** **** domestic ******** ********* ****** vulnerabilities *** ****** ***** warnings, *** ** ** the **** ** ***********,some *************** **** *** **** ******** *** *** ***** ** ******** *********.

CNCERT ********** *************, ***** **** ** ********

****** **** ***** *************** for ***** ***** ************ manufacturers *** ***** ** beef ** ******** [******** added]:

*. *** ****** ************* shouldstrengthen *** ******* ******** ********** ** *** *******, plan ****** ******** ************ ** ******* during the development process, and embed network security protection mechanisms;

*. *** ******users ****** ******* ******** checks on multiple levels of hardware, firmware, software, applications, and network protocols before the device goes online; after the device accesses the Internet, it should be protected by technical means such as firewalls, and at the same time strengthen the Monitoring and auditing of network access behavior of connected devices.

*. *** *******Internet ** ****** ********* ************* **** ******* ******** ************ *** *** **** *******. Internet of Things users *** ********* ** ******* **********, and security awareness needs to be improved.

Prior *******: *** *** ******* *** ** "**** ***********" ** *******

* **** **** ******** *****'* *** ****** prepared *** ***** ***** ******** ******** Review **************** **** "******** ********" in *** ************* **** as "*** ******** ** entry" *** "******* ********** standards" ***** **** "*******-************ IoT ******* *** ******** targets *** ************ ******", adding:

******* *** ******* *** at ***** ** *********** to ************ ****** ** those **** ***** *********,and *** ** **** ** **** *********** [emphasis added]

**********

** *** *********** *** ***-***** *******, IPVM ***** **** *** PRC **********'* ***** ****** abuses **** ** * prime ****** *** ***********-********* hacking *********.

*** ** ***** ** China's **** ***** ********** body, ******* *********** ***** is ************ *************** ******** such ********* *** ** the ***** ** ******* security *** ***** ***** surveillance ********.

Comments (4)

***** **** ****** **** using ******* ************ ***. Think **'* **** ********* here *** ***** **** that **'* *** **** to *****.

Agree: 1
Disagree
Informative
Unhelpful
Funny: 1

* ***** **** ** fantastic *** *** **** help ** *** **** run.

Agree: 2
Disagree
Informative
Unhelpful
Funny

*** **** ** *** all ***** **** ************ product ** **** **** such *******.

Agree
Disagree
Informative
Unhelpful
Funny

******** **** **** ** roost. ** ****** ** how **** ** ** to **** ****** *** of ***** * ******** product **** ******** *****.

Agree: 1
Disagree
Informative
Unhelpful
Funny
Read this IPVM report for free.

This article is part of IPVM's 7,256 reports and 966 tests and is only available to subscribers. To get a one-time preview of our work, enter your work email to access the full article.

Already a subscriber? Login here | Join now
Loading Related Reports