China Surveillance Vulnerabilities Being Used To Attack China, Says China

By: Charles Rollet, Published on Apr 07, 2020

While China video surveillance vulnerabilities have been much debated in the West in the past few years, China is now saying those vulnerabilities are being used to attack China.

This news comes from the PRC's main cyber threat monitoring body, which stated a recent hacking campaign's use of longstanding vulnerabilities is "sounding the alarm" on PRC IoT security, illustrating the risk associated with devices from that country.

In this post, we examine this news, including:

  • Attack Background
  • CNCERT Gives Update on Hacking Methods, Impact
  • China Manufacturers Especially Vulnerable
  • Cybersecurity Expert PenTestPartners Feedback: DVR Vulnerability from 2016
  • CNCERT: Hack "Sounded The Alarm" on China IoT Security
  • CNCERT Recommends Manufacturers, Users Beef Up Security
  • Prior Warning: PRC IoT Devices May Be "More Susceptible"

***** ***** ***** ************ vulnerabilities **** **** **** debated ** *** **** in *** **** *** years, ***** ** *** saying ***** *************** *** being **** ** ****** China.

**** **** ***** **** the ***'* **** ***** threat ********** ****, ***** stated * ****** ******* campaign's *** ** ************ vulnerabilities ** "******** *** alarm" ** *** *** security, ************ *** **** associated **** ******* **** that *******.

** **** ****, ** examine **** ****, *********:

  • ****** **********
  • ****** ***** ****** ** Hacking *******, ******
  • ***** ************* ********** **********
  • ************* *****************************: *** ************* **** 2016
  • ******: **** "******* *** Alarm" ** ***** *** Security
  • ****** ********** *************, ***** Beef ** ********
  • ***** *******: *** *** Devices *** ** "**** Susceptible"

[***************]

Attack **********

** ***-********,**** ************ '*********'-********** ***-***** ********* were ********* ***** ***** surveillance ********* ** **** of * ***********-********* ******* campaign ******* *** *** government ******#********:

*** ******** *** ** discernible ****** ** ********** PRC ************* **** *********, Dahua, ** ******* (***** the ********* ******* ** have ***** **** ********* USA's *******, **** *** never ********* *** ********* denied ** *********). *** one ****************** *** ************ **********, which ********* * ******** update.

CNCERT ***** ****** ** ******* *******, ******

*** ***'* ***** ***** threat *******,******,****** ** ****** ** March ******* *** ******* ** this ******* ********, ********** that ******* **** ***** main *******:

*** ****** *********** ********* from *** ******** [*******] shows **** **** ***** attack ******** ****** **** three ***** ** ***************: remote ******* ********* ***************, malicious **** ************, *** login ****** ***************.

China ************* ********** **********

***** ***** ** *************** have **** *********** ****** for ***** *** ************* ranging **** ***** ******* manufacturers ** ******* **** known ********* - *** our********* ** ***** ************ Cybersecurity *************** *** ********.

****** **** ****** *** hackers **** "********* ****" that *** ******** ** "different ******** ** *** Mirai ******". *** **** Mirai **** ****** *** driven ** ********** ******* from ***** *** ***** surveillance ***-*******************.

Hack ****** ******* *********

****** ****** *.** ******* attacks **** ******** ** 450,000 ** *********, ***** 10,157 ***** ****** ******** were ******** ** ****. CNCERT *** *** ****** specific ********* ******** ** the ******** ****** ** the *******. *** **** of *** ** ********* affected **** ******* ** China's ******* *********, ***** most ***** ************ ************* takes *****.

Expert ********: *** ************* **** ****

****** *******, *** ******** ********** for***************, ******** *** ****** report *** **** **** these **** *** *************** which *************** "********* ** a ****** ** **** back ** ****" ** his **** **** "****** **** *******":

******* **** *** ****** of ********** **** *** grown *****:

***** **** *** ** these ******* ****, *** there *** *** **** 100k. **** ** *** newer **** ** **** bought **** **** ***** fixed, *** **** ***'*.

*** ******* ***** **** the ****** ****** "***'* hugely **********" ***** **'* obvious ***** ******* ***** get ******:

*** ****** ***'* ***** a ***** **-**** *** exposed ** *** ******** like **** ******. **'* too **** * **** - ****'** **** ***** as ******** **** *** time *****.

**** ******* **** **** technical ******** - *******, it ** ******* **** such *** *************** *** still ***** ********* *** still ******* *****, *** China's *** *********.

CNCERT: **** "******* *** *****" ** ***** *** ********, ***** *******

***** ****** ****** *** intensity ** *** ***** were "*** ****", ** also **** *** ******** "sounded *** *****" ***** how ********** *****'* *** network ******** *** [******** added]:

*** ********* **this ****** ** ******** ************* ** *** ****. However, this attack shows that the IoT device has become an important target for hackers, and it sounded *** ***** *** *** ******* ******** of the IoT device.

****** ***** ****** *** hacks *** *******:

**** *** ***** ******* effect ** **** ****** event, ****** *** **** domestic ******** ********* ****** vulnerabilities *** ****** ***** warnings, *** ** ** the **** ** ***********,some *************** **** *** **** ******** *** *** ***** ** ******** *********.

CNCERT ********** *************, ***** **** ** ********

****** **** ***** *************** for ***** ***** ************ manufacturers *** ***** ** beef ** ******** [******** added]:

*. *** ****** ************* shouldstrengthen *** ******* ******** ********** ** *** *******, plan ****** ******** ************ ** ******* during the development process, and embed network security protection mechanisms;

*. *** ******users ****** ******* ******** checks on multiple levels of hardware, firmware, software, applications, and network protocols before the device goes online; after the device accesses the Internet, it should be protected by technical means such as firewalls, and at the same time strengthen the Monitoring and auditing of network access behavior of connected devices.

*. *** *******Internet ** ****** ********* ************* **** ******* ******** ************ *** *** **** *******. Internet of Things users *** ********* ** ******* **********, and security awareness needs to be improved.

Prior *******: *** *** ******* *** ** "**** ***********" ** *******

* **** **** ******** *****'* *** ****** prepared *** ***** ***** ******** ******** Review **************** **** "******** ********" in *** ************* **** as "*** ******** ** entry" *** "******* ********** standards" ***** **** "*******-************ IoT ******* *** ******** targets *** ************ ******", adding:

******* *** ******* *** at ***** ** *********** to ************ ****** ** those **** ***** *********,and *** ** **** ** **** *********** [emphasis added]

**********

** *** *********** *** ***-***** *******, IPVM ***** **** *** PRC **********'* ***** ****** abuses **** ** * prime ****** *** ***********-********* hacking *********.

*** ** ***** ** China's **** ***** ********** body, ******* *********** ***** is ************ *************** ******** such ********* *** ** the ***** ** ******* security *** ***** ***** surveillance ********.

Comments (4)

***** **** ****** **** using ******* ************ ***. Think **'* **** ********* here *** ***** **** that **'* *** **** to *****.

* ***** **** ** fantastic *** *** **** help ** *** **** run.

*** **** ** *** all ***** **** ************ product ** **** **** such *******.

******** **** **** ** roost. ** ****** ** how **** ** ** to **** ****** *** of ***** * ******** product **** ******** *****.

Read this IPVM report for free.

This article is part of IPVM's 6,299 reports, 840 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Most Recent Industry Reports

LIVE NOW "Fever Camera" Show on Jun 02, 2020
IPVM is excited for the world's first "Fever Camera" show, to be held today Tuesday, June 2nd and Wednesday the 3rd from 11am to 4pm EDT, giving...
Smart Entry Systems Presents Cloud Multi-Tenant Access Control on Jun 02, 2020
Smart Entry Systems presented Cloud Multi-Tenant Access Control at the May 2020 IPVM Startups show. Inside this report: A 30-minute video...
Genetec Drops Support for Dahua and Hikvision on Jun 01, 2020
Genetec has dropped support for Dahua and Hikvision, citing US blacklisting and ONVIF conformance blockage, the company informed partners in an...
Dotty "Hot Or Not" Elevated Body Temperature App Tested on Jun 01, 2020
What if you could take an existing phone or tablet and transform it into "fever camera"? That is what DottyAR is doing with their strangely named...
Optris "Fever Screening Systems" Examined on Jun 01, 2020
German manufacturer Optris has been building temperature measuring instruments for industrial manufacturing for over 15 years, and thermal cameras...
Fever Camera Sales From Integrators Surveyed on Jun 01, 2020
Fever cameras are the hottest trend in video surveillance currently but how much are integrators selling them? 220 integrators answered the...
Proxy Presents Mobile Credentials For BLE Devices and Access on May 29, 2020
Proxy presented Mobile Credentials For BLE Devices and Access at the May 2020 IPVM Startups show. Inside this report: A 30-minute video...
ISC West 2020 Moves To The Basement on May 29, 2020
The twice cancelled/postponed show will now not only be held in a different month (October) but on a different floor, moving down to the...
Integrators Avoiding Coronavirus Air Travel on May 29, 2020
IPVM asked integrators if air travel is part of their 2020 plans to see how significantly Coronavirus will impact future...
Viakoo Presents Cyber Hygiene for Cameras on May 28, 2020
Viakoo presented its 'Cyber Hygiene' and 'Service Assurance' products at the April 2020 IPVM New Products show. Inside this report: A...