Washington DC MPD's Surveillance Equipment

By: Brian Karas, Published on Feb 21, 2017

The Washington DC Metropolitan Police Department's surveillance system was hacked in January 2017.

Two immediate questions were:

  • Whose equipment was it?
  • How did it happen?

We have been able to answer the first of those two questions through obtaining government records, which we examine inside.

*** ********** ** ************ Police **********'* ************ ****** was****** ** ******* ****.

*** ********* ********* ****:

  • ***** ********* *** **?
  • *** *** ** ******?

** **** **** **** to ****** *** ***** of ***** *** ********* through ********* ********** *******, which ** ******* ******.

[***************]

Executive *******

*** ********* **** **** Avrio ******** ********** ** ****, Cradlepoint *** *******.

Source *********

*** ********* (**) ******* *** ******** purchased ** *** *** to ******* * ******** CCTV ****** ** ****: (1)**** ******** *********** (*)**** *** ************. *** ***** ********, which ******** *** ******** price ********* *** ******** of ** "******* **** Camera ******** ******* ******* Surveillance ******" (*****) *** the ******, ****** *** component *********.

***** **********

*** ******* *** * product ** ***** *** Group. ***** *** ** IP ***** *** ******* in ******, **. ***** the ********** ** ***** cameras, Avrio *** ***** ******** by *******.

***** *******

*****'* ******* *** ******** at ************** **** ****** to ****** ****** ******* and ********* **** ***** areas. *******'* ***** ** configured **** ********* ******** to **** ******** ************, at *** **** ***** listed ****, ********,  *******, OnSSI, *** **** ** some ** ***** ********.

MPD ******* *************

******* *********** *** ******** ********* *** ******** ********* being **** ** *** Polecams deployed ** *** ***. The ******* ********** ********:

*** *********** ****** ********* that ***** ******* **** using ******** ************** *** video ******. *******, *** it *** ********** *** how * ****** *** able ** ****** *** equipment ** *******.

Ransomware ******

** * ********** **** ******* ** the ****, *** ***'* *** said **** ********** *** found ** *** ********* (presumably ******* **-** *****). ********** ******** data ****** ** * machine ***** *** **** pays *** **** ** receive * ********** *** to ******* *** **** to ** *********** ******. It ** *** *** known *** ****** ** the **-**'* *** *********** to ***** ******* ** install *** **********.

Ongoing *************

** *** ********** ** investigate *** ******* ** the ****, ********* ************* with *** ************* ********, and **** ******* * separate ****** **** **** information ******* *********, ****** from **** ** **** other *******. ****** **** direct *********, ****** ******* us ** ****@****.*** ************* ***** **.

Comments (14)

Can Hitachi shed more light on this as Avrio is part of them?

Thank you for the story and we look forward to the final report.

It will be interesting to see how far or how deep the published results will be concerning GENETEC, AXIS or CRADLE POINT. Amazing that this apparent 'hack' has even made it to the news without blaming Chinese camera manufacturers.

 

 

 

 

 

 

 

 

 

 

 

 

So it was a Windows machine after all!

That makes sense because that's the platform that ransomware overwhelmingly targets.

One scenario would be that a user PC was infected first thru an ill-advised download.  Once a client PC was infected, state of the art ransomware has the capability to infect other PCs on the LAN based on credentials found out the infected PC.  

 

IPVM must have been so disappointed it wasn't Hikvision.

Disappointed, I'd think, is the wrong word.  Maybe a little surprised, but I personally would be even more surprised if I found out that Wash. DC surveillance was actually using a Chinese product like HIK.

Most would probably agree that Axis and Genetec are pretty strong when it comes to their focus and efforts toward cyber security, so all this information does is strengthen and enforce the reality that even the best products are vulnerable without outside help, and that installers / integrators today have as much responsibility as ever to ensure that the network side of the house is no longer a separate conversation.  Physical and cyber security systems will never be secure when they are treated separately.

I doubt that, remember this is a genetec system. Unlikely they were attached to Genetec ;)

So the hack occurred outside MPD's firewall? And also was it done wirelessly? Questions to ask, before sounding the alarm. 

Sounds like they went in through the cell 4G modem to access the sv16...i am assuming each pole site has an SV16 connected to the 4G router to connect back to main genetec system, and a small switch connected to the cameras on a local network.

We have a similar setup since we have a bunch of scattered buildings that connect back to main system over the internet, sv16 and axis cameras. However we do have a cisco firewall appliance at each location to protect our SV16s, so that those are only reachable from within our own network. Without that, it would just be a windows machine exposed to everything.

Has there been any information released about how this first came to light, or how the infection started (was it a hack of the wireless system, through a camera, through the NVR's, or done with a physical attack on the hardware itself)?

Were any other DC systems compromised as a result of this or was it contained to just the edge based appliances?

I keep hoping that someone will have these details, but I'm guessing that we will never know...

I keep hoping that someone will have these details

More details are going to come. It's just early.

This is not like Mirai where hundreds of thousands of devices were hit around the globe and therefore it was easy to figure out what was happening.

Has there been a mention of who was behind it? I know it ended in ransomware (I am assuming the city did not pay, or at least will publicly say they didnt pay; getting someone out to just wipe and re-install all of those machines seems do-able at this scale I suppose) but it would be interesting if they were able to pinpoint what group or individual was behind it

Has there been a mention of who was behind it?

On Feb 4th, there was an announcement that 2 were arrested in London. I have not seen any new news reports since on those arrests.

I think...and this may be a wild guess, this is a Windows vulnerability. Especially with the ransomware element and the fact that the Genetec appliance is Windows (and from 2013 probably 7 Pro [8 if they were stupid]) based...and knowing the overall mindset, they probably disabled updates so it was vulnerable.

In fact, chances are, most of the rest of the equipment probably isn't compromised. Just the NVR.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

China DVR/NVR Backdoor Discovered, Huawei Refutes on Feb 07, 2020
A backdoor was found in Chinese-produced DVRs and NVRs that secretly allowed access to the recorders. While it was first attributed to Huawei...
Uniview OEM Directory on Sep 11, 2019
This directory lists 20+ companies that OEM products from Uniview, with a graphic and links to company websites below. It does not cover all...
ONVIF Exposure To "Devastating DDoS Attacks" Examined on Sep 06, 2019
ZDnet reported "Protocol used by 630,000 devices can be abused for devastating DDoS attacks", citing exposure of ONVIF devices. And after an...
Mobotix First CNPP CCTV Cybersecurity Certification Examined on Sep 05, 2019
Mobotix recently became the first video surveillance manufacturer to receive the CNPP cybsersecurity certification for its cameras, in which they...
Warning: Windows 7 Update Crashing NVRs on Aug 26, 2019
Windows 7 updates are causing VMS servers to fail to boot. After running the update, impacted systems do not boot as normal, instead display this...
Critical Vulnerability Across 18+ Network Switch Vendors: Cisco, Netgear, More on Aug 26, 2019
Cisco, Netgear and more than a dozen other brands, including small Asian ones, have been found to share the same critical vulnerability, discovered...
Axis Suffers Outage, Provides Postmortem on Aug 15, 2019
This week, Axis suffered an outage impacting their website and cloud services. Inside this note, we examined what happened, what was impacted...
Security Fail: ASISNYC Auto Emails Passwords In Plain Text on May 14, 2019
ASIS NYC automatically emails a user with the password the user just entered, in plain text, when one registers for the site / event, as the...
Verint Victimized By Ransomware on Apr 18, 2019
Verint, which is best known in the physical security industry for video surveillance but has built a sizeable cybersecurity business as well, was...
HTTPS / SSL Video Surveillance Usage Statistics on Apr 01, 2019
HTTPS / SSL / TLS usage has become commonplace for websites to improve security and, in particular, to help mitigate attackers reading or modifying...

Most Recent Industry Reports

Pivot3 Mass Layoffs on Mar 27, 2020
Pivot3 has conducted mass layoffs, the culmination of grand hopes, a quarter of a billion dollars in VC funding, and multiple failures to gain...
Athena CEO Criticizes 'Deplorable' 'Nitpicking', IPVM Refutes on Mar 27, 2020
Athena Security's CEO Lisa Falzone has strongly objected to IPVM's reporting on Athena, calling it 'deplorable' and repeatedly criticizing IPVM's...
Hikvision Admits Sanctions Harming Its Financial Performance on Mar 27, 2020
While Hikvision initially downplayed being sanctioned for human rights abuses, the company is now admitting a significant impact in a new PRC...
New Axis M30 Cameras Tested on Mar 26, 2020
Axis has released a new generation of, for them, relatively low cost M30 series cameras, claiming to deliver "sharp video quality even in poor...
Coronavirus Shuts Down ADT Door Knockers on Mar 26, 2020
Coronavirus has another victim - this time, alarm giant ADT has stopped all door to door sales. Door knockers are a critical but controversial...
Access Control Course Spring 2020 - Save $50 Last Day on Mar 26, 2020
Register Now - Spring 2020 Access Control Course. Today, March 26th is the last day to save $50. IPVM offers the most comprehensive access...
Convergint Coronavirus Cuts on Mar 25, 2020
One of the world's largest security integrators, Convergint, has made a major move to handle the impact of coronavirus, with cuts across the...
VSaaS 101 on Mar 25, 2020
Video Surveillance as a Service (VSaaS) is the common industry term for cloud video. But what does it mean? How does it all work? Inside this...
TVT / InVid Facial Recognition Tested on Mar 25, 2020
Facial recognition is frequently sold for thousands of dollars per channel but some China manufacturers are offering full facial recognition...
IPVM Launches On-Demand Courses on Mar 24, 2020
For nearly a decade, IPVM has been a leader in online live courses. Now, we have added on-demand versions for all courses. The same course...