Washington DC MPD's Surveillance Equipment

By: Brian Karas, Published on Feb 21, 2017

The Washington DC Metropolitan Police Department's surveillance system was hacked in January 2017.

Two immediate questions were:

  • Whose equipment was it?
  • How did it happen?

We have been able to answer the first of those two questions through obtaining government records, which we examine inside.

Executive *******

*** ********* **** **** Avrio ******** ********** ** ****, Cradlepoint *** *******.

Source *********

*** ********* (**) ******* *** ******** purchased ** *** *** to ******* * ******** CCTV ****** ** ****: (1)**** ******** *********** (*)**** *** ************. *** ***** ********, which ******** *** ******** price ********* *** ******** of ** "******* **** Camera ******** ******* ******* Surveillance ******" (*****) *** the ******, ****** *** component *********.

***** **********

*** ******* *** * product ** ***** *** Group. ***** *** ** IP ***** *** ******* in ******, **. ***** the ********** ** ***** cameras, Avrio *** ***** ******** by *******.

***** *******

*****'* ******* *** ******** at ************** **** ****** to ****** ****** ******* and ********* **** ***** areas. *******'* ***** ** configured **** ********* ******** to **** ******** ************, at *** **** ***** listed ****, ********,  *******, OnSSI, *** **** ** some ** ***** ********.

MPD ******* *************

******* *********** *** ******** ********* *** ******** ********* being **** ** *** Polecams deployed ** *** ***. The ******* ********** ********:

*** *********** ****** ********* that ***** ******* **** using ******** ************** *** video ******. *******, *** it *** ********** *** how * ****** *** able ** ****** *** equipment ** *******.

Ransomware ******

** * ********** **** ******* ** the ****, *** ***'* *** said **** ********** *** found ** *** ********* (presumably ******* **-** *****). ********** ******** data ****** ** * machine ***** *** **** pays *** **** ** receive * ********** *** to ******* *** **** to ** *********** ******. It ** *** *** known *** ****** ** the **-**'* *** *********** to ***** ******* ** install *** **********.

Ongoing *************

** *** ********** ** investigate *** ******* ** the ****, ********* ************* with *** ************* ********, and **** ******* * separate ****** **** **** information ******* *********, ****** from **** ** **** other *******. ****** **** direct *********, ****** ******* us ** ****@****.*** ************* ***** **.

Comments (14)

Can Hitachi shed more light on this as Avrio is part of them?

Thank you for the story and we look forward to the final report.

It will be interesting to see how far or how deep the published results will be concerning GENETEC, AXIS or CRADLE POINT. Amazing that this apparent 'hack' has even made it to the news without blaming Chinese camera manufacturers.

 

 

 

 

 

 

 

 

 

 

 

 

So it was a Windows machine after all!

That makes sense because that's the platform that ransomware overwhelmingly targets.

One scenario would be that a user PC was infected first thru an ill-advised download.  Once a client PC was infected, state of the art ransomware has the capability to infect other PCs on the LAN based on credentials found out the infected PC.  

 

IPVM must have been so disappointed it wasn't Hikvision.

Disappointed, I'd think, is the wrong word.  Maybe a little surprised, but I personally would be even more surprised if I found out that Wash. DC surveillance was actually using a Chinese product like HIK.

Most would probably agree that Axis and Genetec are pretty strong when it comes to their focus and efforts toward cyber security, so all this information does is strengthen and enforce the reality that even the best products are vulnerable without outside help, and that installers / integrators today have as much responsibility as ever to ensure that the network side of the house is no longer a separate conversation.  Physical and cyber security systems will never be secure when they are treated separately.

I doubt that, remember this is a genetec system. Unlikely they were attached to Genetec ;)

So the hack occurred outside MPD's firewall? And also was it done wirelessly? Questions to ask, before sounding the alarm. 

Sounds like they went in through the cell 4G modem to access the sv16...i am assuming each pole site has an SV16 connected to the 4G router to connect back to main genetec system, and a small switch connected to the cameras on a local network.

We have a similar setup since we have a bunch of scattered buildings that connect back to main system over the internet, sv16 and axis cameras. However we do have a cisco firewall appliance at each location to protect our SV16s, so that those are only reachable from within our own network. Without that, it would just be a windows machine exposed to everything.

Has there been any information released about how this first came to light, or how the infection started (was it a hack of the wireless system, through a camera, through the NVR's, or done with a physical attack on the hardware itself)?

Were any other DC systems compromised as a result of this or was it contained to just the edge based appliances?

I keep hoping that someone will have these details, but I'm guessing that we will never know...

I keep hoping that someone will have these details

More details are going to come. It's just early.

This is not like Mirai where hundreds of thousands of devices were hit around the globe and therefore it was easy to figure out what was happening.

Has there been a mention of who was behind it? I know it ended in ransomware (I am assuming the city did not pay, or at least will publicly say they didnt pay; getting someone out to just wipe and re-install all of those machines seems do-able at this scale I suppose) but it would be interesting if they were able to pinpoint what group or individual was behind it

Has there been a mention of who was behind it?

On Feb 4th, there was an announcement that 2 were arrested in London. I have not seen any new news reports since on those arrests.

I think...and this may be a wild guess, this is a Windows vulnerability. Especially with the ransomware element and the fact that the Genetec appliance is Windows (and from 2013 probably 7 Pro [8 if they were stupid]) based...and knowing the overall mindset, they probably disabled updates so it was vulnerable.

In fact, chances are, most of the rest of the equipment probably isn't compromised. Just the NVR.

Read this IPVM report for free.

This article is part of IPVM's 6,544 reports, 882 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Milestone XProtect on AWS Tested on Sep 21, 2020
Milestone finally launched multiple cloud solutions in 2020, taking a...
Avigilon ACC Cloud Tested on Jul 08, 2020
Avigilon merged Blue and ACC, adding VSaaS features to its on-premise VMS,...
Euklis Presents AI Analytics on May 05, 2020
Euklis presented its AI facial recognition, LPR, and object recognition...
Sequr Presents HID based Cloud Access Control on Jun 04, 2020
Sequr presented HID based Cloud Access Control at the May 2020 IPVM Startups...
VSaaS Online Show June 2020 - On-Demand Recording of 25+ Manufacturers Presentations on Jun 24, 2020
The show featured 25+ VSaaS providers showcasing their latest services. The...
Verkada Access Control Tested on Sep 09, 2020
Verkada raised $80 million earlier in 2020, expanding from video into access...
Cisco Meraki Unlocks IP Cameras With RTSP Tested on Jul 06, 2020
Meraki opened up its cameras to 3rd party NVRs/VMSes by offering RTSP...
OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
Video Surveillance 101 Book Released on Jul 07, 2020
IPVM's unique introduction to video surveillance series is now available as a...
Defendry Presents AI Active Shooter Security System on Jul 14, 2020
Defendry presented its Active Shooter security system at the May 2020 IPVM...
Asylon Presents All-Weather Automated Security Drones on Jun 18, 2020
Asylon presented its All-Weather Automated Security Drone, the DroneCore, at...
Avigilon Presents Cloud Connected ACC on May 13, 2020
Avigilon presented Avigilon Cloud Services, which supports cloud-connected...
AndroVideo Presents Edge AI Face Recognition Cameras on Jun 26, 2020
AndroVideo presented its AI at the edge face recognition cameras at the May...
Face Shields Impact On Temperature Measurement And Mask Detection on Jul 27, 2020
First, the use of face masks, and now, plastic face shields are rising...
Dahua Critical Cloud Vulnerabilities on May 12, 2020
Dahua has acknowledged a series of cloud vulnerabilities that researcher...

Recent Reports

Temperature Tablet Shootout - Dahua, Hikvision, ZKTeco, TVT + 5 More on Sep 30, 2020
Temperature tablets, aka terminal or stations, have emerged as a 'low-cost...
New Products Show Fall 2020 Tomorrow Bosch, FLIR, Hanwha, Tyco, Avigilon More! on Sep 30, 2020
IPVM's sixth online show concludes tomorrow with our special temperature...
ButterflyMX Raises $35 Million on Sep 30, 2020
Startup ButterflyMX has raised $35 million for its smartphone based intercom...
Worst Access Control Manufacturers 2020 on Sep 30, 2020
200+ Integrators told IPVM "In the past year, what access control...
Access Control Levels and Schedules Tutorial on Sep 29, 2020
Configuring access levels and setting up schedules is central to maintaining...
Avigilon / Motorola VS Virtual ISC West on Sep 29, 2020
ISC West has historically been so dominant that no player would think of...
Dartmouth College Deploys K3 Temperature Screening on Sep 29, 2020
While Dartmouth College has a $6+ billion endowment, the College has bought...
Hanwha AI Object Detection Tested on Sep 28, 2020
Hanwha has added detection and classification of people, cars, clothing...
Favorite Access Control Manufacturers 2020 on Sep 28, 2020
200+ Integrators told IPVM "What is your favorite access control management...
OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
The Future of Metalens For Video Surveillance Cameras - MIT / UMass / Immervision on Sep 25, 2020
Panoramic cameras using 'fisheye' lens have become commonplace in video...
Hikvision Sues Over Brazilian Airport Loss on Sep 24, 2020
Hikvision was excluded from a Brazilian airport project because it is owned...
China General Chamber of Commerce Calls Out US Politics on Sep 24, 2020
While US-China relations are at an all-time low, optimism about relations...
Verkada Disruptive Embedded Live Help on Sep 24, 2020
Call up your integrator? Have someone come by the next day? Verkada is...
IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...