XiongMai Master Password List Emailed By Chinese Spammer

Author: Brian Karas, Published on Dec 05, 2016

XiongMai created an international uproar as their devices drove massive botnet attacks of major Internet sites.

After pledging to recall cameras after the attack, and then threatening to sue those who criticized them, XiongMai is back.

A Chinese reseller of XiongMai equipment sent us a spam email that contains master passwords for XiongMai devices.

They consider this list a benefit for dealers, enabling faster and easier customer support, while overlooking the security risks it creates.

******** ******* ** ************* ****** ** ***** ******* ***** ******* botnet ******* ** ***** ******** *****.

***** ******** ** ****** ******* ***** *** ******, *** *************** ** *** ***** *** ********** ****, ******** ** ****.

* ******* ******** ** ******** ********* **** ** * **** ***** **** contains ****** ********* *** ******** *******.

**** ******** **** **** * ******* *** *******, ******** ****** and ****** ******** *******, ***** *********** *** ******** ***** ** creates.

[***************]

"Helpful" ********

* ***** ********, **********, ******* **. ****** **** ***** *** ****** ** *** to *** ******** (*** ******* ******), **** ******** * "***** Password ****" *** ** (********) ********:

*** ********* ***** ** * ****** **** *********** ****, ***** *** *** ***-******** ****** ******** *** **** *** of ****.

Super ******** ***** ***** ****

*** "***** ********" ******** ***** ****** ** *** ****** **** used, ********* ** **********. *** *********, *** ******** *** ** entered ******** *** *** ******** **, *** *** ******* ** additional ******* ******* ** ******** ** **** *** ********/***** ********. In ****** ****, *** *** ****** ** * ****** **** the ***** ******** *******, ******** *** * *** ***** ******** to ** ***.

But ***** *** *** ******

***** ********* *** **** *** *** ****** ****** *** **** not ****** ** ******* *** ****** ******** *********** **** ****** number ** *** *******.

Compared ** ********* ****** *********

********* ******** ********* * ****** ******** ** **** ****** ** * device **** * ********* ***** ********, ******* *** ********* *** also **** ** **** *** ****** ****** ** *** ******. By ********* *** ****** ****** ** **** ** *** *********** there ** ** ****** **** ** "****** *********" *** *********, reducing *** ******* ** **** ********. ********* *** **** ***** ****-***** ******** *****, ******** ***** ** ***** ******** ********* **** *** ****** to *******/***** * ********* ********.

Vulnerability ********

***** **** ****** **** ***** **** ** ******** ***** *** admin ********, **** ************* ***** ***** ** * *********** ************* ** users. ** ******** *** ***** ****** ** *** *** *** an ******** **, ****** ******* ******, ** ***** ****** ********* to *** ** * ******* ***** *** ****** ****** ***** utilize ***** ********* ** *** ***** ****** ** ******* ** recorders, ******* ** *** ********* *** ********** ********, ** **** accessing ***** ** ********* *********.

Sign ** *** ******?

** **** ** *********** **** **** ******** ***** ** ******* their ***********, ******* ** *** ******, ** ***** *****. **** could ** * **** **** **** ***-****** ******* ********* *** finding ** ********* ** *** *** **** *********** ** *******, and *** **** ** ****** ** ***** ******* ** ******* new ********. 

Comments (9)

*** ***'* **** ******* ***** *** ***, *** *** **** the *******?

***** ** ** ************* **** ****, ***, **** ** ** understanding.

** **** **** ********* **** **** *******.
* ***** ****** "***********" ******

****'** **** ******* ****** ** ** ***** **** ****** **** IP. **** * ******** ** ****** *****!!!!

*********** ******* ******* *** *********... ***** *** * *** ** repeated ********* ********** *** **** ** *** *** ** *** code. * ***** ***** **** ** ****** ****.

* *** *** **** *****. ****** ***. *********..

*). *** ***** *** **** **** ******** ** ****?

*). *** ***** *** ***** ** **** ******** *** ******* up *** * *****.

*). *** ***** *** ***** **...

**** **** *** *** **** ******** *******:

*****-****-*****-**********-***********@****.***

******* *** ,*********'* ****** **** ********* ***** ** ****** ****** and **** *** **** ** *** *** *** **** *****! I ***'* ******** ** ** ***** ** *** **** ** be ** **** ** ***** ** ***** *** ********.

**** **** ** **** ********* *******, **** **** * ******* reset ****** , * ***-***** **** **********, *** ******** *** all *** ****** ******. * *****'* **** **** ******** ********* on **** ******* *** ***** *** **** ******* **** **** system ****** *** *****.

******* **** ** *** ****** ( ***** ) *** ******* on *** ******** *** *** **** **** ***** ***. ***** has *** ******* *** " *** ******** " ********. ********* also **** ** **** ******.

* ***** *** ********** ** *** *** ****** *** ****** via *** ***** ****** ******** ******** ****** *** *** ******* physical ******. *** ********* ****** ** **** ******** ** ***** tool ***** *** ****** ****** *** *** ******* ********* ******** access, * **** * **** **** ** ** *********. ******* a ****** ***** *** ** ** **** *** * ***** button.

** *** ***** *** ****** ******** **** *** ** *** list ** ***** **** *** ******* ** ***** *** ******* could ****** ********** *** ********* ** **** *****. **** ** the **** *** ***** ** *** ****** **'* *** ***** to **** **** ** *****. ****** ***** *** ****** ******* but ** ** ********* ** ***** ** ** ****** *** access ** **** *****?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

The Hikvision Smart Classroom Behavior Management System on May 22, 2018
Hikvision's rapidly growing offering of analytics, which we most recently examined with Hikvision's ethnic minority analytics, is now going into...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Hikvision Source Code Transparency Center Examined on May 14, 2018
Following criticism of Hikvision's Chinese government ownership and Hikvision's IP camera backdoor, the company has responded with a series of...
Hikvision's Minority Analytics on May 08, 2018
Hikvision has developed and is deploying minority analytics inside China, automatically identifying and categorizing individuals as ethnic...
Genetec Wins Panama Canal With Direct Low-Bid on Apr 30, 2018
Genetec and low price are not two terms frequently found together. However, in a surprising and controversial move, Genetec has won a Panama Canal...
Massive China Xinjiang Security Project Spending At Risk on Apr 30, 2018
A Chinese government review of state-sponsored projects in Xinjiang Province could harm the bottom line of large Chinese security manufacturers,...
Death Of A Dummy Camera Manufacturer on Apr 25, 2018
5 years ago, IPVM gathered insights from a dummy camera manufacturer, who was then the top selling dummy camera provider on Amazon and 3rd in all...
Hikvision Critical Cloud Vulnerability Disclosed on Apr 25, 2018
Security researchers Vangelis Stykas and George Lavdanis discovered a vulnerability in Hikvision's HikConnect cloud service that: just by...
Dahua and Hikvision Win Over $1 Billion In Government-Backed Projects In Xinjiang on Apr 23, 2018
Dahua and Hikvision have won well over $1 billion worth of government-backed surveillance projects in China’s restive Xinjiang province since 2016,...
April 2018 IP Networking Course on Apr 19, 2018
This is the last chance to register for our IP Networking course. Register now. NEW - 2 sessions per class, 'day' and 'night' to give you double...

Most Recent Industry Reports

Buy Arecont: Top Bid $10 Million Cash on May 22, 2018
Last year, Arecont had a deal for a purchase price of $170 million (see Failed Arecont China Acquisition). This year, Arecont has a deal for a...
Installing Box Cameras Indoors Tutorial on May 22, 2018
This tutorial starts our physical installation for video surveillance series, starting with Box Cameras, one of the oldest and most basic types....
The Hikvision Smart Classroom Behavior Management System on May 22, 2018
Hikvision's rapidly growing offering of analytics, which we most recently examined with Hikvision's ethnic minority analytics, is now going into...
Dahua Intrusion Analytics And VMD Tested on May 21, 2018
Dahua ships basic analytics on practically all their cameras, ranging from low cost to high end. To see how these analytics work in real world...
Exacq Improving Technical Support, Responding To Integrator Complaints on May 21, 2018
Exacq had been a long-term favorite of integrators, but since their 2014 Tyco acquisition, Exacq has fallen in IPVM integrator studies (though...
Best Manufacturer Technical Support 2018 on May 21, 2018
While 5 manufacturers made the worst technical support 2018 list, only 3 stood out as providing the best technical support to 190+ integrators in...
Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
ADT Stock Drops 50% Since IPO on May 17, 2018
It has been a brutal 4 months for ADT. They first expected to IPO at ~$18. They IPOed at $14, dropping immediately to $12.39 And now, not even...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact