Free educational articles for physical security professionals.
CCTV cameras are almost omnipresent nowadays. You will find CCTV cameras everywhere, from highly secure establishments to small stores.
Several factors have contributed to their widespread adoption:
However, the widespread adoption of CCTV cameras has attracted a proportional interest from hackers. They have several means to hack into your CCTV camera and snoop the video feed. The extent of damage this can cause varies, depending on what the camera (and the hacker) sees. In this article, we will explore CCTV hacking from the cybercriminal perspective and discuss various ways to hack a CCTV camera.
The table below summarizes four key CCTV hacking concepts this article will explore in detail.
Concept | Description |
---|---|
CCTV camera information flow | In between the camera and the viewer, the CCTV camera data flows through several independent components. Each component and its connections are potential entry points for an attacker. |
CCTV vulnerabilities | Vulnerabilities across the firmware, network, application, and storage can be exploited by hackers to gain partial or complete access to the camera. |
How to hack a CCTV Camera | Common CCTV attack methods include brute force dictionary search, backdoor attacks, Man-In-The-Middle attacks, and phishing attacks. Most of these attacks have several variations. |
Best practices | The attack probability can be minimized if the best practices are followed. Here, we describe useful practices related to firmware updates, network infrastructure, servers, Wi-Fi, and applications are discussed. |
Consider the diagram below. It shows the various steps involved from the capturing of the video stream by the camera to playback and storage. Almost every node in the diagram can act as an entry point for the hacker.
Generic CCTV System: Components and Connections. (Source)
The network keeps getting more complex as more camera units are added. Beyond a point, outsourcing the management of the camera fleet to an enterprise security solution like SecuriThings is advisable over managing the fleet in house.
While several blocks are visible in the above block diagram, they can be broadly categorized as follows:
Monitor the health of security cameras and receive alerts in real-time
Automate firmware upgrades, password rotations & certificate management
Generate ad hoc and scheduled compliance reports
The information flow diagram in the above section hints at the vulnerabilities in CCTV cameras. Hackers often try to exploit the following targets:
This article on camera vulnerabilities explains these vulnerabilities in depth and discusses several vulnerabilities that appeared in different camera products.
Having understood the vulnerabilities in the previous section, let us now look at the various tools a hacker can employ to gain access to your CCTV camera.
This is one of the easiest methods of gaining access to a CCTV camera. Dictionary search is a type of brute force attack where the hacker tries to guess the password by going through a list of commonly used words or phrases. More details about the execution of this attack are provided in this article.
The following needs to be true for this attack to work:
Note that if there is no limit to the number of wrong password attempts, a hacker with enough time could theoretically try out all combinations of characters to get the password to your camera.
A backdoor attack allows a hacker to bypass the camera’s standard authentication mechanism and gain access via a “backdoor.” Several methods exist for executing such an attack, most involving exploiting an existing vulnerability on the camera or the network.
Developers often leave intentional commands or features in the system that bypass normal authentication measures for testing or debugging. Known as maintenance hooks, these are very attractive for hackers once they are discovered. They can gain unauthorized access, install malicious code, or create another backdoor.
If a maintenance hook is unavailable, hackers can exploit other vulnerabilities to find backdoors. For example, certain firmware vulnerabilities that lead to memory overflow or out-of-bounds memory exceptions can allow hackers to execute remote code on the cameras. An example is CVE-2018-19036, which affected several Bosch IP cameras having firmware version 6.32 or higher.
This eavesdropping attack involves the hackers inserting themselves in the communication path between two entities and snooping the communication. The attacker can be a passive snooper or an active intermediary. In the latter case, both entities think that the attacker is the intended recipient of their messages, and both are unaware if the contents of their communication are modified before reaching the actual recipient.
MITM attacks come in various forms, such as:
Once the attacker is able to intercept the communication between the CCTV camera and the application, the next hurdle is often decrypting the communication if it is encrypted. Several techniques are usually employed, including SSL hijacking, SSL stripping, and SSL BEAST. You can find more details by clicking the respective links.
This social engineering technique involves luring the user to reveal sensitive information by clicking a malicious link or replying to a seemingly legitimate text. The end goal is to either obtain credentials from the user or install malware or ransomware on the user’s system. Phishing attacks have become increasingly sophisticated and are the most common type of cybercrime with the FBI’s Internet Crime Complaint Center as of 2020. There are various forms of phishing attacks, like email phishing, SMS phishing, voice phishing, and page hijacking.
Page hijacking is especially important in the context of CCTV cameras. It involves redirecting users to malicious pages, often exploiting a Cross-Site Scripting (XSS) vulnerability on the camera’s application page.
Most phishing attacks, especially in the context of CCTV cameras, employ link manipulation.
This can be achieved in the following ways:
Here are a few best practices to shield your CCTV camera from the hacks discussed above:
Several hacking attempts (including dictionary search and backdoor attacks) exploit firmware vulnerabilities. Typically, the manufacturer releases a fix as soon as a vulnerability is reported, and keeping the firmware up-to-date ensures that your camera is protected against all known and fixed vulnerabilities. Enterprise camera management solutions (like SecuriThings) are recommended to automate the firmware update process for your fleet of CCTV cameras.
Following best practices can be followed to secure CCTVs:
Below are three best practices for CCTV camera servers that teams should consider when evaluating a system:
Network traffic monitoring can give hints about an attack happening. Latency examination can provide indications of a potential MITM attack. The network latency during an MITM attack can increase by tens of seconds as a third party sniffs data and potentially performs complex calculations involving hash functions. Forensic analysis of the network traffic can also provide hints of a past attack by analyzing the IP address, DNS name, and the X.509 certificate of the server. Again, an enterprise camera management solution can do this on the fly for your fleet of cameras.
Recommended best practices for Wi-Fi connections and applications are as follows:
The widespread and rapid adoption of CCTV cameras will almost inevitably ignite hackers’ interest. The presence of multiple independent components in the CCTV information flow from the camera to the viewer generates a wide attack area for hackers. Hackers often exploit firmware, networks, applications, and storage vulnerabilities. Additionally, attacks such as brute force, backdoor, MITM, and phishing are becoming increasingly common.
However, the amount of protection obtained by following basic security measures, timely updates, and regular monitoring is phenomenal. As your fleet of cameras grows larger and their usage becomes more critical, it is prudent to outsource camera management to an enterprise solution like SecuriThings.