Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

CCTV Surveillance Rigs Sold on Amazon.Com Found Having Malware


Mike Olsen, Independent Security Investigator recently found that there was malware installed on CCTV rigs that were getting sold via Amazon. The items comprising the CCTV assemble were a DVR, 6 PoE (Power-over-Ethernet) cameras from Sony, and one PoE switch.

Olsen was attempting at accessing admin panel of the rig to install the new surveillance system at his friend's house when he found an empty backend configuration board other than one video feed that the attached cameras supplied, and there wasn't any other setting.

Within one blog post Olsen stated that he was browsing through Amazon to get one nice surveillance camera set when he noticed an offer of six PoE cameras as well as recording equipment.

With good reviews in general for itself, Urban Security Group the seller had presented the deal for one special Sony setup. Once the set up was bought, Olsen began installing the surveillance machine. For that he reached the admin panel via logging into it and began configuring.

Although the panel provided feed for the camera, there weren't any settings or normal controls available, Olsen wrote. Zdnet.com posted this, April 11, 2016.

The absence of the controls and settings implied that the newly purchased surveillance camera equipment likely contained malware, in case operator of Brenz.pl acted for thrusting malevolent code into the DVR's backend while using as medium the concealed iframe. Consequently, by accessing the panel page, the camera's user would get contaminated with the malicious code.

VirusTotal detected the website as serving malware while scanning showed Brenz.pl hosted viruses and Trojans. Suppose firmware of the device connects to the said website, malware could get pulled down and planted, potentially resulting in illegal inspection and/or data seizure.

However suppose the firmware already contained the Brenz.pl site then possibly there may as well exist other increasingly perilous malicious software inside the firmware. This other malware, without requiring the rig's operator towards reaching for the backend, can effectively compromise the video feeds alternatively add the end-user's equipments to any DDoS botnet.

Olsen contends the seller must be accountable, admitting that it's the cameras' manufacturer who's likely behind the malware.

ยป SPAMfighter News - 18-04-2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next