Researchers Show How Easy It Is to Hijack an IoT Surveillance Feed

Researchers replaced an IP camera’s real-time footage with pre-recorded video, highlighting the dangers of weak encryption.

SAN JOSE, Calif. — With so many devices now connected to the Internet, it is more important than ever to practice proper cyber hygiene.

IoT devices are vulnerable to hacking due to many factors, such as poor ( or lack of) encryption, out of date firmware and use of default passwords.

Researchers at Forescout Technologies recently revealed how easy it is to hack into an IP camera and replace its video feed. There was a time where we would see something like that in a movie (Ocean’s Eleven, anyone?) and think, “Yeah, right.” However, we now live in a world where such an act is relatively easy to pull off if you have the technical ability.

The researchers exploited unencrypted protocols for video streaming to replace the camera’s real-time footage with pre-recorded content. The attack was carried out by using the following four steps:

  1. Perform a man-in-the-middle attack on the network, using ARP poisoning, to be able to sniff and change passing traffic.
  2. Capture the network traffic containing camera footage and record it for replay.
  3. Force the camera to end its current session with its associated network video recorder (NVR) by replacing a GET_PARAMETER request, which is normally used as a heartbeat to keep the connection alive, with a TEARDOWN request, which is used to terminate the session.
  4. The next time the NVR requests a new session to the camera, capture this request and modify the specified client port. This makes the camera send its video to the port specified by the attacker. Since the NVR will not receive any video, it will try to set up a new connection again, so the attacker can send the footage recorded in Step 2 to the NVR.

The brand of the camera is irrelevant, as the researchers say any camera that uses weak protocols such as Telnet, FTP or SSDP, and use unencrypted real-time transport (RTP) and real-time streaming protocol (RTSP) to stream video are vulnerable.

This research highlights just how important cybersecurity is, especially when it comes to video surveillance. Integrators should check out these cyber dos and don’ts to help adopt better policies and practices to keep customers safe.

You can learn more about the research here, or watch the video below to see how the hack was done.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!

About the Author

Contact:

Steven A. Karantzoulidis is the Web Editor for Security Sales & Integration. He graduated from the University of Massachusetts Amherst with a degree in Communication and has a background in Film, A/V and Social Media.

Security Is Our Business, Too

For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Commercial Integrator + Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add to your bottom line.

A FREE subscription to the top resource for security and integration industry will prove to be invaluable.

Subscribe Today!

Leave a Reply

Your email address will not be published. Required fields are marked *

Get Our Newsletters