Hacked Security Cameras, DVRs Blamed for Massive Internet Attacks
Last week’s distributed denial-of-service attacks (DDoS) were carried out by hackers who used as many as one million Chinese-made security cameras and other video surveillance products, researchers say.
FRAMINGHAM, Mass. – Hackers seized control of countless security cameras and DVRs to unleash several massive Internet attacks last week, setting off fresh concerns about the susceptibility of connected devices in homes and businesses.
Level 3, a global communications provider based in Broomfield, Colo., identified video surveillance cameras and recorders made by Chinese manufacturer Dahua Technology as the sources of a majority of last week’s cyberattacks, but said other Web-enabled devices are also being hijacked into a new cyber warfare network currently being assembled.
“We’re thinking this is the tip of the iceberg,” Dale Drew, head of security at Level 3 Communications, told the Wall Street Journal.
A Dahua spokeswoman told the Wall Street Journal on Thursday the company is reviewing Level 3’s research. She said malware could succeed in attacking older devices with outdated software.
“We strongly recommend users to upgrade the firmware of devices” and set a strong password to reduce risks, the spokeswoman told the newspaper.
Dahua, said to be the world’s second largest provider of video surveillance products behind Hikvision, brings its wares to the security marketplace through distribution. The company also sells directly to consumers and businesses through its website, as well as online retailers like Amazon. It also lists 71 technology partners on its U.S. website, from startups like AngelCam to more familiar companies such as Canon, the newspaper reports.
Level 3 said H.264 DVRs made by Dahua were especially prevalent in the attacks, though security researchers said other brands were affected. In some cases the devices were not protected with passwords or had generic passwords, Drew told the newspaper.
The attackers used as many as one million Chinese-made security cameras, DVRs and other infected devices to generate webpage requests and data that knocked their targets offline, the newspaper reported. It has not been determined if the attackers had access to video feeds from the infected devices.
Among those affected last week by the distributed denial-of-service attacks (DDoS) was Akamai Technologies, a content delivery network and cloud services provider based in Cambridge, Mass. Akamai said malicious traffic on its network on Sept. 20 reached 700 gigabits a second – equivalent to 140,000 high-definition movies streaming at once.
In a distributed denial-of-service, large numbers of compromised systems (sometimes called a botnet) attack a single target. The website of well-known security researcher and journalist Brian Krebs was forced offline last week as well after getting hit for more than two days with an unprecedented flood of traffic.
“We need to address this as a clear and present threat not just to censorship but to critical infrastructure,” Krebs told the Wall Street Journal.
If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our FREE digital newsletters!
Security Is Our Business, Too
For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add sales to your bottom line.
A free subscription to the #1 resource for the residential and commercial security industry will prove to be invaluable. Subscribe today!