Consumer grade IoT webcams can be backdoor to company networks, says Vectra
January 14, 2016
Consumer-grade IoT products, such as Wifi security web cameras, can be hacked and reprogrammed to serve as permanent backdoors, enabling potential attackers to command and control a cyber attack remotely without being detected by traditional security products, according to Vectra Threat Labs.
“Consumer-grade IoT products can be easily manipulated by an attacker, used to steal an organisation’s private information, and go undetected by traditional security solutions,” said Gunter Ollmann, CSO of California-based Vectra Networks. “While many of these devices are low-value in terms of hard costs, they can affect the security and integrity of the network, and teams need to keep an eye on them to reveal any signs of malicious behaviour.”
Turning an IoT device into a backdoor essentially gives hackers round-the-clock access to an organisation’s network without needing to infect a laptop, workstation or server, all of which are usually under high scrutiny by firewalls, intrusion prevention systems and malware sandboxes, and typically run antivirus software that is updated regularly.
“Most organisations don’t necessarily think of these devices as miniature computers, but essentially they are in that they can still give attackers access to sensitive company information, particularly because they are connected to the corporate network,” said Ollmann. “Unlike the computers people regularly interact with, these devices do not have the processing power or memory to run antivirus or other security software. Since they don’t have usable persistent storage, attackers use NVRAM to store the configuration and flash ROM to store the malicious code.”
In the Vectra Threat Labs experiment, the team purchased a popular D-Link Wifi camera for roughly $30 and successfully reprogrammed it to act as a network backdoor without disrupting its operation as a camera.
“The irony in this particular scenario is that Wifi cameras are typically deployed to enhance an organisation’s physical security, yet they can easily become a network security vulnerability by allowing attackers to enter and steal information without detection,” said Ollmann.
Vectra disclosed this vulnerability to D-Link in early December 2015. As of January 7, 2016, the company had acknowledged the disclosure but has not provided a remedy.
As the threat research arm of Vectra Networks, the Vectra Threat Labs operates at the intersection of security research and data science. Researchers take unexplained phenomena seen in customer networks and dig deeper to find the underlying reasons for the observed behaviour.