BOSTON, Mon Jun 17, 2013 - A US security expert says he has identified ways to remotely attack high-end surveillance cameras used by industrial plants, prisons, banks and the military, something that potentially would allow hackers to spy on facilities or gain access to sensitive computer networks.

Craig Heffner, a former software developer with the National Security Administration who now works for a private security firm, said he discovered the previously unreported bugs in digital video surveillance equipment from firms including Cisco Systems Inc, D-Link Corp and TRENDnet.

"It's a significant threat," he said in an interview.

"Somebody could potentially access a camera and view it. Or they could also use it as a pivot point, an initial foothold, to get into the network and start attacking internal systems."

He plans to demonstrate techniques for exploiting these bugs at the Black Hat hacking conference, which starts July 31 in Las Vegas. (here)

Heffner, who now works as a vulnerability researcher with a firm known as Tactical Network Solutions in Columbia, Maryland, said that he has discovered hundreds of thousands of surveillance cameras that can be accessed via the public Internet.

He said he has figured out a real-life version of the familiar "Hollywood-style" attack that has become a fixture in action films. He can freeze a picture on a surveillance camera to help thieves break into facilities without detection.

Heffner said that he has not discussed his research with the camera makers and does not plan to do so ahead of his presentation at the hacking conference.

Cisco, D-Link and TRENDnet said they would take any appropriate action that might be needed to secure their equipment after the Black Hat presentation.

Heffner's presentation is one of more than 100 talks at the annual gathering, which is expected to attract some 6,500 security professionals who will learn about the growing threat that hackers pose to businesses, consumers and national security.

Other talks will explore threats to Microsoft Windows and Apple systems, mobile phone networks, medical devices and systems that control industrial plants.

All research presented at the conference is vetted by a review board of 22 security experts.

More From This Section

China gets first bitcoin ATM, skirting bank crackdown

Rising interest from mainland Chinese speculators was credited for driving up global bitcoin prices last year.

Yahoo's growth anemic as turnaround chugs along

Revenue could decline by as much as 1 percent or rise by up to 2.7 percent from $1.07 billion a year earlier.

PTA dispels reports of dismal response to 3G, 4G auction

PTA says response was “very encouraging and satisfactory”, and that the auction will go through on April 23.

Google to buy drone-maker Titan Aerospace

The drones fly at an altitude of 65,000 feet and can remain aloft for up to five years.


Comments are closed.
Explore: Indian elections 2014
Explore: Indian elections 2014
How much do you know about Indian Elections?
How much do you know about Indian Elections?
Poll
From The Newspaper
Tweets