{"id":9717,"date":"2017-08-01T16:35:01","date_gmt":"2017-08-01T15:35:01","guid":{"rendered":"http:\/\/www.devopsonline.co.uk\/?p=9717"},"modified":"2017-08-02T09:08:11","modified_gmt":"2017-08-02T08:08:11","slug":"bitdefender-discovers-iot-cameras-used-cyber-criminals","status":"publish","type":"post","link":"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/","title":{"rendered":"Bitdefender discovers IoT cameras used by cyber criminals"},"content":{"rendered":"

According to Bitdefender, camera models from Shenzhen Neo Electronics are vulnerable to cyberattacks.<\/p>\n

The Chinese security firm reported that around 175,000 Shenzhen-based cameras, which are IoT connected and vulnerable to hacks, allowed cyber criminals to spy, enter a users network, or become part of a malicious botnet.<\/p>\n

Researchers studied two cameras; the NIP-22 model and the iDoorbell model, and found several buffer overflow vulnerabilities on both.<\/p>\n

The report stated: “These vulnerabilities could allow, under certain conditions, remote code execution on the device.<\/p>\n

“This type of vulnerability is also present on the gateway which controls the sensors and alarms. This could allow hackers to potentially disable alarms or sensors as well.\u201d<\/p>\n

Researchers found 100,000 \u2013 140,000 vulnerable cameras discoverable via the internet when searching for the HTTP web server, although it was estimated that 175,000 customers are at risk from the cameras because of its vulnerable RTSP server.<\/p>\n

The report added: \u201cThis proof of a concept attack confirms once again that most IoT devices are trivial to exploit because of improper quality assurance at the firmware level.<\/p>\n

\u201cPaired with the fact that the bug affects the authentication mechanism, that is, it does not require the user to already be authenticated to exploit the flaw and the massive pool of affected devices, we can only imagine the impact a harvested botnet of devices might have.\u201d<\/p>\n

According to Tech Republic<\/a>, security experts are predicted to rise in IoT security breaches throughout the year, so manufactures should make sure their devices are secure, and enterprises and consumers should have security protocols in place.<\/p>\n

Written by Leah Alger<\/p>\n","protected":false},"excerpt":{"rendered":"

According to Bitdefender, camera models from Shenzhen Neo Electronics are vulnerable to cyberattacks<\/p>\n","protected":false},"author":12,"featured_media":9718,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","pmpro_default_level":"","footnotes":""},"categories":[93,1158],"tags":[1653,1656,1651,1658,111,1657,1650,1654,1655,1649,1652],"yoast_head":"\nBitfender discovers IoT cameras used by cyber criminals are vulnerable<\/title>\n<meta name=\"description\" content=\"Bitfender discovers IoT cameras used by cyber criminals are vulnerable to cyberattacks, especially the NIP-22 model and the iDoorbell model's buffer overflo\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bitfender discovers IoT cameras used by cyber criminals are vulnerable\" \/>\n<meta property=\"og:description\" content=\"Bitfender discovers IoT cameras used by cyber criminals are vulnerable to cyberattacks, especially the NIP-22 model and the iDoorbell model's buffer overflo\" \/>\n<meta property=\"og:url\" content=\"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/\" \/>\n<meta property=\"og:site_name\" content=\"DevOps Online North America\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-01T15:35:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-08-02T08:08:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/devopsnews.online\/wp-content\/uploads\/2017\/08\/iStock-489251600.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1256\" \/>\n\t<meta property=\"og:image:height\" content=\"835\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leah Alger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DevOpsAmerica\" \/>\n<meta name=\"twitter:site\" content=\"@DevOpsAmerica\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leah Alger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/\"},\"author\":{\"name\":\"Leah Alger\",\"@id\":\"https:\/\/devopsnews.online\/#\/schema\/person\/d705a7d7c56b625b482e9b13a8e49a2c\"},\"headline\":\"Bitdefender discovers IoT cameras used by cyber criminals\",\"datePublished\":\"2017-08-01T15:35:01+00:00\",\"dateModified\":\"2017-08-02T08:08:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/\"},\"wordCount\":266,\"publisher\":{\"@id\":\"https:\/\/devopsnews.online\/#organization\"},\"image\":{\"@id\":\"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/devopsnews.online\/wp-content\/uploads\/2017\/08\/iStock-489251600.jpg\",\"keywords\":[\"cameras\",\"cyber criminals\",\"HTTP\",\"iDoorbell model\",\"IoT\",\"NIP-22 model\",\"security breach\",\"shenzhen\",\"spy\",\"tech republic\",\"web server\"],\"articleSection\":[\"Product news\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/\",\"url\":\"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/\",\"name\":\"Bitfender discovers IoT cameras used by cyber criminals are vulnerable\",\"isPartOf\":{\"@id\":\"https:\/\/devopsnews.online\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/devopsnews.online\/wp-content\/uploads\/2017\/08\/iStock-489251600.jpg\",\"datePublished\":\"2017-08-01T15:35:01+00:00\",\"dateModified\":\"2017-08-02T08:08:11+00:00\",\"description\":\"Bitfender discovers IoT cameras used by cyber criminals are vulnerable to cyberattacks, especially the NIP-22 model and the iDoorbell model's buffer overflo\",\"breadcrumb\":{\"@id\":\"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/#primaryimage\",\"url\":\"https:\/\/devopsnews.online\/wp-content\/uploads\/2017\/08\/iStock-489251600.jpg\",\"contentUrl\":\"https:\/\/devopsnews.online\/wp-content\/uploads\/2017\/08\/iStock-489251600.jpg\",\"width\":1256,\"height\":835,\"caption\":\"IoT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/devopsnews.online\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bitdefender discovers IoT cameras used by cyber criminals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/devopsnews.online\/#website\",\"url\":\"https:\/\/devopsnews.online\/\",\"name\":\"DevOps Online North America\",\"description\":\"by 31 Media Ltd.\",\"publisher\":{\"@id\":\"https:\/\/devopsnews.online\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/devopsnews.online\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/devopsnews.online\/#organization\",\"name\":\"DevOps Online North America\",\"url\":\"https:\/\/devopsnews.online\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/devopsnews.online\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/devopsnews.online\/wp-content\/uploads\/2020\/03\/DevOpsOnline_email.png\",\"contentUrl\":\"https:\/\/devopsnews.online\/wp-content\/uploads\/2020\/03\/DevOpsOnline_email.png\",\"width\":198,\"height\":64,\"caption\":\"DevOps Online North America\"},\"image\":{\"@id\":\"https:\/\/devopsnews.online\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/DevOpsAmerica\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/devopsnews.online\/#\/schema\/person\/d705a7d7c56b625b482e9b13a8e49a2c\",\"name\":\"Leah Alger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/devopsnews.online\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0ac9e809e8ffafd8330210900bac04c0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0ac9e809e8ffafd8330210900bac04c0?s=96&d=mm&r=g\",\"caption\":\"Leah Alger\"},\"url\":\"https:\/\/devopsnews.online\/author\/leah-alger\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bitfender discovers IoT cameras used by cyber criminals are vulnerable","description":"Bitfender discovers IoT cameras used by cyber criminals are vulnerable to cyberattacks, especially the NIP-22 model and the iDoorbell model's buffer overflo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/","og_locale":"en_US","og_type":"article","og_title":"Bitfender discovers IoT cameras used by cyber criminals are vulnerable","og_description":"Bitfender discovers IoT cameras used by cyber criminals are vulnerable to cyberattacks, especially the NIP-22 model and the iDoorbell model's buffer overflo","og_url":"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/","og_site_name":"DevOps Online North America","article_published_time":"2017-08-01T15:35:01+00:00","article_modified_time":"2017-08-02T08:08:11+00:00","og_image":[{"width":1256,"height":835,"url":"https:\/\/devopsnews.online\/wp-content\/uploads\/2017\/08\/iStock-489251600.jpg","type":"image\/jpeg"}],"author":"Leah Alger","twitter_card":"summary_large_image","twitter_creator":"@DevOpsAmerica","twitter_site":"@DevOpsAmerica","twitter_misc":{"Written by":"Leah Alger","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/#article","isPartOf":{"@id":"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/"},"author":{"name":"Leah Alger","@id":"https:\/\/devopsnews.online\/#\/schema\/person\/d705a7d7c56b625b482e9b13a8e49a2c"},"headline":"Bitdefender discovers IoT cameras used by cyber criminals","datePublished":"2017-08-01T15:35:01+00:00","dateModified":"2017-08-02T08:08:11+00:00","mainEntityOfPage":{"@id":"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/"},"wordCount":266,"publisher":{"@id":"https:\/\/devopsnews.online\/#organization"},"image":{"@id":"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/#primaryimage"},"thumbnailUrl":"https:\/\/devopsnews.online\/wp-content\/uploads\/2017\/08\/iStock-489251600.jpg","keywords":["cameras","cyber criminals","HTTP","iDoorbell model","IoT","NIP-22 model","security breach","shenzhen","spy","tech republic","web server"],"articleSection":["Product news","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/","url":"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/","name":"Bitfender discovers IoT cameras used by cyber criminals are vulnerable","isPartOf":{"@id":"https:\/\/devopsnews.online\/#website"},"primaryImageOfPage":{"@id":"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/#primaryimage"},"image":{"@id":"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/#primaryimage"},"thumbnailUrl":"https:\/\/devopsnews.online\/wp-content\/uploads\/2017\/08\/iStock-489251600.jpg","datePublished":"2017-08-01T15:35:01+00:00","dateModified":"2017-08-02T08:08:11+00:00","description":"Bitfender discovers IoT cameras used by cyber criminals are vulnerable to cyberattacks, especially the NIP-22 model and the iDoorbell model's buffer overflo","breadcrumb":{"@id":"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/#primaryimage","url":"https:\/\/devopsnews.online\/wp-content\/uploads\/2017\/08\/iStock-489251600.jpg","contentUrl":"https:\/\/devopsnews.online\/wp-content\/uploads\/2017\/08\/iStock-489251600.jpg","width":1256,"height":835,"caption":"IoT"},{"@type":"BreadcrumbList","@id":"https:\/\/devopsnews.online\/bitdefender-discovers-iot-cameras-used-cyber-criminals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/devopsnews.online\/"},{"@type":"ListItem","position":2,"name":"Bitdefender discovers IoT cameras used by cyber criminals"}]},{"@type":"WebSite","@id":"https:\/\/devopsnews.online\/#website","url":"https:\/\/devopsnews.online\/","name":"DevOps Online North America","description":"by 31 Media Ltd.","publisher":{"@id":"https:\/\/devopsnews.online\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/devopsnews.online\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/devopsnews.online\/#organization","name":"DevOps Online North America","url":"https:\/\/devopsnews.online\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/devopsnews.online\/#\/schema\/logo\/image\/","url":"https:\/\/devopsnews.online\/wp-content\/uploads\/2020\/03\/DevOpsOnline_email.png","contentUrl":"https:\/\/devopsnews.online\/wp-content\/uploads\/2020\/03\/DevOpsOnline_email.png","width":198,"height":64,"caption":"DevOps Online North America"},"image":{"@id":"https:\/\/devopsnews.online\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/DevOpsAmerica"]},{"@type":"Person","@id":"https:\/\/devopsnews.online\/#\/schema\/person\/d705a7d7c56b625b482e9b13a8e49a2c","name":"Leah Alger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/devopsnews.online\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0ac9e809e8ffafd8330210900bac04c0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0ac9e809e8ffafd8330210900bac04c0?s=96&d=mm&r=g","caption":"Leah Alger"},"url":"https:\/\/devopsnews.online\/author\/leah-alger\/"}]}},"_links":{"self":[{"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/posts\/9717"}],"collection":[{"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/comments?post=9717"}],"version-history":[{"count":0,"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/posts\/9717\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/media\/9718"}],"wp:attachment":[{"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/media?parent=9717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/categories?post=9717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devopsnews.online\/wp-json\/wp\/v2\/tags?post=9717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}