All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "319379",
"signature": "Article:319379",
"url": "https://staging.dailymaverick.co.za/article/2019-06-13-visual-surveillance-and-weak-cyber-security-part-one-when-cameras-get-dangerous/",
"shorturl": "https://staging.dailymaverick.co.za/article/319379",
"slug": "visual-surveillance-and-weak-cyber-security-part-one-when-cameras-get-dangerous",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Visual surveillance and weak cyber security, Part One: When cameras get dangerous",
"firstPublished": "2019-06-13 01:14:51",
"lastUpdate": "2019-06-13 01:14:51",
"categories": [
{
"id": "9",
"name": "Business Maverick",
"signature": "Category:9",
"slug": "business-maverick",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/business-maverick/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 23803,
"contents": "<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">With its total revenue for 2018 at</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> around R107-billion</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">, China’s <a href=\"https://www.hikvision.com/en/Corporate/Investor-Relations/Financial-Report\" target=\"_top\">Hangzhou Hikvision Digital Technology</a> currently leads the global video surveillance industry. Incorporated in 2001, Hikvision established a South African branch in 2015, and last year they opened a new office in Johannesburg. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But the partnership with Vumacam will see Hikvision’s footprint in South Africa grow substantially, and Vumacam also hopes to establish surveillance networks throughout Cape Town in the future.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Vumacam’s system uses Hikvision’s </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">IP cameras; each camera has a unique IP (internet protocol) address that identifies it on the Internet and allows it to “communicate” with other devices (just like any computer, modem, or smart TV connected to the net). </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">A residents’ association can rent Vumacam’s surveillance services for R730 a month per camera. Vumacam owns the cameras, stores the footage and controls access to all data. Security companies contracted by residents to monitor camera feeds can only view the footage of that specific neighbourhood.</span></span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-319218\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-1.jpg\" alt=\"\" width=\"2000\" height=\"1097\" /> Hikvision: Soon 15,000 high definition Hikvision IP cameras will be watching Johannesburg’s suburbs. (Image supplied)</p>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">It’s meant to curb crime, but since 2013</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> researchers have discovered several cybersecurity vulnerabilities in Hikvision’s products – most of which required very little skill to be exploited by hackers. Cyber vulnerability is a weak spot (an error in the code) of a computer program that a hacker can use to get into your computer, smartphone, IP camera, etc and wreak all sorts of havoc. The program or code that hackers design to get through that weak spot is called an exploit. An <a href=\"https://www.youtube.com/watch?v=bkLcUZ3q7U8\" target=\"_top\">exploit</a> can allow a hacker to remotely control a device, infect it with malware, or access data.</span></span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-319219\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-2.png\" alt=\"\" width=\"2000\" height=\"963\" /> A snapshot from a Vumacam online advertisement: The company plans to roll out thousands of high-definition surveillance cameras to curb crime throughout Joburg’s suburbs this year, and hopes to eventually expand its networks to other parts of the country.</p>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Annually, cybersecurity researchers discover thousands of vulnerabilities in software and firmware. (Roughly put, the firmware is software that comes built into the hardware. Without it, the device is useless. Other software, like Mac OS or Windows, runs “on top of” firmware, if you will. It’s often in the firmware of Hikvision’s surveillance equipment that vulnerabilities have been discovered.) Simultaneously, hackers design exploits, and although not every vulnerability is penetrated, no manufacturer is immune to attacks. The security organisation Risk Based Security reported that over 22,000 vulnerabilities were discovered in 2018.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Once a vulnerability is discovered, the manufacturer usually fixes it with a tweaked program called an update, patch, or fix. The onus is on the manufacturer to act fast in supplying the fix. It’s the camera owner’s job to install the update as soon as possible.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But in the past, Hikvision has taken its time.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">In 2013, the research company Core Security <a href=\"https://www.coresecurity.com/advisories/hikvision-ip-cameras-multiple-vulnerabilities#devices\" target=\"_top\">discovered three vulnerabilities</a> in the firmware of one Hikvision model, the </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">DS-2CD7153-E Network Mini Dome Camera. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The company suspected that as many as 165 other Hikvision camera models using the same firmware were affected, but this remains unconfirmed. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The vulnerabilities were remotely exploitable, meaning that the hacker could launch the attack over the Internet, from anywhere in the world. Between the three weak spots, they allowed a hacker to access all camera data, render the camera useless, or send commands to control it. One vulnerability was one of the most serious ever known to be discovered in a Hikvision product. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">As serious as it gets.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Not all cyber vulnerabilities are equal. Some are easier to exploit than others. Some will allow a hacker to take complete control of a device and even use it to do serious damage to other Internet services. Others may simply allow a hacker to render a device useless, or only allow partial access to the device’s data.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">This is where the Common Vulnerability Scoring System (CVSS) comes into the picture. It’s an international industry standard, and basically a scale of zero to 10. A score of one means the vulnerability does not pose a big threat. A score of 10 means it’s very easy to design an exploit and will lead to serious damage. With so many cyber vulnerabilities out there, cyber security teams have to deal with the most serious ones first. The CVSS is aimed at helping them prioritise.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">One of Hikvision’s 2013 vulnerabilities scored a perfect 10.</span></span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-319220\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-3.png\" alt=\"\" width=\"2241\" height=\"1511\" /> The Hikvision DS-2CD7153-E Network Mini Dome Camera may be ‘vandal proof’, but the same could not be said for its immunity to cyber vandals. Its 2013 vulnerability was assigned the most serious security rating possible. (Image supplied)</p>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Core Security contacted Hikvision four times over three weeks to warn them. After a month passed with no response, the researchers posted details of the vulnerabilities on the Core Security website and warned the public not to expose their cameras to the Internet “unless absolutely necessary”. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Similar incidents of unresponsiveness from Hikvision followed. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">In 2014, cybersecurity company Rapid7 <a href=\"https://blog.rapid7.com/2014/11/19/r7-2014-18-hikvision-dvr-devices-multiple-vulnerabilities/\" target=\"_top\">discovered three vulnerabilities</a> in certain Hikvision digital video recorders, or DVRs. DVRs are connected to the cameras, and they record what is filmed.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The vulnerabilities made it possible for a hacker anywhere in the world to access the DVRs. Two of these vulnerabilities enabled hackers to slow down or even shut down the DVR. The third vulnerability allowed hackers to take full control of it. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Rapid7 said their research revealed many manufacturers with vulnerable products, but the “Hikvision models in particular” were “very popular...with around 150,000 devices remotely accessible”. </span></span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-319221\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-4.png\" alt=\"\" width=\"2089\" height=\"1081\" /> A user interface for a Hikvision digital video recorder (DVR). You need a username and password to log in and operate the DVR, but in 2014 cyber security experts at the Rapid7 research company reported that the Hikvision DVR model DS7204 and other models in the same series could be completely taken over by a hacker. (Source: Rapid7)</p>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">According to Rapid7, “Hikvision provided no response to these issues after several attempts to contact them.” Thus, on 19 November 2014, more than two months after their first warning to Hikvision, Rapid7 disclosed the problem to the public, advising consumers that “Hikvision DVR devices and similar products should not be exposed to the internet without the usual additional protective measures”.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Then in 2016, independent researcher Iraklis Mathiopoulos <a href=\"https://medium.com/@iraklis/an-unlikely-xxe-in-hikvisions-remote-access-camera-cloud-d57faf99620f\" target=\"_top\">discovered how to hack</a> Hikvision’s global cloud servers. The vulnerability would allow an attacker to get hold of private customer data stored on the server from a remote location.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">More specifically, Mathiopoulos was investigating one of Hikvision’s cloud cameras. As the name suggests, this type of camera is connected to a Hikvision cloud storage facility, also known as a cloud server. You access the camera through these cloud servers. Whatever the camera films is uploaded to the server. After this, you have to log into the server to look at your videos. This allows you to see what’s going on at your house through an app on your smartphone.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Mathiopoulos said that “</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">ultimately, it wouldn’t be that difficult to get access to</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">more than 100,000 cloud-based cameras and DVRs (digital video recorders). The vulnerable servers are part of the backend system of</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> <a href=\"http://www.hik-online.com/\" target=\"_top\">hik-online.com,</a></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> a service that Hikvision offers to access your PVRs (personal video recorder) and cameras via the web.”</span></span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-319222\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-5.png\" alt=\"\" width=\"2880\" height=\"1539\" /> A landing page for hik-online.com. Researcher Iraklis Mathiopoulos discovered a vulnerability in Hikvision’s cloud servers, a service that gives camera users access to their IP cameras and video recorders via the Internet. This is the login page for the cloud servers, but Mathiopoulos found a way around the username and password.</p>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Mathiopoulus said that he alerted Hikvision to the problem on 25 August 2016. It took nearly two weeks and three emails from Mathiopoulus before they responded. On 8 September 2016, Hikvision let him know that they had fixed the problem, and asked him to try to hack in again. As a reward for helping them solve the problem, Hikvision sent him a camera valued at $69.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">These incidents reveal that it hasn’t been uncommon for outside companies and individuals to discover Hikvision product vulnerabilities, despite Hikvision having a dedicated in-house Cyber Security Centre. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">For an indication of why this is the case,</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i> Daily Maverick</i></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> spoke to cyber security expert John Honovich. Honovich heads <a href=\"https://ipvm.com/about\" target=\"_top\">IPVM</a></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">, </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">a group of </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">independent experts that test IP-based surveillance products from all over the world. We asked Honovich if he</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> believed that the state of affairs was a reflection on the inadequacy of Hikvision’s cybersecurity research efforts.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Honowich’s answer: “</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">That's hard to tell, because sources close to the company tell us that when Hikvision discovers vulnerabilities (or their contracted security people do) in existing production products, they will fix it but not let the public know. Our understanding is that Hikvision does this to limit negative media coverage, but it puts users at risk who assume the existing firmware does not have issues.”</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The implication of this is that there could be many more vulnerabilities than Hikvision lets on, and many more vulnerable products.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Fortunately, in the above incidents, no devices were actually hacked. But that’s not always been the case. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">In February 2015 the Chinese government itself became a victim of a cyber attack. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hikvision equipment within the </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">surveillance system of China’s Jiangsu province was hacked. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The Jiangsu Provincial Public Security Department saw it as a serious threat and ordered “all local public security science and technology information offices to carry out a comprehensive inventory of all Hikvision equipment” and to establish stronger passwords and eradicate viruses. This is according to a <a href=\"https://translate.google.com/translate?sl=zh-CN&tl=en&js=y&prev=_t&hl=en&ie=UTF-8&u=http://www1.hikvision.com/cn/news_detail_63_i1273.html&edit-text=&act=url\" target=\"_top\">Hikvision press statement</a>, which this time was released almost immediately after the hack was discovered.</span></span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-319223\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-6.png\" alt=\"\" width=\"2000\" height=\"1250\" /> In February 2015, hackers from outside China hacked IP cameras at the facilities of the Jiangsu Provincial Public Security Department. (Source: Google Maps)</p>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hackers had reportedly exploited weak usernames and passwords (like admin and 12345). These were the original factory default settings that remained unchanged when the cameras were first installed. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Not changing default passwords and usernames of any computer application can lead to significant security issues, because the passwords are easy to guess.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But the Jiangsu hack could also have been prevented with measures taken by the manufacturer. For instance, </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">manufacturers can programme their software to prompt – or force – the customer to create a new username and password upon first switching on the device. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Weak default passwords weren’t news to Hikvision.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">In April 2014, there was another Hikvision hacking incident involving weak passwords. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">A researcher at the <a href=\"https://www.sans.edu/\" target=\"_top\">Sans Technology Institute</a> discovered malware that had <a href=\"https://isc.sans.edu/forums/diary/More+Device+Malware+This+is+why+your+DVR+attacked+my+Synology+Disk+Station+and+now+with+Bitcoin+Miner/17879/\" target=\"_top\">infected Hikvision’s digital video recorders</a>. The aim: To turn the processors inside the recorders into Bitcoin miners. As the name suggests, Bitcoin miners are computer processors used to generate the online currency, Bitcoin.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">A high-powered processor far stronger than that of a video recorder is needed to effectively mine Bitcoin. But the hackers infected the devices regardless and, as the tech website <a href=\"https://www.wired.com/2014/04/hikvision\" target=\"_top\">Wired noted</a> in their report on the issue, this hack was probably a “side-effect” of the rapidly growing Internet-of-Things (IoT). With all manner of devices joining the internet, ranging from IP cameras to fridges, microwaves, medical equipment and baby monitors, hackers have new targets. At the end of 2018, there were an estimated</span></span> <span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><a href=\"https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/\" target=\"_top\">seven billion IoT devices</a> (not including phones, laptops and tablets) connected online.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">And if you think that an IP camera is safe because it is lost in the vast sea of IoT devices, you are sorely mistaken.</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> There are websites like Shodan – basically a search engine for IoT devices. Shodan can reveal IoT devices’ IP addresses and geographic co-ordinates, if you know how to use it. It can even take you straight to the login page of someone’s personal device – like an IP camera. The process is demonstrated below.</span></span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-319224\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-7.png\" alt=\"\" width=\"2880\" height=\"1636\" /> Shodan: The search engine for the Internet-of-Things. As part of their research to map hacked and vulnerable Hikvision cameras, the IPVM engineers used Shodan to search for the company’s cameras globally. This is a screenshot of the search results page (Note: this simply shows where Hikvision cameras are, and not if they are hacked.) The results show more than 600,000 Hikvision devices, with just over 4,000 in South Africa indexed in Shodan. At the top of the results list, is a camera in Leeds in the UK with the IP address 86.154.92.0. Click on the address, and it will show you the device’s exact location — and more.</p>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-319225\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-8.png\" alt=\"\" width=\"2880\" height=\"1621\" /> Shodan at work: Clicking on the IP address 86. 154. 92.0 brings up the exact geographic co-ordinates of the camera in Leeds, UK. And plenty of other information.</p>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-319226\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-9.png\" alt=\"\" width=\"2880\" height=\"1715\" /> One step closer: Shodan takes you right to the landing page of the specific camera you wish to hack. This is the landing page for the camera in Leeds, UK. Now, the hacking can begin.</p>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">And this is where the issue of vulnerable surveillance IP cameras starts to affect not only individuals’ personal privacy and safety, but also the stability of the Internet globally. For a hacker, a known IP address is a one-way ticket into a vulnerable IoT device. And a common strategy involves controlling many of these IoT devices and using them collectively to attack a bigger target. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Prominent examples of this type of onslaught, are the <a href=\"https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/\" target=\"_top\">Mirai</a></span></span> <span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">botnet attacks of 2016. Incidentally, IP cameras featured prominently during these attacks.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">A botnet attack works like this: Once an IoT device is taken over completely by a hacker, that device is called a “bot”. Several such bots form a botnet (a network of bots), which is then used to launch what’s known as DDoS attack. DDoS stands for Distributed Denial of Service. It’s called a distributed attack because thousands of devices that are distributed all over the world send data to one victim, like a computer server. With so much information coming in, the server is overwhelmed and crashes. It’s basically a digital stoning. With multiple sources attacking, it’s difficult to pinpoint any one culprit and deal with it.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The Mirai malware is thought to have been used in major DDoS attacks. For example, in October 2016 Dyn, the company that provides crucial services upon which prominent sites (like Netflix, Paypal, Twitter, Amazon, and Visa) are dependent, got attacked. The idea was to knock these sites offline. At one stage, most of the US East Coast, as well as data centres in</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> Texas, Washington, and California,</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> were reported to be either <a href=\"https://www.csoonline.com/article/3133992/ddos-knocks-down-dns-datacenters-across-the-u-s-affected.html\" target=\"_top\">knocked off the net</a>, or having network issues. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Back in 2014, the Hikvision cameras-turned-Bitcoin miners were not part of a botnet, but it was an illustration of how easily hackers can get IoT devices to do their bidding. Hikvision responded to the 2014 Bitcoin mining incident by urging customers to update their firmware and set better passwords. But since then, the company has made more concrete changes. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hikvision told </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>Daily Maverick</i></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> that </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">it was “one of the first companies in the industry to establish a more secure activation process by requiring users to set passwords at the time of first use – rather than the ‘plug and play’ model with a universal password – adding another layer of security.” </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But in 2017, an independent researcher, known only by the alias Montecrypto, found a major security flaw in some Hikvision IP cameras – one that would be child’s play to exploit, no matter the strength of the password or obscurity of the username. This time, the US government took notice.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Posting on the web forum IP Cam Talk on 5 March 2017, Montecrypto warned fellow forum members to disconnect their Hikvision </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">cameras from the Internet because he/she had found a vulnerability known as a backdoor.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">A backdoor is an</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> entry point into a software system through which an administrator can access that system to maintain it. It allows one to bypass the username and password. Backdoors are often legitimate parts of computer systems built in by a manufacturer. But, manufacturers can also secretly build backdoors into their software to allow them access to their customers’ private systems and data.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Either way, a backdoor leaves a system more vulnerable to hackers. </span></span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-319227\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-10.png\" alt=\"\" width=\"2000\" height=\"875\" /> Montecrypto’s post on the IP Cam Talk web forum, an international forum with about 68,000 registered users involved in the IP surveillance industry, including professionals and consumers.</p>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Montecrypto gave Hikvision two weeks to provide a date by which they would have the update ready, and to explain why there was a backdoor in the first place. If they didn’t, he/she would warn the public and release firmware to disable the backdoor.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hikvision engaged with Montecrypto almost immediately. On 12 and 15 March, they released press statements detailing the threat, with links to new upgrades. Montecrypto delayed the disclosure. By 20 March </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">the US Department of Homeland Security (DHS) had become involved, and</span></span> <span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">on 4 May they issued a warning statement assigning the vulnerability a CVSS score of 10. They credited the discovery to Montecrypto. On the same day, Hikvision posted another warning on their website, declaring that they were working with the DHS on the matter.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But thousands missed the warnings. So, on 12 September 2017, <a href=\"https://seclists.org/fulldisclosure/2017/Sep/23\" target=\"_top\">Montecrypto sent out an alert</a> candidly describing the vulnerability as a “</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">severe risk” that is “trivial to exploit”. The researcher said</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> the flaw had been present in the cameras since at least 2014, with “hundreds of thousands” of devices still vulnerable to attack.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><a href=\"https://ipvm.com/reports/hik-bad-sec\" target=\"_top\">IPVM criticised</a> Hikvision’s handling of the situation, stating that, in an attempt to avoid bad press, they did not do enough to let customers know about the vulnerability’s severity. To illustrate how easy it was to hack into affected cameras, the IPVM group set up a test. You can view the demonstration, which lasts just under 90 seconds, <a href=\"https://www.youtube.com/watch?v=bhY71LHRPK4\" target=\"_top\">here</a>.</span></span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-319228\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-12.png\" alt=\"\" width=\"1201\" height=\"1071\" /> A Hikvision password reset tool used to hack into certain Hikvision IP cameras. The tool was made possible by Montecrypto’s discovery of a back door in various Hikvision models. The IPVM website created this demonstration to show how easy the hack is.</p>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">IPVM also set up a <a href=\"https://ipvm.com/reports/hik-hack-map\" target=\"_top\">map</a></span></span> <span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">showing thousands of Hikvision cameras throughout the US and Europe that had either been hacked already (about 700 cameras) or were sitting ducks for hackers (about 3,400 cameras). The cameras were monitoring driveways, hotel corridors, laboratories, reception desks, backyards, front doors, kitchens, living rooms, garages, and even a child sleeping in a crib.</span></span>\r\n\r\n<p><img loading=\"lazy\" class=\"size-full wp-image-319229\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-13.png\" alt=\"\" width=\"1426\" height=\"1544\" /> The IPVM group of engineers set up a map of all the Hikvision cameras that remained vulnerable or were already hacked using the backdoor Montecrypto discovered. This picture shows a hacked camera in a small shop in Poland.</p>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Neither Hikvision nor the US Department of Homeland Security ever referred to the vulnerability as a “backdoor”, and instead labelled it a privilege-escalating vulnerability. Whether or not the vulnerability was intentionally planted by Hikvision to spy on customers or a careless mistake, remains a topic of debate in IP surveillance circles. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But the </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">issue still contributed to the United States banning its government agencies from using Hikvision equipment through the newly enacted </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">National </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Defense</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> Authorization </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Act</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> for the fiscal year 2019. With the US Fearing Chinese espionage, the backdoor only fueled American suspicions. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Asked for comment, a Hikvision corporate spokesperson stated via email: “We’d like to reinforce that there is no evidence anywhere in the world, including South African and the US, to indicate that Hikvision’s products are used for unauthorised collection of information. Hikvision has never conducted, nor will it conduct, any espionage-related activities for any government in the world.”</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">We asked Hikvision about the allegation that Hikvision does not always disclose the vulnerabilities its research teams discover, and about their slow response times to reports of vulnerabilities in the past.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">A company spokesperson stated: “</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hikvision manages a world-class enterprise vulnerability management process and is quick to distribute updates and security patches to its customers in collaboration with the US Department of Homeland Security and other industry stakeholders. Hikvision is a CVE Numbering Authority and part of the family of global companies who maintain the CVE vulnerability library. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hikvision is committed to the integrity of its products and industry-leading cybersecurity standards. We work with many globally authoritative third-party organisations in the cybersecurity industry to obtain objective and independent security assessments and authentication. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hikvision products currently meet industry-leading standards including Federal Information Processing Standard (FIPS) 140-2 which was created by the National Institute of Standards and Technology, (NIST), a division of the US Department of Commerce.</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">”</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>Daily Maverick</i></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> asked Vumacam </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">why they chose to partner with Hikvision despite its cybersecurity issues. Vumacam </span></span><span style=\"color: #222222;\"><span style=\"font-family: Arial, Helvetica, sans-serif;\"> sp</span></span><span style=\"color: #222222;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">okesperson Ashleigh Parry </span></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">said they “gave consideration to</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> product performance and integrity, the structure, integrity and sustainability of the surveillance system as a whole, price points and the ability to provide the market with effective access to security” and added that they’re “confident” of the product’s “veracity”, since it was the world’s “leading product”. They also said that the cameras have several safeguards to prevent “hacking and/or any use of feed for any unauthorised activity”, and that the company would take “corrective measures” if their systems were ever compromised. Vumacam said the </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">product continues to meet its robust testing processes. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Asked if they specifically test Hikvision’s firmware for vulnerabilities, Vumacam stated that they “rigorously test any new firmware before deployment in the field. Once in deployment, we have robust internal processes to continuously stress-test and minimise vulnerabilities. With regard to cybersecurity, we go to great lengths to ensure the integrity of our system, protecting ourselves and our clients against any unauthorised access.”</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">That’s a good thing, because Hikvision’s troubles are not over.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Israeli cybersecurity research group VDOO discovered the latest vulnerability in August 2018. It was an error in the coding of some camera models’ firmware known as a “buffer overflow”. It enabled an attacker to send commands to cameras from a remote location. Again, it required a very low skill level, and with a CVSS score of 9.8, it was critical. At least nine such weaknesses have been discovered in Hikvision products since 2013.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">So far, Hikvision’s response time has improved. According to VDOO, Hikvision acted promptly to make available new firmware to solve the problem. As far as could be established, no cameras were hacked.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But whether or not Hikvision’s products can be trusted, is still being debated in surveillance circles. For now, we’ll just have to trust Vumacam’s vision. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><u><b>BM</b></u></span></span>\r\n\r\n<span style=\"color: #000000;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>Heidi Swart is an investigative journalist who reports on surveillance and data privacy issues.</i></span></span></span>\r\n\r\n<span style=\"color: #000000;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"><i>This story was commissioned by the Media Policy and Democracy Project, an initiative of the University of Johannesburg’s department of journalism, film and TV and Unisa’s department of communication science.</i></span></span></span></span>",
"teaser": "Visual surveillance and weak cyber security, Part One: When cameras get dangerous",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "509",
"name": "Heidi Swart",
"image": "http://local.dailymaverick.co.za/wp-content/uploads/heidiswart.jpg",
"url": "https://staging.dailymaverick.co.za/author/heidiswart/",
"editorialName": "heidiswart",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "2072",
"name": "Surveillance",
"url": "https://staging.dailymaverick.co.za/keyword/surveillance/",
"slug": "surveillance",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Surveillance",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "20017",
"name": "Hacking",
"url": "https://staging.dailymaverick.co.za/keyword/hacking/",
"slug": "hacking",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Hacking",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "59909",
"name": "cyber security",
"url": "https://staging.dailymaverick.co.za/keyword/cyber-security/",
"slug": "cyber-security",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "cyber security",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "133538",
"name": "Vumacam",
"url": "https://staging.dailymaverick.co.za/keyword/vumacam/",
"slug": "vumacam",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Vumacam",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "45918",
"name": "The IPVM group of engineers set up a map of all the Hikvision cameras that remained vulnerable or were already hacked using the backdoor Montecrypto discovered. This picture shows a hacked camera in a small shop in Poland.\n\n ",
"description": "<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">With its total revenue for 2018 at</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> around R107-billion</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">, China’s <a href=\"https://www.hikvision.com/en/Corporate/Investor-Relations/Financial-Report\" target=\"_top\">Hangzhou Hikvision Digital Technology</a> currently leads the global video surveillance industry. Incorporated in 2001, Hikvision established a South African branch in 2015, and last year they opened a new office in Johannesburg. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But the partnership with Vumacam will see Hikvision’s footprint in South Africa grow substantially, and Vumacam also hopes to establish surveillance networks throughout Cape Town in the future.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Vumacam’s system uses Hikvision’s </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">IP cameras; each camera has a unique IP (internet protocol) address that identifies it on the Internet and allows it to “communicate” with other devices (just like any computer, modem, or smart TV connected to the net). </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">A residents’ association can rent Vumacam’s surveillance services for R730 a month per camera. Vumacam owns the cameras, stores the footage and controls access to all data. Security companies contracted by residents to monitor camera feeds can only view the footage of that specific neighbourhood.</span></span>\r\n\r\n[caption id=\"attachment_319218\" align=\"alignnone\" width=\"2000\"]<img class=\"size-full wp-image-319218\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-1.jpg\" alt=\"\" width=\"2000\" height=\"1097\" /> Hikvision: Soon 15,000 high definition Hikvision IP cameras will be watching Johannesburg’s suburbs. (Image supplied)[/caption]\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">It’s meant to curb crime, but since 2013</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> researchers have discovered several cybersecurity vulnerabilities in Hikvision’s products – most of which required very little skill to be exploited by hackers. Cyber vulnerability is a weak spot (an error in the code) of a computer program that a hacker can use to get into your computer, smartphone, IP camera, etc and wreak all sorts of havoc. The program or code that hackers design to get through that weak spot is called an exploit. An <a href=\"https://www.youtube.com/watch?v=bkLcUZ3q7U8\" target=\"_top\">exploit</a> can allow a hacker to remotely control a device, infect it with malware, or access data.</span></span>\r\n\r\n[caption id=\"attachment_319219\" align=\"alignnone\" width=\"2000\"]<img class=\"size-full wp-image-319219\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-2.png\" alt=\"\" width=\"2000\" height=\"963\" /> A snapshot from a Vumacam online advertisement: The company plans to roll out thousands of high-definition surveillance cameras to curb crime throughout Joburg’s suburbs this year, and hopes to eventually expand its networks to other parts of the country.[/caption]\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Annually, cybersecurity researchers discover thousands of vulnerabilities in software and firmware. (Roughly put, the firmware is software that comes built into the hardware. Without it, the device is useless. Other software, like Mac OS or Windows, runs “on top of” firmware, if you will. It’s often in the firmware of Hikvision’s surveillance equipment that vulnerabilities have been discovered.) Simultaneously, hackers design exploits, and although not every vulnerability is penetrated, no manufacturer is immune to attacks. The security organisation Risk Based Security reported that over 22,000 vulnerabilities were discovered in 2018.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Once a vulnerability is discovered, the manufacturer usually fixes it with a tweaked program called an update, patch, or fix. The onus is on the manufacturer to act fast in supplying the fix. It’s the camera owner’s job to install the update as soon as possible.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But in the past, Hikvision has taken its time.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">In 2013, the research company Core Security <a href=\"https://www.coresecurity.com/advisories/hikvision-ip-cameras-multiple-vulnerabilities#devices\" target=\"_top\">discovered three vulnerabilities</a> in the firmware of one Hikvision model, the </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">DS-2CD7153-E Network Mini Dome Camera. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The company suspected that as many as 165 other Hikvision camera models using the same firmware were affected, but this remains unconfirmed. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The vulnerabilities were remotely exploitable, meaning that the hacker could launch the attack over the Internet, from anywhere in the world. Between the three weak spots, they allowed a hacker to access all camera data, render the camera useless, or send commands to control it. One vulnerability was one of the most serious ever known to be discovered in a Hikvision product. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">As serious as it gets.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Not all cyber vulnerabilities are equal. Some are easier to exploit than others. Some will allow a hacker to take complete control of a device and even use it to do serious damage to other Internet services. Others may simply allow a hacker to render a device useless, or only allow partial access to the device’s data.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">This is where the Common Vulnerability Scoring System (CVSS) comes into the picture. It’s an international industry standard, and basically a scale of zero to 10. A score of one means the vulnerability does not pose a big threat. A score of 10 means it’s very easy to design an exploit and will lead to serious damage. With so many cyber vulnerabilities out there, cyber security teams have to deal with the most serious ones first. The CVSS is aimed at helping them prioritise.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">One of Hikvision’s 2013 vulnerabilities scored a perfect 10.</span></span>\r\n\r\n[caption id=\"attachment_319220\" align=\"alignnone\" width=\"2241\"]<img class=\"size-full wp-image-319220\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-3.png\" alt=\"\" width=\"2241\" height=\"1511\" /> The Hikvision DS-2CD7153-E Network Mini Dome Camera may be ‘vandal proof’, but the same could not be said for its immunity to cyber vandals. Its 2013 vulnerability was assigned the most serious security rating possible. (Image supplied)[/caption]\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Core Security contacted Hikvision four times over three weeks to warn them. After a month passed with no response, the researchers posted details of the vulnerabilities on the Core Security website and warned the public not to expose their cameras to the Internet “unless absolutely necessary”. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Similar incidents of unresponsiveness from Hikvision followed. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">In 2014, cybersecurity company Rapid7 <a href=\"https://blog.rapid7.com/2014/11/19/r7-2014-18-hikvision-dvr-devices-multiple-vulnerabilities/\" target=\"_top\">discovered three vulnerabilities</a> in certain Hikvision digital video recorders, or DVRs. DVRs are connected to the cameras, and they record what is filmed.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The vulnerabilities made it possible for a hacker anywhere in the world to access the DVRs. Two of these vulnerabilities enabled hackers to slow down or even shut down the DVR. The third vulnerability allowed hackers to take full control of it. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Rapid7 said their research revealed many manufacturers with vulnerable products, but the “Hikvision models in particular” were “very popular...with around 150,000 devices remotely accessible”. </span></span>\r\n\r\n[caption id=\"attachment_319221\" align=\"alignnone\" width=\"2089\"]<img class=\"size-full wp-image-319221\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-4.png\" alt=\"\" width=\"2089\" height=\"1081\" /> A user interface for a Hikvision digital video recorder (DVR). You need a username and password to log in and operate the DVR, but in 2014 cyber security experts at the Rapid7 research company reported that the Hikvision DVR model DS7204 and other models in the same series could be completely taken over by a hacker. (Source: Rapid7)[/caption]\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">According to Rapid7, “Hikvision provided no response to these issues after several attempts to contact them.” Thus, on 19 November 2014, more than two months after their first warning to Hikvision, Rapid7 disclosed the problem to the public, advising consumers that “Hikvision DVR devices and similar products should not be exposed to the internet without the usual additional protective measures”.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Then in 2016, independent researcher Iraklis Mathiopoulos <a href=\"https://medium.com/@iraklis/an-unlikely-xxe-in-hikvisions-remote-access-camera-cloud-d57faf99620f\" target=\"_top\">discovered how to hack</a> Hikvision’s global cloud servers. The vulnerability would allow an attacker to get hold of private customer data stored on the server from a remote location.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">More specifically, Mathiopoulos was investigating one of Hikvision’s cloud cameras. As the name suggests, this type of camera is connected to a Hikvision cloud storage facility, also known as a cloud server. You access the camera through these cloud servers. Whatever the camera films is uploaded to the server. After this, you have to log into the server to look at your videos. This allows you to see what’s going on at your house through an app on your smartphone.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Mathiopoulos said that “</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">ultimately, it wouldn’t be that difficult to get access to</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">more than 100,000 cloud-based cameras and DVRs (digital video recorders). The vulnerable servers are part of the backend system of</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> <a href=\"http://www.hik-online.com/\" target=\"_top\">hik-online.com,</a></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> a service that Hikvision offers to access your PVRs (personal video recorder) and cameras via the web.”</span></span>\r\n\r\n[caption id=\"attachment_319222\" align=\"alignnone\" width=\"2880\"]<img class=\"size-full wp-image-319222\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-5.png\" alt=\"\" width=\"2880\" height=\"1539\" /> A landing page for hik-online.com. Researcher Iraklis Mathiopoulos discovered a vulnerability in Hikvision’s cloud servers, a service that gives camera users access to their IP cameras and video recorders via the Internet. This is the login page for the cloud servers, but Mathiopoulos found a way around the username and password.[/caption]\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Mathiopoulus said that he alerted Hikvision to the problem on 25 August 2016. It took nearly two weeks and three emails from Mathiopoulus before they responded. On 8 September 2016, Hikvision let him know that they had fixed the problem, and asked him to try to hack in again. As a reward for helping them solve the problem, Hikvision sent him a camera valued at $69.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">These incidents reveal that it hasn’t been uncommon for outside companies and individuals to discover Hikvision product vulnerabilities, despite Hikvision having a dedicated in-house Cyber Security Centre. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">For an indication of why this is the case,</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i> Daily Maverick</i></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> spoke to cyber security expert John Honovich. Honovich heads <a href=\"https://ipvm.com/about\" target=\"_top\">IPVM</a></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">, </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">a group of </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">independent experts that test IP-based surveillance products from all over the world. We asked Honovich if he</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> believed that the state of affairs was a reflection on the inadequacy of Hikvision’s cybersecurity research efforts.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Honowich’s answer: “</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">That's hard to tell, because sources close to the company tell us that when Hikvision discovers vulnerabilities (or their contracted security people do) in existing production products, they will fix it but not let the public know. Our understanding is that Hikvision does this to limit negative media coverage, but it puts users at risk who assume the existing firmware does not have issues.”</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The implication of this is that there could be many more vulnerabilities than Hikvision lets on, and many more vulnerable products.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Fortunately, in the above incidents, no devices were actually hacked. But that’s not always been the case. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">In February 2015 the Chinese government itself became a victim of a cyber attack. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hikvision equipment within the </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">surveillance system of China’s Jiangsu province was hacked. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The Jiangsu Provincial Public Security Department saw it as a serious threat and ordered “all local public security science and technology information offices to carry out a comprehensive inventory of all Hikvision equipment” and to establish stronger passwords and eradicate viruses. This is according to a <a href=\"https://translate.google.com/translate?sl=zh-CN&tl=en&js=y&prev=_t&hl=en&ie=UTF-8&u=http://www1.hikvision.com/cn/news_detail_63_i1273.html&edit-text=&act=url\" target=\"_top\">Hikvision press statement</a>, which this time was released almost immediately after the hack was discovered.</span></span>\r\n\r\n[caption id=\"attachment_319223\" align=\"alignnone\" width=\"2000\"]<img class=\"size-full wp-image-319223\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-6.png\" alt=\"\" width=\"2000\" height=\"1250\" /> In February 2015, hackers from outside China hacked IP cameras at the facilities of the Jiangsu Provincial Public Security Department. (Source: Google Maps)[/caption]\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hackers had reportedly exploited weak usernames and passwords (like admin and 12345). These were the original factory default settings that remained unchanged when the cameras were first installed. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Not changing default passwords and usernames of any computer application can lead to significant security issues, because the passwords are easy to guess.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But the Jiangsu hack could also have been prevented with measures taken by the manufacturer. For instance, </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">manufacturers can programme their software to prompt – or force – the customer to create a new username and password upon first switching on the device. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Weak default passwords weren’t news to Hikvision.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">In April 2014, there was another Hikvision hacking incident involving weak passwords. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">A researcher at the <a href=\"https://www.sans.edu/\" target=\"_top\">Sans Technology Institute</a> discovered malware that had <a href=\"https://isc.sans.edu/forums/diary/More+Device+Malware+This+is+why+your+DVR+attacked+my+Synology+Disk+Station+and+now+with+Bitcoin+Miner/17879/\" target=\"_top\">infected Hikvision’s digital video recorders</a>. The aim: To turn the processors inside the recorders into Bitcoin miners. As the name suggests, Bitcoin miners are computer processors used to generate the online currency, Bitcoin.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">A high-powered processor far stronger than that of a video recorder is needed to effectively mine Bitcoin. But the hackers infected the devices regardless and, as the tech website <a href=\"https://www.wired.com/2014/04/hikvision\" target=\"_top\">Wired noted</a> in their report on the issue, this hack was probably a “side-effect” of the rapidly growing Internet-of-Things (IoT). With all manner of devices joining the internet, ranging from IP cameras to fridges, microwaves, medical equipment and baby monitors, hackers have new targets. At the end of 2018, there were an estimated</span></span> <span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><a href=\"https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b/\" target=\"_top\">seven billion IoT devices</a> (not including phones, laptops and tablets) connected online.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">And if you think that an IP camera is safe because it is lost in the vast sea of IoT devices, you are sorely mistaken.</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> There are websites like Shodan – basically a search engine for IoT devices. Shodan can reveal IoT devices’ IP addresses and geographic co-ordinates, if you know how to use it. It can even take you straight to the login page of someone’s personal device – like an IP camera. The process is demonstrated below.</span></span>\r\n\r\n[caption id=\"attachment_319224\" align=\"alignnone\" width=\"2880\"]<img class=\"size-full wp-image-319224\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-7.png\" alt=\"\" width=\"2880\" height=\"1636\" /> Shodan: The search engine for the Internet-of-Things. As part of their research to map hacked and vulnerable Hikvision cameras, the IPVM engineers used Shodan to search for the company’s cameras globally. This is a screenshot of the search results page (Note: this simply shows where Hikvision cameras are, and not if they are hacked.) The results show more than 600,000 Hikvision devices, with just over 4,000 in South Africa indexed in Shodan. At the top of the results list, is a camera in Leeds in the UK with the IP address 86.154.92.0. Click on the address, and it will show you the device’s exact location — and more.[/caption]\r\n\r\n[caption id=\"attachment_319225\" align=\"alignnone\" width=\"2880\"]<img class=\"size-full wp-image-319225\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-8.png\" alt=\"\" width=\"2880\" height=\"1621\" /> Shodan at work: Clicking on the IP address 86. 154. 92.0 brings up the exact geographic co-ordinates of the camera in Leeds, UK. And plenty of other information.[/caption]\r\n\r\n[caption id=\"attachment_319226\" align=\"alignnone\" width=\"2880\"]<img class=\"size-full wp-image-319226\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-9.png\" alt=\"\" width=\"2880\" height=\"1715\" /> One step closer: Shodan takes you right to the landing page of the specific camera you wish to hack. This is the landing page for the camera in Leeds, UK. Now, the hacking can begin.[/caption]\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">And this is where the issue of vulnerable surveillance IP cameras starts to affect not only individuals’ personal privacy and safety, but also the stability of the Internet globally. For a hacker, a known IP address is a one-way ticket into a vulnerable IoT device. And a common strategy involves controlling many of these IoT devices and using them collectively to attack a bigger target. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Prominent examples of this type of onslaught, are the <a href=\"https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/\" target=\"_top\">Mirai</a></span></span> <span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">botnet attacks of 2016. Incidentally, IP cameras featured prominently during these attacks.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">A botnet attack works like this: Once an IoT device is taken over completely by a hacker, that device is called a “bot”. Several such bots form a botnet (a network of bots), which is then used to launch what’s known as DDoS attack. DDoS stands for Distributed Denial of Service. It’s called a distributed attack because thousands of devices that are distributed all over the world send data to one victim, like a computer server. With so much information coming in, the server is overwhelmed and crashes. It’s basically a digital stoning. With multiple sources attacking, it’s difficult to pinpoint any one culprit and deal with it.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">The Mirai malware is thought to have been used in major DDoS attacks. For example, in October 2016 Dyn, the company that provides crucial services upon which prominent sites (like Netflix, Paypal, Twitter, Amazon, and Visa) are dependent, got attacked. The idea was to knock these sites offline. At one stage, most of the US East Coast, as well as data centres in</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> Texas, Washington, and California,</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> were reported to be either <a href=\"https://www.csoonline.com/article/3133992/ddos-knocks-down-dns-datacenters-across-the-u-s-affected.html\" target=\"_top\">knocked off the net</a>, or having network issues. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Back in 2014, the Hikvision cameras-turned-Bitcoin miners were not part of a botnet, but it was an illustration of how easily hackers can get IoT devices to do their bidding. Hikvision responded to the 2014 Bitcoin mining incident by urging customers to update their firmware and set better passwords. But since then, the company has made more concrete changes. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hikvision told </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>Daily Maverick</i></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> that </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">it was “one of the first companies in the industry to establish a more secure activation process by requiring users to set passwords at the time of first use – rather than the ‘plug and play’ model with a universal password – adding another layer of security.” </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But in 2017, an independent researcher, known only by the alias Montecrypto, found a major security flaw in some Hikvision IP cameras – one that would be child’s play to exploit, no matter the strength of the password or obscurity of the username. This time, the US government took notice.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Posting on the web forum IP Cam Talk on 5 March 2017, Montecrypto warned fellow forum members to disconnect their Hikvision </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">cameras from the Internet because he/she had found a vulnerability known as a backdoor.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">A backdoor is an</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> entry point into a software system through which an administrator can access that system to maintain it. It allows one to bypass the username and password. Backdoors are often legitimate parts of computer systems built in by a manufacturer. But, manufacturers can also secretly build backdoors into their software to allow them access to their customers’ private systems and data.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Either way, a backdoor leaves a system more vulnerable to hackers. </span></span>\r\n\r\n[caption id=\"attachment_319227\" align=\"alignnone\" width=\"2000\"]<img class=\"size-full wp-image-319227\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-10.png\" alt=\"\" width=\"2000\" height=\"875\" /> Montecrypto’s post on the IP Cam Talk web forum, an international forum with about 68,000 registered users involved in the IP surveillance industry, including professionals and consumers.[/caption]\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Montecrypto gave Hikvision two weeks to provide a date by which they would have the update ready, and to explain why there was a backdoor in the first place. If they didn’t, he/she would warn the public and release firmware to disable the backdoor.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hikvision engaged with Montecrypto almost immediately. On 12 and 15 March, they released press statements detailing the threat, with links to new upgrades. Montecrypto delayed the disclosure. By 20 March </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">the US Department of Homeland Security (DHS) had become involved, and</span></span> <span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">on 4 May they issued a warning statement assigning the vulnerability a CVSS score of 10. They credited the discovery to Montecrypto. On the same day, Hikvision posted another warning on their website, declaring that they were working with the DHS on the matter.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But thousands missed the warnings. So, on 12 September 2017, <a href=\"https://seclists.org/fulldisclosure/2017/Sep/23\" target=\"_top\">Montecrypto sent out an alert</a> candidly describing the vulnerability as a “</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">severe risk” that is “trivial to exploit”. The researcher said</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> the flaw had been present in the cameras since at least 2014, with “hundreds of thousands” of devices still vulnerable to attack.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><a href=\"https://ipvm.com/reports/hik-bad-sec\" target=\"_top\">IPVM criticised</a> Hikvision’s handling of the situation, stating that, in an attempt to avoid bad press, they did not do enough to let customers know about the vulnerability’s severity. To illustrate how easy it was to hack into affected cameras, the IPVM group set up a test. You can view the demonstration, which lasts just under 90 seconds, <a href=\"https://www.youtube.com/watch?v=bhY71LHRPK4\" target=\"_top\">here</a>.</span></span>\r\n\r\n[caption id=\"attachment_319228\" align=\"alignnone\" width=\"1201\"]<img class=\"size-full wp-image-319228\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-12.png\" alt=\"\" width=\"1201\" height=\"1071\" /> A Hikvision password reset tool used to hack into certain Hikvision IP cameras. The tool was made possible by Montecrypto’s discovery of a back door in various Hikvision models. The IPVM website created this demonstration to show how easy the hack is.[/caption]\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">IPVM also set up a <a href=\"https://ipvm.com/reports/hik-hack-map\" target=\"_top\">map</a></span></span> <span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">showing thousands of Hikvision cameras throughout the US and Europe that had either been hacked already (about 700 cameras) or were sitting ducks for hackers (about 3,400 cameras). The cameras were monitoring driveways, hotel corridors, laboratories, reception desks, backyards, front doors, kitchens, living rooms, garages, and even a child sleeping in a crib.</span></span>\r\n\r\n[caption id=\"attachment_319229\" align=\"alignnone\" width=\"1426\"]<img class=\"size-full wp-image-319229\" src=\"https://www.dailymaverick.co.za/wp-content/uploads/Heidi-Hikvision-part1-inset-13.png\" alt=\"\" width=\"1426\" height=\"1544\" /> The IPVM group of engineers set up a map of all the Hikvision cameras that remained vulnerable or were already hacked using the backdoor Montecrypto discovered. This picture shows a hacked camera in a small shop in Poland.[/caption]\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Neither Hikvision nor the US Department of Homeland Security ever referred to the vulnerability as a “backdoor”, and instead labelled it a privilege-escalating vulnerability. Whether or not the vulnerability was intentionally planted by Hikvision to spy on customers or a careless mistake, remains a topic of debate in IP surveillance circles. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But the </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">issue still contributed to the United States banning its government agencies from using Hikvision equipment through the newly enacted </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">National </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Defense</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> Authorization </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Act</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> for the fiscal year 2019. With the US Fearing Chinese espionage, the backdoor only fueled American suspicions. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Asked for comment, a Hikvision corporate spokesperson stated via email: “We’d like to reinforce that there is no evidence anywhere in the world, including South African and the US, to indicate that Hikvision’s products are used for unauthorised collection of information. Hikvision has never conducted, nor will it conduct, any espionage-related activities for any government in the world.”</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">We asked Hikvision about the allegation that Hikvision does not always disclose the vulnerabilities its research teams discover, and about their slow response times to reports of vulnerabilities in the past.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">A company spokesperson stated: “</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hikvision manages a world-class enterprise vulnerability management process and is quick to distribute updates and security patches to its customers in collaboration with the US Department of Homeland Security and other industry stakeholders. Hikvision is a CVE Numbering Authority and part of the family of global companies who maintain the CVE vulnerability library. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hikvision is committed to the integrity of its products and industry-leading cybersecurity standards. We work with many globally authoritative third-party organisations in the cybersecurity industry to obtain objective and independent security assessments and authentication. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Hikvision products currently meet industry-leading standards including Federal Information Processing Standard (FIPS) 140-2 which was created by the National Institute of Standards and Technology, (NIST), a division of the US Department of Commerce.</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">”</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>Daily Maverick</i></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> asked Vumacam </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">why they chose to partner with Hikvision despite its cybersecurity issues. Vumacam </span></span><span style=\"color: #222222;\"><span style=\"font-family: Arial, Helvetica, sans-serif;\"> sp</span></span><span style=\"color: #222222;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">okesperson Ashleigh Parry </span></span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">said they “gave consideration to</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> product performance and integrity, the structure, integrity and sustainability of the surveillance system as a whole, price points and the ability to provide the market with effective access to security” and added that they’re “confident” of the product’s “veracity”, since it was the world’s “leading product”. They also said that the cameras have several safeguards to prevent “hacking and/or any use of feed for any unauthorised activity”, and that the company would take “corrective measures” if their systems were ever compromised. Vumacam said the </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">product continues to meet its robust testing processes. </span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Asked if they specifically test Hikvision’s firmware for vulnerabilities, Vumacam stated that they “rigorously test any new firmware before deployment in the field. Once in deployment, we have robust internal processes to continuously stress-test and minimise vulnerabilities. With regard to cybersecurity, we go to great lengths to ensure the integrity of our system, protecting ourselves and our clients against any unauthorised access.”</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">That’s a good thing, because Hikvision’s troubles are not over.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">Israeli cybersecurity research group VDOO discovered the latest vulnerability in August 2018. It was an error in the coding of some camera models’ firmware known as a “buffer overflow”. It enabled an attacker to send commands to cameras from a remote location. Again, it required a very low skill level, and with a CVSS score of 9.8, it was critical. At least nine such weaknesses have been discovered in Hikvision products since 2013.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">So far, Hikvision’s response time has improved. According to VDOO, Hikvision acted promptly to make available new firmware to solve the problem. As far as could be established, no cameras were hacked.</span></span>\r\n\r\n<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">But whether or not Hikvision’s products can be trusted, is still being debated in surveillance circles. For now, we’ll just have to trust Vumacam’s vision. </span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><u><b>BM</b></u></span></span>\r\n\r\n<span style=\"color: #000000;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><i>Heidi Swart is an investigative journalist who reports on surveillance and data privacy issues.</i></span></span></span>\r\n\r\n<span style=\"color: #000000;\"><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"><span lang=\"en-ZA\"><i>This story was commissioned by the Media Policy and Democracy Project, an initiative of the University of Johannesburg’s department of journalism, film and TV and Unisa’s department of communication science.</i></span></span></span></span>",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/Heidi-Hikvision-part1-MAIN.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/1YrPzWQASJjiDt_zyulByb5QCpA=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-Hikvision-part1-MAIN.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/8MAZ_oE4GWo-bc9LD8cTSshd0DY=/450x0/smart/file/dailymaverick/wp-content/uploads/Heidi-Hikvision-part1-MAIN.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/mspK1S98AyHTkuwWsb2VoPHak2k=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-Hikvision-part1-MAIN.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/e0W0R6ndcEfr9Y3iTNTwA97kKlA=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-Hikvision-part1-MAIN.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/bu3Ym-KbDHSqRCkeQ3pt-gm7hzM=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-Hikvision-part1-MAIN.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/1YrPzWQASJjiDt_zyulByb5QCpA=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-Hikvision-part1-MAIN.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/8MAZ_oE4GWo-bc9LD8cTSshd0DY=/450x0/smart/file/dailymaverick/wp-content/uploads/Heidi-Hikvision-part1-MAIN.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/mspK1S98AyHTkuwWsb2VoPHak2k=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-Hikvision-part1-MAIN.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/e0W0R6ndcEfr9Y3iTNTwA97kKlA=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-Hikvision-part1-MAIN.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/bu3Ym-KbDHSqRCkeQ3pt-gm7hzM=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Heidi-Hikvision-part1-MAIN.jpg",
"type": "image"
}
],
"summary": "In 2019, 15,000 surveillance cameras will be connected to the Internet to monitor Joburg’s streets 24/7. This is courtesy of video surveillance service provider Vumacam. But online cameras can be hacked – often quite easily. This is not only a threat to public safety, but can also place Internet services at risk. And the manufacturer of Vumacam’s cameras, Hikvison, has a checkered cybersecurity history. Daily Maverick investigated and found that Hikvision’s known cyber vulnerabilities may be just the tip of the iceberg.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Visual surveillance and weak cyber security, Part One: When cameras get dangerous",
"search_description": "<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">With its total revenue for 2018 at</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> a",
"social_title": "Visual surveillance and weak cyber security, Part One: When cameras get dangerous",
"social_description": "<span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\">With its total revenue for 2018 at</span></span><span style=\"font-family: Georgia, serif;\"><span style=\"font-size: large;\"> a",
"social_image": ""
},
"cached": true,
"access_allowed": true
}