Monday, February 6, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
Ransomware Report
  • Magazine
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacks
    • Ransomware
    • Vulnerabilities
    Hacking depiction in hollywood

    Hollywood and its Quest with Nailing Hacking Depictions

    Internet Censorship and Freedom of Speech

    Internet Censorship and Freedom of Speech

    Voice Networks

    Voice Networks are Under Attack – is Anybody Listening?

    Anonymous Sudan Declares War on American Corporate Giants with Devastating DDoS Onslaughts

    Dominic Alvieri

    After Hive, Will More Ransomware Groups be Taken Down in 2023?

    McEwan Fraser Legal

    ALPHV Ransomware Hits UK Realty Firm McEwan Fraser Legal, 300GB Data On The Line

    Kewal Kiran

    Indian Apparel Manufacturer Kewal Kiran Clothing’s Data Out For Sale

    BATLoader

    Stealthy BATLoader Lurks Under PowerShell Script to Evade Detection and Launch Malware

    Guardian Analytics Data Leak

    Guardian Analytics Data Leak: Ransomware Groups Daixin Team and Lockbit List Firm as Victim

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    Zero Trust Strategy

    US Department of Defense to Embrace Zero Trust Strategy

    browser hijackers

    Researchers Find Browser Hijackers on Google Chrome Web Store

    DORA proposal

    DORA Proposal for Cybersecurity Awaits Full Approval by Council and ESAs

    Privacy penalty bill

    Australia Privacy Penalty Bill 2022: Pay a $50 Million Fine for Data Breaches

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Webinars
    • World CyberCon Middle East 2023
    • Endorsed Events
  • Advertise
No Result
View All Result
The Cyber Express
  • Magazine
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacks
    • Ransomware
    • Vulnerabilities
    Hacking depiction in hollywood

    Hollywood and its Quest with Nailing Hacking Depictions

    Internet Censorship and Freedom of Speech

    Internet Censorship and Freedom of Speech

    Voice Networks

    Voice Networks are Under Attack – is Anybody Listening?

    Anonymous Sudan Declares War on American Corporate Giants with Devastating DDoS Onslaughts

    Dominic Alvieri

    After Hive, Will More Ransomware Groups be Taken Down in 2023?

    McEwan Fraser Legal

    ALPHV Ransomware Hits UK Realty Firm McEwan Fraser Legal, 300GB Data On The Line

    Kewal Kiran

    Indian Apparel Manufacturer Kewal Kiran Clothing’s Data Out For Sale

    BATLoader

    Stealthy BATLoader Lurks Under PowerShell Script to Evade Detection and Launch Malware

    Guardian Analytics Data Leak

    Guardian Analytics Data Leak: Ransomware Groups Daixin Team and Lockbit List Firm as Victim

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    Zero Trust Strategy

    US Department of Defense to Embrace Zero Trust Strategy

    browser hijackers

    Researchers Find Browser Hijackers on Google Chrome Web Store

    DORA proposal

    DORA Proposal for Cybersecurity Awaits Full Approval by Council and ESAs

    Privacy penalty bill

    Australia Privacy Penalty Bill 2022: Pay a $50 Million Fine for Data Breaches

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Webinars
    • World CyberCon Middle East 2023
    • Endorsed Events
  • Advertise
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

Researchers Find 80000 Exploitable Hikvision Cameras

Editorial by Editorial
August 24, 2022
in Firewall Daily, Vulnerabilities
0
80000 Exploitable Hikvision Cameras
586
SHARES
3.3k
VIEWS
Share on LinkedInShare on Twitter
Listen to this story

Security researchers found a severe vulnerability in over 80,000 Hikvision cameras. The vulnerability can be exploited by using a command injection sent to the web server. The researchers identified the vulnerability as CVE-2021-36260, and Hikvision fixed it in September 2021 through a firmware update. Despite fixing the issue, tens of thousands of systems owned by over 2,300 businesses across 100 countries have not received the security upgrade, according to a report by cybersecurity firm, CYFIRMA.

US Department of Defense’s cybersecurity division, CISA identified the vulnerability, and cautioned businesses to patch the vulnerability since it may allow attackers to “take control of their systems.”

You might also like

Hollywood and its Quest with Nailing Hacking Depictions

Internet Censorship and Freedom of Speech

Voice Networks are Under Attack – is Anybody Listening?

In some cases, the live feed of Hikvision cameras was also sold on Clearnet hacking forums. The forums sold lists of passwords and user IDs for these cameras, which anyone could use to spy on individuals.

Mirai-based botnet was behind the attack

According to reports, a botnet known as “Moobot” was behind the attack that was executed in December 2021. The botnet utilized the exploit to expand quickly and recruit systems into DDoS (distributed denial of service) swarms.

CYFIRMA stated that the Russian-speaking hacker forums frequently offer network entrance points that rely on Hikvision cameras that can be used for either lateral or “botnet” movement.

The company also discovered that 80,000 of the 285,000 Hikvision web servers with internet access were still exploitable. Most of these programs are available in China, the US, Vietnam, the United Kingdom, Ukraine, Thailand, South Africa, France, the Netherlands, and Romania. These are also being sold as samples to interested buyers on hacker forums.

A cyber-espionage plan

CYFIRMA confirmed that these state-sponsored groups — Chinese hacker groups APT41 and APT10 and Russian threat groups, specialize in cyber espionage.

The security company also affirmed that even if the exploitation does not follow a set of patterns, because numerous threat actors are engaged in this attempt, a cyber espionage operation called “think pocket” could be behind the earlier attack. The operation has been targeting connected products employed by a large number of companies since August 2021.

According to reports, state-sponsored hacker groups with tense relations with other countries might utilize the vulnerabilities in Hikvision camera products to initiate a cyberwar with geopolitical overtones.

Weak passwords continue to be a problem

Along with command injection vulnerability, another significant factor that increases the chances of hacking events like exploitation of severe vulnerabilities is due to weak passwords.

Users usually create weak, repetitive passwords out of convenience and don’t change them afterwards, making it easier for hackers to access their accounts by cracking the passwords using keyloggers and other methods.

Cybersecurity companies have advised users to create stronger passwords and use protection tools and services like firewalls, VLAN, and antivirus programs. For Hikvision camera users, it is advisable to update their firmware to the latest version as soon as possible.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: 80000 Hikvision camerascve-2021-36260cyber expresscyber express newshikvision exploit toolhikvision hack 2022hikvision hack githubhikvision ip camerahikvision password hackhikvision password hack toolhikvision vulnerability 2021
Previous Post

Facebook Glitches Allow Users to Post on Celebrity Pages

Next Post

Hackers Use Counterfeit Android Devices to Launch Trojan on WhatsApp

Editorial

Editorial

The Cyber Express is a publication that aims to provide the latest news and analysis about the information security industry. The news comes from a variety of sources and is updated regularly so that readers can stay up to date with the latest happenings in this rapidly growing field.

Related Posts

Hacking depiction in hollywood
Features

Hollywood and its Quest with Nailing Hacking Depictions

by Editorial
February 5, 2023
Internet Censorship and Freedom of Speech
Features

Internet Censorship and Freedom of Speech

by Editorial
February 5, 2023
Voice Networks
Features

Voice Networks are Under Attack – is Anybody Listening?

by Editorial
February 4, 2023
Firewall Daily

Anonymous Sudan Declares War on American Corporate Giants with Devastating DDoS Onslaughts

by Ashish Khaitan
February 4, 2023
Dominic Alvieri
Firewall Daily

After Hive, Will More Ransomware Groups be Taken Down in 2023?

by Vishwa Pandagle
February 4, 2023
Next Post
Hackers Use Counterfeit Android Devices to Launch Trojan on WhatsApp

Hackers Use Counterfeit Android Devices to Launch Trojan on WhatsApp

Latest Issue is Out. Subscribe Now

Ai in Cybersecurity - Cybersecurity Magazine by The Cyber Express

Download Now



Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Recommended

Yanluowang Ransomware Gang

Yanluowang Ransomware Gang Hacked, Internals Chats Leaked

November 7, 2022
Cyber Monday Deals

Cyber Monday Deals 2022: How To Shop Smart & Get Best Discounts

November 26, 2022

Categories

Don't miss it

Hacking depiction in hollywood
Features

Hollywood and its Quest with Nailing Hacking Depictions

February 5, 2023
Internet Censorship and Freedom of Speech
Features

Internet Censorship and Freedom of Speech

February 5, 2023
Voice Networks
Features

Voice Networks are Under Attack – is Anybody Listening?

February 4, 2023
Firewall Daily

Anonymous Sudan Declares War on American Corporate Giants with Devastating DDoS Onslaughts

February 4, 2023
LockBit. Ion Group
Cybersecurity News

LockBit Claims Ransom From ION Group, Firm Declines To Comment

February 4, 2023
Dominic Alvieri
Firewall Daily

After Hive, Will More Ransomware Groups be Taken Down in 2023?

February 4, 2023

About

The Cyber Express

Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing, PR & media partnerships: [email protected]

For media kit and digitals sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cybersecurity Magazine
  • Events
    • World CyberCon Middle East 2023
    • Webinars

© 2022 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.