back to article Talk revealing p0wnable surveillance cams pulled after legal threat

Swiss researcher Gianni Gnesa says the most popular network surveillance cameras currently sold on Amazon contain easy remote exploitable vulnerabilities that allow hackers to gain admin access and quietly peer through lenses. The consultant for Zurich-based Ptrace Security found holes in pricey IP cameras sold on the shopping …

  1. Anonymous Coward
    Anonymous Coward

    Yawn.

    When not trying to extricate themselves from the inside of Duffle bags in the bath, the Perverts at the FLA can already watch your kiddies through that camera built into their laptops.

  2. Anonymous Coward
    Pirate

    Crucial facts of obvious and significant public interest missing!

    How does one determine "the most popular network surveillance cameras currently sold on Amazon"? The only vaguely appropriate looking sorting option that site offers seems to be "average customer review" which doesn't sound quite right and throws-up a mess of brands.

    Couldn't Vulture South perform a spot of journalistic diligence and make an educated guess? Clearly peddling *any* shoddy product while using menaces to suppress *the* *truth* would be unacceptable. When that product is *trusted* to provide "security" that perpetrator's actions are wilfully fraudulent, negligent and reckless.

    I think Ms Streisand *needs* to *know* the identity of the blackmailer ;)

    1. Anonymous Coward
      Anonymous Coward

      "I think Ms Streisand *needs* to *know* the identity of the blackmailer"

      Or failing that, a list of the webcams sold on Amazon that are not problematic would do the trick. Anything 'popular' and not on the list would be one to avoid.

      1. Anonymous Coward
        Pirate

        Re: "I think Ms Streisand *needs* to *know* the identity of the blackmailer"

        That's a problem though: It sounded like *all* the shit on Amazon is defective but only one of the racketeers has put the frighteners on the boff... how do we know which self-serving avaricious scum is the blackmailer?

  3. frank ly

    I've said it before ....

    "An unnamed vendor caught up in the research hit Gnesa with a legal threat after he prepared to present his work at the Hack in the Box conference in Singapore next week.

    The hacker then canceled his talk."

    Publish the results on pastebin, or somewhere like that. If the vendors want to respond with a public rebuttal then they are free to do so.

  4. Grease Monkey Silver badge

    There are a couple of reason not to be scared of legal action like this.

    Firstly accepted practice is to inform the vendor, give them reasonable time to fix the vulnerability and then disclose, just so long as you give the vendor sufficient notice I doubt that a court would side with the vendor. Secondly the publicity of the case would alert customers to their having bought dodgy kit, triggering legal action from customers against the vendor, even possibly a class action.

    In this case I think the researcher should have responded, "sure and be damned".

    1. Anonymous Coward
      Pirate

      It's all very well for US to pontificate here but of course it's a TOTALLY different thing when it's YOUR entire future being THREATENED.

      Something needs to be done about this.

      It sounds like most of the companies were professional, or at least co-operative, in their responses. Just one choosing pseudo-legal threats to frighten the researcher out of disclosing the truth about their crap.. and after he'd given the fuckers THREE MONTHS forewarning to get their shit together!

      "Gnesa pulled his talk despite the fact that he’d privately disclosed to the three affected vendors of IP-enabled surveillance cameras three months before the talk. Two of the vendors acknowledged Gnesa’s bug reports (one said they were working on a fix, and the other said they had no idea what to do with the information Gnesa had provided), while the third has yet to do so, he said.

      Once Gnesa shared with the vendors that he was planning to do a talk at HITB Singapore about the vulnerabilities, the tone of the conversation changed, Gnesa said."

      1. LucreLout

        @AC

        It's all very well for US to pontificate here but of course it's a TOTALLY different thing when it's YOUR entire future being THREATENED.

        Yes, quite. Its very easy for even small companies to file suit on enough grounds and run up such large legal bills doing so, that should they win just one point of their case, you're financial future may be ruined. They know that too, which is why they trade on it.

        They'll continue behaving appallingly until the InfoSec community realises that they may have to forego the career/revenue enhancing aspects of publishing their research in their own name. Anonymous submissions to pastebin et al would keep the dogs of law in their kennels as they'd have nobodies shoes on which to piss.

        1. Anonymous Coward
          Terminator

          @LL

          True ..but I'm not sure that's really a solution. Surrendering any prospect of any recompense for your hard work does not sound like a career which would attract the brightest and best minds. It's pretty much what they're trying to achieve with these threats. We mustn't give in to the terrorists. Yet we can't expect anyone to stick their neck out and see if it gets blown off... even though we all probably think it probably wouldn't. It's a tricky problem - as I'm sure they're well aware.

          I wonder if some sort of boffin escrow might work: Submit copies of your research into it as you work - before you're blackmailed. Then, if some shyster starts sending you threatening opinions thinly veiled as "law" you dutifully forward copies on to the other holders of the information, who promptly publish the lot. It could even offer some sort of canary/dead-man's-handle mechanism for the truly paranoid/heroic.

          Obviously it would have to be located in a country that isn't pwned by the RIAA. Perhaps someone like Kaspersky might do it?

          1. Anonymous Coward
            Black Helicopters

            Just realised I'm probably not the first to think of that escrowy thing :-(

            It very neatly explains why they're suddenly so desperately puffing about perverting the Wassenaar arrangement from being an arms control treaty to criminalising information about defective products... still, perhaps few countries outside the US would be so daft, so that threat might never amount to more than a sick Yank pipe-dream... and until then... ?

        2. Anonymous Coward
          Anonymous Coward

          It's all very well for US to pontificate here but of course it's a TOTALLY different thing when it's YOUR entire future being THREATENED.

          This is one of the few cases where legislation would help. Any company with a few £100k to spend can hush any criticism of their products by white hat hackers without even having to risk the money, simply because an average individual can't hope match them financially (and emotionally) in the game of poker that is played in the courts.

          The law needs to be crystal clear so this chilling is impossible. I don't hold up much hope in the UK or the US because their governments are owned by big business, but maybe there is some country somewhere where this might happen and any results can be published there. Tonga, Malta? What are they like?

          1. Grease Monkey Silver badge

            " Any company with a few £100k to spend can hush any criticism of their products by white hat hackers without even having to risk the money, simply because an average individual can't hope match them financially (and emotionally) in the game of poker that is played in the courts."

            Here's the thing though. In most countries when you file suit the whole thing becomes public. So as soon as a company sues it becomes public knowledge that not only is their kit dodgy, but that they have no intention of doing anything about it and sales go through the floor.

          2. Anonymous Coward
            Pirate

            "This is one of the few cases where legislation would help"

            Could help but sadly there seems to be vanishingly little prospect of any helpful legislation from the corporations' governments. Quite the opposite in fact.

  5. Mark Fenton

    Or just put it behind a firewall?

    Surely no-one puts a device directly onto the internet?

    Put everything behind a firewall, open only the ports that *need* to be opened.

    In the case of these cams - I think that I have a few of them, but they are secure behind my firewall and allow *no* ports to the outside world. I can access them via a .aspx page that in turn collates snapshots from the private network and turns that into a stream.

    Yes, if someone gets access to my private network then all bets are off - but that is pretty much the case with everything.

    1. VinceH

      Re: Or just put it behind a firewall?

      The problem is that while you and many others would be happy with that set up, there are people who would want to access their new security toy over the internet - so for those people the ports that need to be opened are the very ones that will leave them vulnerable.

      1. Mark Fenton

        Re: Or just put it behind a firewall?

        I agree and I guess that's the problem - "security toy". Security isn't taken seriously enough by people that know little about it.

        1. VinceH
          Unhappy

          Re: Or just put it behind a firewall?

          I know. That's why I used those words.

          1. Anonymous Coward
            Anonymous Coward

            Re: Or just put it behind a firewall?

            "Security toys" should be illegal or at the very least clearly identified as "toys" but instead the manufacturers are blackmailing people while they wait for the politicians to make identifying them as toys illegal.

            It's INSANE

            Everyone shouldn't be forced to spend their time learning how to spend their time decompiling "security updates" to see if they're really programs to dump all their most private data to the NSA, and fuzzing all the available "security" devices to determine which of them are misrepresented toys. I'd like my doctor to have a little time for doctoring... etc... Shouldn't experts be doing what they're good at and sharing their knowledge without being threatened with fines and imprisonment?

            Still, the Wassenaar perversion hasn't happened yet and I'm starting to think it's nothing more than another frightener which will never really happen. Either way, there's no reason to let the threat of monsters in the future influence us now.

            Sorry for the ranting. This is really fucked up and really bothering me.

    2. Anonymous Coward
      Anonymous Coward

      Re: Or just put it behind a firewall?

      WiFi?

      1. Anonymous Coward
        Devil

        Re: Or just put it behind a firewall?

        BecauseFi.

      2. Anonymous Coward
        Anonymous Coward

        Re: Or just put it behind a firewall?

        The "WiFi?" comment was intended to be shorthand for: "How does one securely 'just put it behind a firewall' if it's a WiFi insecurity camera with hard-coded root credentials and/or "backdoor" - without knowing how that "backdoor" might work because all the honest people who tried to warn you about it rather than quietly prey on you have been terrorised into silence?"

    3. druck Silver badge

      Re: Or just put it behind a firewall?

      If you do put it behind a firewall, be very careful to set it up correctly. If you have nPnP enabled the cameras will use that to open up multiple ports through the firewall. They need to be placed on a network segment that is completely locked down to an extent most cheap home routers (and all ISP provided ones), are incapable of.

    4. Anonymous Coward
      Anonymous Coward

      Re: Or just put it behind a firewall?

      I can access them via a .aspx page that in turn collates snapshots from the private network and turns that into a stream.

      The problem is that someone who buys one as a baby monitor or whatever wants a camera, and not all the other things that seem to be needed - Windows 2012 server, new firewall, degree in Computer Science etc. They just want a camera and it doesn't seem unreasonable that it should do what it says on the tin.

  6. Pascal Monett Silver badge

    Congratulations, security camera makers

    Thanks to the threatening actions of one, I now consider all makers to be suspect and will not be buying any security camera at all until you guys come forward with objectively-assessed proof that your equipment is secure.

    Given that one of them doesn't even know what to do, I won't hold my breath.

    1. Anonymous Coward
      Anonymous Coward

      Re: Congratulations, security camera makers

      Yeah, that is the scary part.

      1. Anonymous Coward
        Anonymous Coward

        Re: Congratulations, security camera makers

        "Yeah, that is the scary part."

        I disagree. I think admitting you don't know what to do upon discovering that something you've been selling for god knows how long to god knows whom is is unfit for purpose is understandable refreshingly candid. It's the one answering "fuck off or we'll burn down your house and eat your babies" (or whatever equivalent it was) that I find troubling. Assuming that those two responses weren't both from the same outfit...

  7. Doctor Syntax Silver badge

    We need new terminology

    Insecurity cameras.

  8. Zog_but_not_the_first
    Facepalm

    For example...

    From the instructions for such a camera (Tenvis):

    Go to our "easy setup web site"

    Enter your WAN address (details given on how to obtain this).

    Enter your router admin name and password

    Job done.

  9. Sir Alien

    Just reveal the manufacturer behind the threat...

    I assume simply naming the accuser does not allow the accuser to take any legal action against him. Even if they did, it would not be libel since he has evidence of the insecurities and he would win. A side effect of this is that the public may (depending on the case) be able to see the evidence of the court case or they can decide not to take it to court and keep the exploits unknown.

    By just naming the company, their clients would already start taking precautions about the hardware or checking it themselves.

    - SA

    1. phuzz Silver badge

      Re: Just reveal the manufacturer behind the threat...

      I'm also assuming that it must be legal to reveal that someone is taking legal action against you, right?

      1. Anonymous Coward
        Anonymous Coward

        Re: Just reveal the manufacturer behind the threat...

        >I'm also assuming that it must be legal to reveal that someone is taking legal action against you, right?

        Not necessarily. The courts can impose an injunction to stop it entering the public domain. Anyway this is probably a threatogram from their attack lawyers, threatening to sue for punitive damages if the presentation goes ahead, rather than a court summons. I guess the alternative is to give a glowing talk about the products of the manufacturers who haven't written a snotty letter and let the audience work out who's missing.

  10. PassiveSmoking
    Mushroom

    Security by obscurity

    Dear vendors:

    In spite of being repeatedly told, you still don't seem to grasp the concept, so I'll repeat it for you.

    SECURITY BY OBSCURITY DOES NOT EFFING WORK!

    Maybe you can shut up some security researcher with legal threats, but if he uncovered holes in your product, you can be assured that it's a safe bet that black-hats have found the same flaw and are probably exploiting it right now. Even if they're not, just knowing that some cameras might have certain flaws is enough to encourage them to begin their own research programme to find them, and as they're operating outside the law anyway I don't think they're going to care about any cease and desist letters your lawyers might want to send out.

    If you're selling a broken product then it's your duty to fix it, or withdraw it from sale if you can't. Sticking your fingers in your ears and going LA LA LA I'M NOT LISTENING accomplishes precisely dick.

    And quite frankly, it's alarming that your first instinct is to not fix your product but threaten legal action against someone for pointing out it's broken.

    Get your act together. As for me, I intend to not buy any network connected camera from any manufacturer because you clearly can't be trusted to have your customers' best interests at heart.

    1. Anonymous Coward
      Anonymous Coward

      Re: Security by obscurity

      "Sticking your fingers in your ears and going LA LA LA I'M NOT LISTENING accomplishes CRIMINAL CULPABILITY."

      TFTFY

      Not that they'll hear us though - they've had their fingers in their ears going LA LA LA I'M NOT LISTENING ever since some researcher chap told them their "security" products are defective THREE MONTHS AGO

  11. Henry Wertz 1 Gold badge

    So name and shame?

    So name and shame? Anybody? I want to know which vendor or vendors to avoid. I'm disinterested in using vendors who use legal threats to bully security researchers instead of taking their lumps and fixing the products.

  12. Kevin McMurtrie Silver badge

    Not so many, really

    There really aren't very many cameras sold on Amazon. Most of them are the same handful of cameras rebranded over and and over. Even companies that you'd expect to actually make cameras are sticking their label on something else.

    This turned out to be extremely frustrating when I was looking for a security camera. Those few cameras have completely garbage firmware running under a patchwork of open source Linux software that somebody likely found on a sketchy FTP site 10 years ago. I'd open the box of a brand new camera and realize it was the same as the old camera. Default login won't stay off, pages not checking authentication, and much easier to crash than to keep running. I eventually started asking companies to send me sample videos so I could compare headers.

    I'm guessing that TRENDnet was the vendor that said they have no idea what to do. Their TV-IP310PI is a defective Hikvision camera that they can't support. Other models may be similar.

    1. Anonymous Coward
      Anonymous Coward

      Re: Not so many, really

      Any idea which manufacturer the "most popular" one with thousands of positive reviews is?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like