27 Jun, 06:16AM in sunny Singapore!

U could be unknowingly broadcasting ur life on the Internet

Subscribe to U could be unknowingly broadcasting ur life on the Internet 5 posts

Please Login or Signup to reply.
  • Queen of sgForums
    驚世駭俗醜不啦嘰 moderatress
    FireIce's Avatar
    262,729 posts since Dec '99
    • With just a few clicks, anyone can see your unprotected webcam feed

       

       

      The New Paper

      Monday, Oct 31, 2016

      You could be unknowingly broadcasting your life on the Internet.

      The website Insecam bills itself as a repository of unsecured surveillance cameras from all over the world, including Singapore.

      With just a few clicks, anyone can access live images from places that look like the inside of offices, warehouses and homes.

      The footage is from closed-circuit television and Internet protocol (IP) cameras. IP cameras work by connecting to a Wi-Fi network and their feeds can be viewed remotely from a smartphone or computer.

      The New Paper first reported about it in 2014.

      30 feeds

      When monitoring the site last week, TNP saw more than 30 feeds from Singapore.

      The website owners claim on the site that they constantly filter out cameras that intrude on the privacy of individuals.

      However, some of the feeds clearly showed the inside of people's homes.

       

      It gets worse.

      Even if your webcam feed is not on Insecam, there are search engines that can scan for unsecured webcams, said Associate Professor Steven Wong, 41, the president of the Association of Information Security Professionals .

      "In the digital world, it's just a fly through to collect (the addresses of these webcams)," he said.

      In a few short minutes, he showed TNP how easy it was for someone like him to tap into an unsecured webcam.

      Using a search engine that was specifically built to find and map out devices connected to the Internet, he was able to look for the web addresses of webcams here.

      A few taps of the keyboard was all it took for him to log on to unsecured webcams that were not listed on Insecam.

      To prevent copycats, TNP is not naming that website.

      How is this intrusion possible?

      Such webcams are only protected by a default password or, worse, have no passwords at all.

      "The most basic thing is the most dangerous thing," said Prof Wong, the programme director for the Information Security degree at the Singapore Institute of Technology.

      He stressed that not changing the passwords to any device connected to the Internet leaves users vulnerable.

      He said: "Once a device is connected to the Internet, everybody can access it if you don't set up the fence properly."

      One user who wanted to be known only as Madam Ang, 45, said she was appalled by the content of Insecam.

      She said: "The website claims to not intrude people's privacy, but I saw workplaces and I think somebody's home kitchen too."

      When the admin assistant first bought her 7-Star security cameras more than three years ago, she had a family friend help her with them.

      "My husband and I did not know how to use the camera back then so a friend came over to help set them up," she said.

      Madam Ang has three cameras and they are used mainly to monitor the maid and to make sure the children come home on time.

      She said there was no default password set-up for the cameras then and she was not aware of the risks of not setting a password.

      She said: "Looking back, if our friend did not tell us to set a password, I would never have done it."

      In an e-mail interview, Mr Nick Savvides, security advocate at security and technology giant Symantec said his company's analysis showed that web-connected or Internet of Things (IoT) devices are "scanned every two minutes".

      "This means that a vulnerable device, such as one with a default password, could be compromised within minutes of going online," he said.

      "Consumers should ensure that they are purchasing these devices from a trusted and reputable manufacturer."

      The process of accessing unsecured cameras is easily automated.

      Said Prof Wong: "Somebody can write a script that automatically scans through to find webcams which are not password protected."

      Unsecured webcams also present a danger beyond having your privacy violated.

      It can be used to launched a Distributed Denial of Service (DDoS) attack, similar to the one that affected StarHub users last week. (See report on the next page.)

      Tool

      Mr Kelvin Lew, a cyber security consultant, said: "There are still millions of users who are not aware that their personal computers, devices and home equipment have become a tool for the hackers to do their illegal activities."

      He urged IoT manufacturers to consider the security aspect in the design of their products.

      So how can you prevent your webcams from being accessed?

      Said Prof Wong: "Change your passwords!"

      Viewing stream is OK, uploading is not

      It is not illegal to view the feeds that are on Insecam.

      "Just viewing the feed does not constitute an infringement," said lawyer Gloria James-Civetta, managing partner of law firm Gloria James-Civetta & Co.

      "It would be akin to watching an episode of a TV show that has been illegally uploaded on YouTube."

      Mr George Hwang from George Hwang LL.C likens looking at the stream to someone looking through the open window of a Housing Board flat as they walk past on the corridor.

      "There is no problem if you were just looking through that window," he said.

      The infringement occurs if you put the stream online.

      Said Ms James: "If a third party puts up a stream on the Internet, then that can constitute an infringement.

      "There was no consent to taking someone else's data and letting the world see it."

      Change your default password

      By Elaine Lee

      Manufacturers of webcams found on Insecam say basic security measures can help prevent unauthorised access to cameras

      If you log on to the website Insecam, you will see feeds from webcams all over the world.

      You will also see the models and brands of webcams that are being tapped into.

      When The New Paper checked the website last week, it showed video feeds from webcams here made by Panasonic, Axis Communications, Defeway, Foscam, Linksys and TP-Link.

      A simple web search showed sites that collect lists of default passwords for many popular webcam brands, making it simple for anyone to hack into a webcam that has not had its password changed.

      Discontinued

      When TNP contacted the brands and their local distributors, we found that at least two models had been discontinued.

      Axis Communications head of marketing Winston Goh said the camera model used in feeds on Insecam is no longer on sale.

      It was discontinued in favour of a newer model, but every camera will have a default password in their initial set-up.

      A TP-Link spokesman said the company has discontinued the model TL-SC4171G, an IP camera with two-way audio which was found on Insecam.

      Many of the brands and distributors said their set-up process is meant to prevent unauthorised access.

      Webcam models that come with default usernames and passwords also come with instructions on how passwords can be changed.

      Other webcams come with no default passwords - the password has to be created during the first login.

      If the webcam feeds are being accessed illegally on sites like Insecam, manufacturers say the problem boils down to one thing: Users who have not set passwords or have not changed the default password.

      Mr Tan Choon Kiat, Foscam's head of technical support here, told TNP that its cameras are not able to be hacked into if the correct set-up and password protocols are followed.

      "Our basic set-up process already enforces a strong password to be set.

      "So the cameras which are hacked into are either due to the lack of or having a very weak and default password," he said.

      Mr Tan Choon Kiat, Foscam's head of technical support here, told TNP that its cameras are not able to be hacked into if the correct set-up and password protocols are followed.

      "Our basic set-up process already enforces a strong password to be set.

      "So the cameras which are hacked into are either due to the lack of or having a very weak and default password," he said.

      The brand's cameras are easy to install using the instruction manual provided, he added. Mr Tan also said that if customers encounter any difficulty, there is a local and global hotline they can call and be guided step-by-step over the phone.

      3Si, the reseller for Axis Communications, said the cameras are usually bought by businesses.

      3Si's business director Norman Lau said more than 50 per cent of its customers declined to change their default password after his company installed the cameras for them.

      He said: "Axis cameras are usually purchased by businesses. We help them install and after that, we will remind them to change their passwords.

      "Many will prefer to change themselves whereas some will get us to assist them in the changing of passwords." Panasonic, Defeway and Linksys did not get back to TNP by press time.

      'Poor security makes them soft targets'

      Your password issues do not affect just you.

      StarHub's broadband network was disrupted twice last week, on Oct 22 and Oct 24.

      StarHub said the distributed denial of service (DDoS) attack happened with the help of its customers' machines.

      The attacks came just after a massive DDoS attacks on a US-based Domain Name System (DNS) service provider, Dyn, on Oct 21.

      The attack on Dyn took down services like Twitter and Spotify.

      Experts said that these attacks made use of web-connected or Internet of Things (IoT) devices.

      Hackers used a malware called Mirai to infect countless of devices connected the Internet.

      Those devices then became zombie machines that overwhelmed Dyn's servers with more traffic than it could handle.

      Experts do not rule out that the DDoS attacks that affected StarHub resulted from devices infected with Mirai.

      In an e-mail reply to The New Paper, Mr Nick Savvides, security advocate at Symantec, said that these attacks are rooted in the poor security of many of these devices that are connected to the Internet.

      "Poor security on many IoT devices makes them soft targets and attackers often pre-programme their malware with commonly used and default passwords," he said.

      "Processing power limitations and basic operating systems mean many IoT devices don't have advanced security features."

      He urged consumers to buy devices from reputable manufacturers.

      "Check if they have a history of releasing updates and if they have clear security and privacy policies," he said.

      Edited by FireIce 01 Nov `16, 11:22AM
  • gogetspace's Avatar
    10 posts since Nov '16
  • ismikirmiz's Avatar
    10 posts since Dec '16
  • ^Acid^ aka s|aO^eH~'s Avatar
    31,262 posts since Oct '02
    • well, most ppl does not know that IP CCTV has a default password and ID.

      You can run default ID and default password for many address and viola~ u can access them icon_lol.gif

  • jw's Avatar
    4 posts since Jan '17
Please Login or Signup to reply.