Keyboard Shortcuts

Keyboard shortcuts are available for common actions and site navigation.

Skip to content
  • Home Home Home, current page.
  • About
  • Have an account? Log in
cybergibbons's profile
Ask Cybergibbons!
Ask Cybergibbons!
Ask Cybergibbons!
@cybergibbons

Tweets

Ask Cybergibbons!

@cybergibbons

Andrew Tierney - security consultant of all things IoT. Bearded James Bond hobbit. Famous for Bitfi.

Lots of places
cybergibbons.com
Joined December 2008

Tweets

  • © 2019 Twitter
  • About
  • Help Center
  • Terms
  • Privacy policy
  • Cookies
  • Ads info
Ask Cybergibbons!‏ @cybergibbons

Ask Cybergibbons! Retweeted Kyle Knight

I have had a lot of people ask me "what is a good IoT security camera". I'll try to elaborate on this - and most of this will be around threat modelling.https://twitter.com/kyleknighted/status/1210608916280872962…

Ask Cybergibbons! added,

Kyle Knight @kyleknighted
Replying to @IanColdwater
We know Ring doorbell is the devil. What is a good IoT security camera that isn’t full of privacy or security concerns?
9:42 AM - 27 Dec 2019
  • 76 Retweets
  • 171 Likes
  • َ Garin Pace ‏pix The InfoSec Dragon hernancho Matt Wyckhouse John Blackwood Kyle Knight Julian Stecklina
10 replies 76 retweets 171 likes
    1. New conversation
    2. Ask Cybergibbons!‏ @cybergibbons 20h20 hours ago

      There are two primary ways that a camera can be compromised. One is in the normal scope of operation: you can view footage and use the camera as a normal user. The other is: you take control of the camera as a Linux box and can do what the hell you want.

      1 reply 1 retweet 31 likes
      Show this thread
    3. Ask Cybergibbons!‏ @cybergibbons 20h20 hours ago

      Within the normal scope of operation: wow, there are so many players involved. The recent Ring hack was carried out by people using brute-forcers agains the Ring login. Their goal: accessing your camera feeds. Their motivation: not sure I want to go there.

      1 reply 0 retweets 27 likes
      Show this thread
    4. Ask Cybergibbons!‏ @cybergibbons 20h20 hours ago

      We had a big shift in security attitudes over the last 5 years. People are putting cameras inside their houses. In their bedrooms. This has shifted the attacker profile from curious voyeur to dedicated pervert. The latter will try a lot harder.

      1 reply 9 retweets 39 likes
      Show this thread
    5. Ask Cybergibbons!‏ @cybergibbons 20h20 hours ago

      Who can these attackers be? It could be a random on the Internet, brute-forcing your creds. This is what happened with Ring.

      1 reply 0 retweets 17 likes
      Show this thread
    6. Ask Cybergibbons!‏ @cybergibbons 20h20 hours ago

      It could be someone on your local network, exploiting the fact that many of these cameras trust the local network. Who could that be? Well. It could be your lodger spying on your daughter. It could be your weird neighbour who has cracked your WiFi password.

      1 reply 0 retweets 29 likes
      Show this thread
    7. Ask Cybergibbons!‏ @cybergibbons 20h20 hours ago

      I know this is horrible to think about, but there are a lot of perverts out there. They go to extreme lengths to see things that we consider mundane. That doesn't stop you feeling seriously creeped out when you find out about it.

      1 reply 0 retweets 27 likes
      Show this thread
    8. Ask Cybergibbons!‏ @cybergibbons 20h20 hours ago

      It could also be an employee of the camera company. Ring have made it very clear they can see the doorbell footage. What about the other cameras? What can their own staff see? I have looked at one camera system that encrypted end-to-end so that no one else can view it.

      1 reply 1 retweet 19 likes
      Show this thread
    9. Ask Cybergibbons!‏ @cybergibbons 20h20 hours ago

      So far, nearly all camera compromises we have seen are using the camera as a camera. But what happens if they take it over as a device?

      1 reply 0 retweets 14 likes
      Show this thread
    10. Ask Cybergibbons!‏ @cybergibbons 20h20 hours ago

      Well, then they could use the device in a botnet, like Mirai. https://en.wikipedia.org/wiki/Mirai_(malware) … Clearly not good.

      1 reply 0 retweets 18 likes
      Show this thread
    11. Ask Cybergibbons!‏ @cybergibbons 20h20 hours ago

      Worse still, they could be used as a pivot onto your network. Today - this is probably a targeted attack. It's not being carried out at scale. But imagine if someone could use every Ring camera to deploy malware to every Windows machine behind a firewall.

      1 reply 2 retweets 30 likes
      Show this thread
    12. Ask Cybergibbons!‏ @cybergibbons 20h20 hours ago

      That might seem ridiculous, but IoT botnets seemed ridiculous a few years ago.

      1 reply 0 retweets 27 likes
      Show this thread
    13. Ask Cybergibbons!‏ @cybergibbons 20h20 hours ago

      TLDR: If you want to install these cameras, consider them already compromised, that anyone can see them. Install them so they can't see anything you don't want others to see. And honestly - given previous tests of these - put them on another VLAN.

      13 replies 33 retweets 145 likes
      Show this thread
    14. End of conversation
    • © 2019 Twitter
    • About
    • Help Center
    • Terms
    • Privacy policy
    • Cookies
    • Ads info