Peekaboo: Don’t Be Surprised by These Not So Candid Cameras

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

Tenable Research discovered a major software flaw, dubbed Peekaboo, which gives cyber criminals control of certain video surveillance cameras, allowing them to secretly monitor, tamper with and even disable feeds. Here’s a quick look at what we know today.

What’s Peekaboo?

Peekaboo is a security vulnerability in software made by NUUO, a global video surveillance vendor. The software is used in devices like closed-circuit television (CCTV) cameras and networked video recorders and storage devices. When cyberattackers exploit the flaw, they can manipulate the cameras and take them offline – all without ever being detected.

Who does Peekaboo affect?

Organizations all over the world use NUUO software in their video surveillance systems to protect shopping centers, banks, hospitals, schools and other crowded locations. NUUO also OEMs and white labels its software to more than 100 brands and 2,500 models of cameras. In fact, preliminary estimates show that Peekaboo could affect up to hundreds of thousands of web-based cameras and devices worldwide.

How does Peekaboo work?

Peekaboo can give cyber criminals control of video surveillance cameras using NUUO software, allowing them to secretly monitor, tamper with and even disable the feed. Even worse, once they’ve hacked the camera, they can access the camera feeds of any other device it’s connected to.

By exploiting the Peekaboo vulnerability, cyberattackers can steal specifics about all the networked cameras, including key data like login credentials as well as the make and model, IP address and port. All this can happen in the span of a few seconds, without the admins’ knowledge.

Here’s what the hack looks like….

What’s the potential impact of Peekaboo?

Devices with NUUO software are used in diverse environments like banks, retail locations and transportation centers. By exploiting this weakness, attackers could monitor CCTV feeds to surreptitiously gather information, disable cameras or tamper with security footage. For example, they could replace the live feed with a static image of the surveilled area, allowing criminals to enter the premises undetected by the cameras.

What should I do about Peekaboo?

There is no patch available at this time. We advise affected users to restrict and control network access to the vulnerable devices to authorized and legitimate users only.

How was Peekaboo discovered?

Jacob Baines, senior research engineer at Tenable, discovered the Peekaboo vulnerability in NUUO NVRMini2. He then began the disclosure process with NUUO.

This isn’t the first time NUUO NVR devices have been in the news. Just last year, the NUUO NVR devices were specifically targeted by the Reaper IoT botnet.

Want more information?

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
1590 Followers
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at tenable.com.
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel