{"id":11700,"date":"2016-09-30T09:43:40","date_gmt":"2016-09-30T14:43:40","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/?p=11700"},"modified":"2021-07-08T12:57:55","modified_gmt":"2021-07-08T17:57:55","slug":"importance-cyber-security-driven-home-145000-dvrs-compromised","status":"publish","type":"post","link":"https:\/\/www.een.com\/nb\/blog\/importance-cyber-security-driven-home-145000-dvrs-compromised\/","title":{"rendered":"145,000 DVRs Compromised"},"content":{"rendered":"\n<p>Several articles, including one by the Wall Street Journal, have recently reported that approximately 145,000 hacked DVRs and cameras were used to create some of the largest denial of service attacks ever seen on the Internet.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft\"><img decoding=\"async\" width=\"300\" height=\"156\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/DVR-300x156.png\" alt=\"dvr\" class=\"wp-image-11760\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/DVR-300x156.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/DVR-1024x532.png 1024w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/DVR-100x52.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/DVR-200x104.png 200w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/DVR-400x208.png 400w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/DVR-600x312.png 600w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/DVR-800x416.png 800w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/DVR-1200x624.png 1200w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/DVR.png 1279w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n\n<p>Attackers used hijacked security cameras and DVRs to launch several massive Internet attacks prompting fresh concern about the vulnerability of devices connected to the Internet. According to Level3, of the identifiable devices participating in these attacks, almost 96 percent were IoT devices, of which 95 percent were cameras and DVRs.<\/p>\n\n\n\n<p>Security camera DVRs often come configured with telnet and web interfaces enabled, allowing users to configure the devices and view their security footage over the Internet making them&nbsp;vulnerable to attacks. This compromise can be used by hackers to get access to the customers\u2019 local network and obtain sensitive corporate information, which is a potentially dangerous liability for the Reseller or VAR.&nbsp; In order to patch or upgrade these DVRs they&nbsp;will have to be manually upgraded&nbsp;or replaced.<\/p>\n\n\n\n<p>Checking DVRs to determine if they have been compromised&nbsp;and fixing them can be extremely complex and difficult.&nbsp; Not all vendors provide firmware updates.&nbsp; Updating the firmware, furthermore, will only&nbsp;clean up an infection in some circumstances.&nbsp; A factory reset, if provided, may clear up the infection, but again only in a small percentage of circumstances.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright\"><a href=\"https:\/\/www.barracuda.com\/products\/websecuritygateway\"><img decoding=\"async\" width=\"300\" height=\"94\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/10\/barracuda-clip-300x94.gif\" alt=\"barracuda-clip\" class=\"wp-image-11931\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/10\/barracuda-clip-300x94.gif 300w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/10\/barracuda-clip-100x31.gif 100w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/10\/barracuda-clip-200x63.gif 200w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/10\/barracuda-clip-400x125.gif 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>Detecting and determining if a DVR is comprised can be accomplished with some network investigation or the application of security appliances that&nbsp;analyze all the Internet traffic.&nbsp; The&nbsp;<a href=\"https:\/\/www.barracuda.com\/products\/websecuritygateway\">Barracuda Web Security Gateway<\/a> is one such product, but an expert can do it with more primitive tools as well.&nbsp; There is no easy answer to determine if a DVR is compromised if the vendor does not provide a solution on their website.<\/p>\n\n\n\n<div class=\"wp-block-image wp-image-11961 size-medium\"><figure class=\"alignleft\"><img decoding=\"async\" width=\"300\" height=\"120\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/mirai-hf-940x377-300x120.png\" alt=\"mirai-hf-940x377\" class=\"wp-image-11961\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/mirai-hf-940x377-300x120.png 300w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/mirai-hf-940x377-100x40.png 100w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/mirai-hf-940x377-200x80.png 200w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/mirai-hf-940x377.png 940w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/mirai-hf-940x377-400x160.png 400w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/mirai-hf-940x377-600x241.png 600w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/09\/mirai-hf-940x377-800x321.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><figcaption>Screenshot of Mirai<\/figcaption><\/figure><\/div>\n\n\n\n<p><strong>Details<\/strong>:<br>The infection that was identified was labeled \u201cMIRAI\u201d.&nbsp; The MIRAI code has built into it a large number of default cameras and DVR passwords.&nbsp; If you are using DVR\u2019s from <a href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2016\/10\/IoTbadpass-Sheet1.pdf\">one of these&nbsp;manufacturers<\/a>&nbsp;and didn\u2019t change the passwords it is likely that you are infected.&nbsp; &nbsp;If you recognize these passwords you are probably in trouble as well.&nbsp; These DVR\u2019s are sold under many different brands.<\/p>\n\n\n\n<p><strong>Lessons<\/strong>:<br>1) Don\u2019t put DVRs or cameras directly on the Internet.<br>2) Do not open inbound ports to DVRs, NVRs or VMSs to the Internet &#8211; even with a firewall.&nbsp; A firewall would not protect against these attacks.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.een.com\/product\/cloud-vms-system-overview\/\">Eagle Eye Cloud Security Camera VMS<\/a> separates the cameras from the Internet onto an isolated, protected network so they can\u2019t be compromised or used maliciously. \u00a0Furthermore, the <a href=\"https:\/\/www.een.com\/product\/cloud-vms-tech-specs\/\">Eagle Eye Bridges<\/a> are actively managed devices, which get firmware updates without having to send someone on site.\u00a0 This allows security patches and general updates to be deployed in a timely manner.<\/p>\n\n\n\n<p><strong>Detailed Information<\/strong>:<br><a href=\"http:\/\/blog.level3.com\/security\/attack-of-things\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=http:\/\/blog.level3.com\/security\/attack-of-things\/&amp;source=gmail&amp;ust=1475341158736000&amp;usg=AFQjCNEdRGA5U3f0AB2HJ3Hdz1Cbwoe_yA\">http:\/\/blog.level3.com\/<wbr>security\/attack-of-things\/<\/a><br><a href=\"http:\/\/www.wsj.com\/articles\/hackers-infect-army-of-cameras-dvrs-for-massive-internet-attacks-1475179428\" target=\"_blank\" rel=\"noreferrer noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=http:\/\/www.wsj.com\/articles\/hackers-infect-army-of-cameras-dvrs-for-massive-internet-attacks-1475179428&amp;source=gmail&amp;ust=1475341158736000&amp;usg=AFQjCNHBxkNVEHSdVx9cklZiZT68mjZqKw\">http:\/\/www.wsj.com\/articles\/<wbr>hackers-infect-army-of-<wbr>cameras-dvrs-for-massive-<wbr>internet-attacks-1475179428<\/a><br><a href=\"http:\/\/arstechnica.com\/security\/2016\/09\/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=http:\/\/arstechnica.com\/security\/2016\/09\/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever\/&amp;source=gmail&amp;ust=1475341158736000&amp;usg=AFQjCNH5ZaqP9SFW2dfKpPwthKX-ul1CXg\">http:\/\/arstechnica.com\/<wbr>security\/2016\/09\/botnet-of-<wbr>145k-cameras-reportedly-<wbr>deliver-internets-biggest-<wbr>ddos-ever\/<\/a><br><a href=\"http:\/\/arstechnica.com\/security\/2016\/06\/large-botnet-of-cctv-devices-knock-the-snot-out-of-jewelry-website\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=http:\/\/arstechnica.com\/security\/2016\/06\/large-botnet-of-cctv-devices-knock-the-snot-out-of-jewelry-website\/&amp;source=gmail&amp;ust=1475341158736000&amp;usg=AFQjCNEbd8xkoWvfprpuZ6WYNz4bGEmpwg\">http:\/\/arstechnica.com\/<wbr>security\/2016\/06\/large-botnet-<wbr>of-cctv-devices-knock-the-<wbr>snot-out-of-jewelry-website\/<\/a><br><a href=\"https:\/\/blog.sucuri.net\/2016\/06\/large-cctv-botnet-leveraged-ddos-attacks.html\" target=\"_blank\" rel=\"noreferrer noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?hl=en&amp;q=https:\/\/blog.sucuri.net\/2016\/06\/large-cctv-botnet-leveraged-ddos-attacks.html&amp;source=gmail&amp;ust=1475341158736000&amp;usg=AFQjCNFLgQii-Lx-x8CVx1vZUzK6d44daQ\">https:\/\/blog.sucuri.net\/2016\/<wbr>06\/large-cctv-botnet-<wbr>leveraged-ddos-attacks.html<br><\/a><a href=\"https:\/\/krebsonsecurity.com\/2016\/10\/who-makes-the-iot-things-under-attack\">https:\/\/krebsonsecurity.com\/2016\/10\/who-makes-the-iot-things-under-attack<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Several articles, including one by the Wall Street Journal, have recently reported that approximately 145,000 hacked DVRs and cameras were used to create some of the largest denial of service &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/nb\/blog\/importance-cyber-security-driven-home-145000-dvrs-compromised\/\"> <span class=\"screen-reader-text\">145,000 DVRs Compromised<\/span> Les mer &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":13215,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"12948,14995,75404,9830,10790,13763","_relevanssi_noindex_reason":"","footnotes":""},"categories":[230],"tags":[1273,1276,1272],"class_list":["post-11700","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cloud-video-surveillance","tag-cybersecurity","tag-video-management-software"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/posts\/11700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/comments?post=11700"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/posts\/11700\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/media\/13215"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/media?parent=11700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/categories?post=11700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/tags?post=11700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}