Relay Addresses the Recent Cybersecurity Vulnerability in Surveillance and Security Cameras market; 100 Million Connected Devices Susceptible to Remote Hijacking

Relay Addresses the Recent Cybersecurity Vulnerability in Surveillance and Security Cameras market; 100 Million Connected Devices Susceptible to Remote Hijacking

Relay Medical Corp. addresses a recent revelation about the widely-used Hikvision1, a Chinese state-owned surveillance and connected security camera manufacturer, whereby a critical vulnerability was discovered in more than 100 million connected devices currently operational in the market.

RELAY ADDRESSES THE RECENT CYBERSECURITY VULNERABILITY

The Hikvision vulnerability affects dozens of IoT device companies, including devices affiliated with brands such as Toshiba, Honeywell, Panasonic, Hyundai and Hitachi.2 Hikvision owns approximately 40% of the global surveillance and security camera market.3 Hikvision has admitted a 9.8 vulnerability score which is “the highest level of critical vulnerability” and is estimated to impact more than 100 million connected devices operating in the market.4

“Recent Hikvision news demonstrates a widespread problem of software weaknesses and vulnerabilities that are hidden in the software components of connected products this is meant to be addressed by NTIA (National Telecommunications and Information Administration) and its SBoM software transparency initiative. It’s another example of why software and hardware companies need to have internal product security hygiene and processes in place that provide a singular, transparent view into all their products. Cybeats offers holistic supply chain security starting from the design phase, while also continuously assessing, monitoring and eliminating threats in real-time of critical operating devices,” says Dmitry Raidman, CTO and Co-founder of Cybeats.

Cybeats Provides Preventative Solutions

Cybeats products directly address the Hikvision vulnerability by providing secure by design and SBoM management capabilities, and we recommend:

  1. Product vendors and manufacturers to start integrating SBoM generation in their processes earlier in manufacturing and development stages
  2. Product consumers should start requesting the SBoMs for products they procure and resell, including any white labeled devices such as currently vulnerable Hikvision security products
  3. Both manufacturers and consumers will need to start utilizing SBoM for various security and compliance use-cases, as regulatory mandates on software & SBoM are a widespread requirement

Malwarebytesidentified that Original Equipment Manufacturers (OEMs) rebrand Hikvision cameras and sell them as their own. It could take quite some time before all of these other potentially vulnerable devices are identified. Hikvision is PRC government-owned6 but banned by the US-government7. It is the world’s largest video surveillance manufacturer and a generally hidden supply chain to many Western companies. Given the deployment of these cameras at sensitive sites, critical infrastructure is potentially at risk.

Cybeats Provides Active Defense Solutions

Having the Cybeats agent integrated into a connected device, such as those affected by this Hikvision vulnerability, would have provided real-time actionable protection to affected brands that were identified by ipvm8, such as Toshiba, Honeywell, Panasonic, Hyundai and Hitachi. Cybeats supports manufacturers (such as surveillance and security camera companies) to build connected devices with security in mind, beginning in the design phase throughout the product life-cycle. Lastly, Cybeats IoT RASP capabilities can provide actionable data about the device’s operating state, and allow for threat elimination in real-time as new attacks emerge. Once a device vulnerability is found, Cybeats’s SBOM Studio can provide insight into which devices are affected, and which to recall or which to provide a firmware update. This provides manufacturers with fleet management tools along with efficient and accurate firmware updates to the affected devices.

Other Recent Cyber Attacks

IoT cyber attacks have escalated in 20219, according to Kaspersky10. IoT cyberattacks more than doubled with roughly 1.5 Billion IoT attacks occurring from January to June 2021. The study was conducted using software honeypots11, which emulate IoT devices as a proxy for vulnerable hardware endpoints. The findings also confirm that the pandemic has exacerbated IoT vulnerabilities by prolonging device usage in household settings.  Many of these devices – whether intended for enterprise or personal use – lack adequate security protocols.12

This Hikvision vulnerability news also follows the breach of Tesla13 security cameras, which came along with the hacking of jails and hospitals. The live feeds and data of 150,000 surveillance cameras, collected by Silicon Valley startup Verkada Inc., were breached in March 2021.14Vulnerabilities like these can result in significant service disruptions, as exemplified in the Mirai botnet attack15 from 2016 whereby the hackers used a botnet of IoT devices including webcams, routers, and DVRs to ‘take down’ the internet in North America for multiple days. Many prominent corporations, including CNBC, Amazon, Twitter, Netflix, Spotify, and Paypal, experienced outages of their website and client server issues, causing shutdowns and service delays lasting several hours.16

_______________________
1https://us.hikvision.com/en
2https://ipvm.com/reports/hik-oems-dir
3https://www.forbes.com/sites/leemathews/2021/09/22/widely-used-hikvision-security-cameras-vulnerable-to-remote-hijacking/?sh=6e12f1502f31
4https://ipvm.com/reports/hik-oems-dir
5https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/09/patch-now-insecure-hikvision-security-cameras-can-be-taken-over-remotely/
6https://ipvm.com/reports/hikvision-prc
7https://ipvm.com/reports/aug-13-2019
8https://ipvm.com/reports/hik-oems-dir
9https://www.iotworldtoday.com/2021/09/17/iot-cyberattacks-escalate-in-2021-according-to-kaspersky
10https://www.kaspersky.ca/
11https://www.kaspersky.com/resource-center/threats/what-is-a-honeypot
12https://www.iotworldtoday.com/2021/09/17/iot-cyberattacks-escalate-in-2021-according-to-kaspersky
13https://www.tesla.com/
14https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams
15https://www.wired.com/2016/10/internet-outage-ddos-dns-dyn/
16https://www.cnbc.com/2016/10/21/major-websites-across-east-coast-knocked-out-in-apparent-ddos-attack.html
Tagged , , , ,

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.