top of page
  • Writer's pictureAnup Ghosh

Mirai Strikes Again: IP Cameras Hijacked for Botnet Attacks


The Download

Security researchers discovered IP cameras all around the world were compromised and recruited into the Mirai botnet, which is notorious for launching large-scale distributed denial-of-service (DDoS) attacks. The vulnerability exploited by attackers stemmed from weak default credentials and outdated firmware in these cameras, making them easy targets for remote control. The vulnerability with CVSS 8.7 and labeled as CVE-2024-7029 was discovered by security researchers from Akamai.


The exploit bypasses authentication and leverages parameters of the camera brightness control argument to inject commands with the same privileges of the owner. Once compromised, the cameras were used to amplify and carry out DDoS attacks, leveraging their widespread presence across various networks to create a massive botnet with significant destructive capabilities.


What You Can Do

We often use IP cameras as an example of an important attack surface on many networks, IoT devices that sit on the network but are often neglected by vulnerability management tools. We highly recommend scanning your networks with ThreatMate's vulnerability scanner which will identify all devices that sit on the network including IP cameras, and their vulnerabilities. IoT devices comprise an important attack surface and neglecting them can lead to adversarial compromise of the network and recruitment of devices into botnets. Sign up for a demo now.




To Learn More:


10 views

Comments


bottom of page