Optical Surgery Implanting A Dropcam. buy cc shop admin, cvv shop su store
Patrick Wardle, Director of Synack Research and Colby Moore, Synack Research Engineer
We are looking forward to presenting new security research on hijacking a dropcam at Defcon 22 this August.
If you’ve got physical access to a dropcam, it’s pretty much game over. An attacker can quickly subvert the camera, installing a fully-featured persistent implant. Such an implant can run arbitrary commands, provide geolocation information, exfiltrate or manipulate the audio and video feed, or infect other computers. We will discuss the reverse-engineering efforts that allowed us to develop such capabilities, as well as provide implementation details of our implant.
Our goal is to raise awareness that as these devices can be accessed by hackers or adversaries, they should be scrutinized in the way people protect their laptops or workstations. Don’t trust a camera just because you think it is an isolated gadget, or ignore the one that sits in your company’s spaces. The truth is, a compromised dropcam becomes a full-fledged computer that can be remotely commanded and controlled by a malicious adversary. And since there are no simple ways to detect a such a compromise, an attacker may remain undetected in your network for a long time – scary stuff indeed!
buy cc shop admin cvv shop su store