WHAT ARE YOU LOOKING FOR?

Raleigh, NC

32°F
Broken Clouds Humidity: 60%
Wind: 3.09 M/S

40,000 Security Cameras at Risk of Remote Hacking

40,000 Security Cameras at Risk of Remote Hacking

More than 40,000 internet-connected security cameras around the world are vulnerable to

remote hacking, creating significant privacy and safety concerns, according to cybersecurity firm Bitsight. 

The company reports that these cameras are exposed due to unsecured HTTP or RTSP (Real-Time Streaming Protocol) access, which allows live video streams to be accessed via public IP addresses. This makes them easy targets for spying, cyberattacks, extortion, and stalking. 

Identifying these HTTP-based cameras is complex because of the diversity in models and interfaces. Researchers used techniques like favicon hashes, HTTP headers, and HTML titles to fingerprint various brands. Many of the cameras are used in residential settings or small offices and operate through built-in web servers. Without requiring login credentials, some of these devices can be accessed directly via known URIs or through image-capturing tools. 

In their analysis, researchers found that some cameras allowed unrestricted access to live footage simply by requesting specific URIs like /out.jpg. Even if authentication seemed to be in place, knowing the right endpoint could let attackers bypass it and obtain real-time screenshots, posing a major privacy threat. 

RTSP-based cameras were more difficult to identify since they lack consistent visual or metadata markers. The team examined RTSP server headers and tested common URIs (e.g., /live.sdp, /video.h264) using tools like FFmpeg to extract footage. RTSP is frequently used in commercial surveillance due to its low latency. 

In total, Bitsight’s internet-wide scan identified over 40,000 unsecured cameras across both HTTP and RTSP protocols, with live footage captured from many. The U.S. accounted for the largest share with around 14,000 exposed devices, followed by Japan (7,000), Austria, Czechia, and others. 

In terms of industry distribution, 79% of exposed devices were linked to the telecommunications sector largely due to consumer devices on residential networks being attributed to ISPs. Excluding this sector, the highest exposure rates were in technology (28.4%), media (19.6%), utilities (11.9%), business services (10.7%), and education (10.6%). 

“These devices are everywhere and often purchased to monitor pets or home entrances,” Bitsight explained. “Since they’re tied to residential networks, the IP addresses show up under the user’s internet service provider, typically categorized under telecommunications.” 

The consequences are troubling: vulnerable feeds were found in homes, offices, retail stores, factories, and sensitive areas like hospitals, data centers, and ATMs. Insecure setups could allow attackers to spy, plan break-ins, or access private data. Public and private sector spaces alike are at risk due to poor camera configuration and default security settings. 

Bitsight also warns that cybercriminals are actively searching for exposed cameras on dark web forums. To protect themselves, users are advised to change default passwords, disable unnecessary remote access, secure their internet connections, update firmware regularly, and monitor devices for unusual activity. 

Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post. 

Image

With Cybersecurity Insights, current news and event trends will be captured on cybersecurity, recent systems / cyber-attacks, artificial intelligence (AI), technology innovation happening around the world; to keep our viewers fast abreast with the current happening with technology, system security, and how its effect our lives and ecosystem. 

Please fill the required field.