How Hackers Could Modify Video Feeds in Misconfigured City CCTV Systems

Security examination of a working city video surveillance system by Kaspersky Lab has revealed that networks designed to help protect people from criminals and terrorists could be misused by a third party exploiting system configuration flaws.

It is no secret that police departments and governments have been monitoring city streets for years, with security cameras proving invaluable in crime investigation and prevention. However, as a result of research conducted by Kaspersky Lab researcher Vasilios Hioureas and his fellow researcher Thomas Kinsey from Exigent Systems Inc., these systems could also be used in a harmful way.

As part of their research, the authors examined the security video surveillance network in one city. Surveillance cameras were connected via a mesh network – a type of network in which nodes are connected with each other and serve as stepping stones for data (video feed in this particular case) on its way from a node to the control center. Instead of using a Wi-Fi hotspot or wired connection, nodes in such networks simply transmit data to the closest node which transmits it further through other nodes right to the command center. Should an intruder connect to just a single node in the network, they will be able to manipulate the data transmitted through it.

Mesh-network based video surveillance systems are, in general, an inexpensive alternative to surveillance systems which require either multiple hotspots throughout a city, or miles of wires. But the security of such networks is heavily dependent on how the whole network is set up. In the case investigated by the researchers, the network of cameras used no encryption at all. After purchasing equipment similar to that used in the city, Kaspersky Lab researchers discovered that sufficient encryption tools are provided, but they were not being used correctly in this case. As a result, clear text data was being sent though the network and made freely available to any observer who joined.

The researchers quickly realized that creating their own version of the software used in the network would be enough to manipulate the data traveling across it. After recreating the network and software in the lab, they were able to intercept the video feeds from any node and also modify them e.g. exchange the real video from the camera with a fake one.

The researchers shared their findings with the company that had set up the surveillance network in the city last summer. Since then, the necessary changes have been made to the vulnerable network.

“We undertook this research to highlight that cybersecurity also affects physical security systems, especially critical public systems like video surveillance. When building a smart city, it is extremely important to not only think about the comfort, energy and cost efficiency that the new technologies will bring, but also about the cybersecurity issues that might arise. Although the findings of this research were presented last august we have reasons to believe that its findings are still useful for city authorities that are planning to implement mesh-network based surveillance systems or implemented it already,” – said Vasilios Hioureas, Junior Malware Analyst at Kaspersky Lab and a co-author of the research.

 

ChannelDrive Bureau
ChannelDrive Bureauhttp://www.channeldrive.in
ChannelDrive Bureau covers the latest developments in the space of ICT, technology, solutions and implementations and delivers content focused around solution providers, system integrators, distributors and technology partner community in India. ChannelDrive Bureau is headed by Zia Askari. He can be reached at ziaaskari@channeldrive.in

Recent Articles

Related Stories

Stay on op - Get the daily news in your inbox