DSLR Cameras Are Susceptible to Ransomware Attacks, New Research Finds

DSLR Cameras Are Susceptible to Ransomware Attacks, New Research Finds

Cameras could be high-priority targets because owners are more likely to pay to get their valuable photos back, researchers said.

As ransomware scares continue to halt operations of major companies and large cities across the country, researchers have found yet another device that is vulnerable to hackers seeking payment to unlock systems: DSLR cameras.

Security researchers with Check Point Software Technologies were able to install harmful malware onto cameras if they were in close proximity to their WiFi networks or if they had already hijacked a computer through a USB drive. The report, issued on Sunday, notes that DSLR cameras are “embedded digital devices,” putting them at risk just like every other IoT device.

“Our research shows that any ‘smart’ device, in our case a DSLR camera, is susceptible to attacks,” the report reads. “The combination of price, sensitive contents, and wide-spread consumer audience makes cameras a lucrative target for attackers.”

Read more: IoT Security: Current Threats and How to Overcome Them

The team, led by researcher Eyal Itkin, demonstrated in a video how a hacker could encrypt images on a SD card and make them inaccessible to the camera’s owner through a WiFi network. Because cameras are “the guardians of our precious moments,” Itkin wrote, hackers know that the owner does not want to lose the photos and therefore is more likely to pay the ransom fee.

Canon was alerted to the vulnerability in their “picture transfer protocol” in March, and Check Point worked with the company to develop a security patch that was released last week, according to The Verge. The researchers noted that while they only worked with Canon, the protocol is “standardized” and embedded in other cameras sold by Canon’s competitors.

“Based on our results, we believe that similar vulnerabilities can be found in the PTP implementations of other vendors as well,” the report reads.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3