• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    The Next Goal Of Internet Black Production: How Much Privacy Is A Webcam?

    2020/3/27 11:00:00 184

    NetworkBlack ProductionTargetCameraPrivacy

    With the development of the Internet of things, cameras have become an ordinary object in people's lives. Whether in public or private space, the original intention of people to install cameras is for safety or convenience. But now, many black production groups use cameras as new targets of attack, and they become hidden dangers of people's privacy.

    This is not alarmist talk. In February 12th this year, the national Internet Emergency Center issued an early warning report. "Recently, hackers abroad claimed that they would launch cyber attacks on China in mid February, targeting many video surveillance systems in China, and releasing a number of relevant video surveillance systems in their domestic IP addresses."

    In March 10th, the key infrastructure security emergency response center of the national Internet Emergency Center released a report that in the past half a month, the number of malicious code attacks on Internet specific vulnerabilities has reached 67 million times, and a single organization has attempted to attack one hundred thousand IP addresses. It can be considered that whenever the Internet of things devices are exposed to the Internet, they may be attacked at any time and may be repeatedly attacked by different organizations.

    How many cameras are there on the Internet? The previously released "2018 camera safety report" has statistics. As of the end of November 2018, there are 26 million 350 thousand cameras in 8063 cities in 228 countries, which have access to the public network. Among them, China ranked third, a total of 1 million 650 thousand.

    This shows that there are not a few cameras in an unsafe state. In March 25th, the twenty-first Century economic report reporter interviewed the Tencent Guardian program security expert whose name is KK. He said that in the confrontation with cybercrime, crime is always ahead. This also requires us to always pay attention to the development of network security, especially in the era of technological change, especially vulnerable to technical loopholes.

    But KK also said that there is no need to panic too much for network security. The domestic security companies also precipitated many methodologies in the process of combating black production, so long as they can ensure timely control and vigilance of new technologies, they can still play a great defensive role.

    Evil desires

    The emergence of network black production is driven by interests. What are the benefits behind the camera? KK told reporters that the black chain could be divided into three parts, namely, the development and sale of the camera crack tool, the webcam scanning and the video camera collection and sale.

    Among them, the development and sale of camera cracking tools are at the top of the chain of black production. The software developed by the black production group that has the capability of technology has the scanning function, which can acquire the camera ID in batches, and then detect the weak password.

    The "webcam scanning" is the middle reaches of the black production chain. After obtaining the upstream crack tools, some black production groups began to attack network cameras in large quantities. When they successfully got the webcam logo ID, they sold them in bulk. In foreign communications tools, it was found that someone had 198 dollars to pack and sell 500 cameras ID.

    KK told reporters that in the sale of camera ID link, some black workers will be screened by ID one by one, and then there will be private citizens' privacy, especially some sensitive pictures of ID, sold separately, and often such ID can be sold at a higher price.

    The downstream of the black chain is the direct sale of camera videos. When the black production group gets a large number of videotapes or video surveillance videos, such as those in residential areas, stations, hotels and other privacy venues, it will mark the price according to the sensitivity and privacy level, and then sell other black gangs mainly to "pornographic websites" to achieve profits.

    There are different ways of making profit in the upper and lower reaches of the camera chain. A network security and crime researcher told reporters that judging from the existing case results, more than 50% of crimes committed through video cameras were used for extortion. But it should be noted that it also includes those cases targeted at a victim, specially installed camera shooting and extortion.

    Another Internet security official said that the existence of black Internet is due to the fact that some people are willing to pay for it. Like camera piracy, the ultimate goal is to get a privacy picture, because they know that some people are willing to spend money to satisfy their desires.

    Recently, the N house incident in South Korea has been booming, and the topic of privacy protection is heating up again. But KK frankly said that the current level of domestic black production, whether refined or the maturity of the industrial chain, has already taken the lead in the world. Moreover, with the continuous suppression of the domestic security industry and government departments, some black gangs are beginning to move overseas.

    "Black production uses platform tools such as dark net, because its concealment, including many black capital, has begun to use bitcoin, which has brought difficulties to the tracing and tracing of black products, but this is also a global problem. However, the industry chain of black production has become very long now. As long as there is a loophole in one link, some clues can be found. " KK said.

    Weak sense of security is the biggest loophole.

    According to KK, at present, there are several ways that black gang attacks webcam. First, aiming at the camera terminal, the black gang can get sensitive information such as hardware coding and so on through debugging the interface firmware on the camera hardware and tampering with the serial number of the device.

    The two is for mobile phone end camera applications, black gangs will be static decompile, through communication security for middleman attacks and protocol capture and decoy; three is for the cloud, some camera data will be transmitted to the cloud, hackers through infiltration WEB access to the sub domain name of the interface, for information theft.

    In the process of confrontation with black production, KK found that there are some difficulties in the security protection of cameras. He said that webcam as an IOT device itself is prone to technical loopholes, while some software is solidified on hardware, which is difficult to update and fill in time.

    More importantly, most users do not have enough security awareness of cameras. "When they choose to buy cameras, they will only look good or not, and do not understand the security of the network, and many users will use the weak password or the default password directly to buy the camera, which has left an opportunity for the black production group." KK said.

    A brand webcam developer told the twenty-first Century economic report that the mainstream Camera Companies in the market will put security in a very important position. However, no one dares to make a one hundred percent guarantee on security issues, and the main reason for the current privacy leakage is due to the user's carelessness.

    For camera manufacturers, KK also suggests that users should be banned from using the default username and password directly. At the same time, for personal users, KK suggests that we should try to use complex passwords and modify them regularly. Besides, cameras should not be in private space such as beds or bathrooms.

    ?

    • Related reading

    Polyester Factory Polyester Production And Marketing To Maintain 4 Of The Epidemic Situation, The Future Market Unpredictable.

    Expert commentary
    |
    2020/3/27 10:59:00
    189

    The Global Respirator Gap Is 10 Times The Existing One: Chinese Manufacturers' Overseas Orders Surging, And The Threshold Of Cross Boundary Production Is High.

    Expert commentary
    |
    2020/3/27 10:54:00
    0

    Dai Jinliang And Wang Dongjin'S Golden Stone Policy: Oil Prices Continue To Increase Production And Storage

    Expert commentary
    |
    2020/3/27 10:54:00
    0

    The Epidemic Accelerated The Development Of "Unmanned Vehicle" Technology Development, Automatic Driving And Large-Scale Commercialization In The First Year.

    Expert commentary
    |
    2020/3/27 10:53:00
    0

    Friends Circle Advertising Is Hard To Shut Down Behind: Tencent Can Not Bear To Give Up Hundreds Of Millions Of Social Advertising "Cake"

    Expert commentary
    |
    2020/3/27 10:53:00
    0
    Read the next article

    K12在線教育頭部公司測評報告:師資資質公示狀況堪憂 多家機構違規收費

    K12教育培訓未來將是萬億市場,而在線教育將占50%的市場規模。

    主站蜘蛛池模板: 交换人生电影在线| 学长在下面撞我写着作业l| 国产欧美日韩中文久久| 亚洲成AV人片久久| 91麻豆果冻天美精东蜜桃传媒| 男人桶女人视频30分钟看看吧| 好男人资源在线观看好| 全球中文成人在线| 一个色中文字幕| 男插女青青影院| 天天干天天操天天做| 人妻免费久久久久久久了| 99在线精品免费视频九九视| 波多野结衣痴汉| 国产自无码视频在线观看| 亚洲国产精品无码久久98| 日批视频在线看| 最新视频-88av| 国产在线不卡免费播放| 久久久久亚洲AV无码专区首 | 精品无码国产自产拍在线观看| 探花国产精品三级在线播放| 国产成视频在线观看| 亚洲欧美丝袜制服在线| 182tv午夜精品视频在线播放| 漂亮女教师被浣肠| 好湿好大硬得深一点动态图| 人妻少妇久久中文字幕| 91网站在线看| 欧美丰满大乳大屁股流白浆| 国产成人涩涩涩视频在线观看| 久久亚洲日韩精品一区二区三区| 国产成人精品亚洲2020| 欧美女人毛茸茸| 国产成人无码精品久久久露脸 | 色噜噜在线视频| 性欧美videofree另类超大| 人妻av无码一区二区三区| 777奇米影视四色永久| 欧美黑人xxxx又粗又长| 国产精品ⅴ无码大片在线看|