• GamingChairModel@lemmy.world
    link
    fedilink
    English
    arrow-up
    10
    ·
    edit-2
    11 months ago

    According to the article, attackers used automated scanning software, which strongly implies they brute-forced cameras connected to the Internet with default or weak credentials. That has nothing to do with whether or not the service is based in the cloud.

    This is a known problem with popular brands of security cameras sold in Vietnam, that the default configuration has an admin password of “admin” or “12345” accessible from the public Internet. They’re basically sold insecure, and rely on customers to consciously adopt a custom configuration to be secure.

    Although, in order to be publicly accessible, one would imagine that they’ve had to configure their firewall to let outside signals to the devices themselves. Or maybe some kind of ddns setup.

    Either way, it doesn’t have anything to do with the cloud, and the parent comment is basically right about that.

    • WhatAmLemmy@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      11 months ago

      Although, in order to be publicly accessible, one would imagine that they’ve had to configure …

      I’m guessing there are providers in Vietnam offering remote access accounts and apps, the same as 90% of IP security cameras on AliExpress, Amazon, eBay etc. Most of the zero config ones are authenticated with a cloud server 24/7 to enable remote viewing. This being Vietnam specific leads me to believe that the “hackers” are actually a domestic crime org selling compromised hardware; could be as simple as opening the box and obtaining device information (like the serial, MAC, or QR code) before shipping the product.