Thousands Of Security Cameras, Archived Footage Exposed After Surveillance Company Verkada Is Hacked

from the unsecured-security-cameras-are-the-best-security-theater dept

Put enough cameras up and pretty soon they become tasty targets for malicious hackers.

A group of hackers say they breached a massive trove of security-camera data collected by Silicon Valley startup Verkada Inc., gaining access to live feeds of 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools.

Some of the more notable targets include Tesla factory cameras and security cameras deployed by Cloudflare. The hackers also apparently have access to archived video from these sources. Verkada has responded by disabling all internal administrator accounts -- something it probably should have done back when it was making news for doing the same thing, only without the participation of outside hackers.

Last year, a sales director on the company's sales team abused their access to these cameras to take and post photos of colleagues in a Slack channel called #RawVerkadawgz where they made sexually explicit jokes about women who worked at the company, according to a report in IPVM, which Motherboard independently verified and obtained more information about.

"Face match… find me a squirt," the sales director wrote in the company Slack channel in August 2019, according to one screenshot obtained by Motherboard.

Now, the same sort of thing can be done by anyone with access to the compromised system. The hackers involved here claim to be operating somewhat altruistically.

The data breach was carried out by an international hacker collective and intended to show the pervasiveness of video surveillance and the ease with which systems could be broken into, said Tillie Kottmann, one of the hackers who claimed credit for breaching San Mateo, California-based Verkada. Kottmann, who uses they/them pronouns, previously claimed credit for hacking chipmaker Intel Corp. and carmaker Nissan Motor Co. Kottmann said their reasons for hacking are “lots of curiosity, fighting for freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism -- and it’s also just too much fun not to do it.”

Add to that list "too easy." According to Kottmann, the hackers gained access to a "Super Admin" account after finding a username and password publicly exposed. That access has since been revoked (along with all other internal admin accounts), but the footage served up to reporters showed everything from eight hospital staffers restraining a patient to police officers grilling suspects.

Then there's the facial recognition tech grafted onto Verkada's cameras.

Verkada's website advertises that "all" of its cameras include "Smart Edge-Based Analytics," referring to the cameras' facial recognition, person identification, and vehicle analysis tools.

It's not clear which of Verkada's 24,000 customers were using these functions but they appear to be built-in. And its list of customers -- also exposed in the breach -- includes schools, banks, bars, breweries, churches, condo complexes, museums, airports, a Salvation Army Center, as well as the previously mentioned companies, hospitals, and prisons.

And, as was briefly noted earlier, Verkada's system allows customers to search recorded video by face, allowing users to compile screenshots of every instance in which the searched face was captured by the cameras.

Surveillance is a growth market. Amass enough market share and someone's going to want to see what you've collected. Verkada's use of admin accounts was already problematic given what we know about the mindset of some of its administrators. Giving admins access to all customer cameras and recordings may make it easier to address user problems, but without better security, it's also irresponsible.

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: cybersecurity, hackers, iot, privacy, security, security cameras
Companies: verkada


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • icon
    Upstream (profile), 11 Mar 2021 @ 1:46pm

    More reasons to just say "No."

    Amass enough market share and someone's going to want to see what you've collected.

    As long as this kind of data is available (exists on Internet connected computer = available), it will be accessed and abused by the wrong people.

    link to this | view in chronology ]

  • icon
    ECA (profile), 11 Mar 2021 @ 1:51pm

    Funny feelings.

    Anyone wonder if we are using OLD tech for reasons??
    And/or
    Old computer server polices that REALLY need updating.

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.