FBI Warns Of IoT Malware: How Does It Affect Video Surveillance In Organizations?

The FBI issued an alert warning about a cyber campaign involving the Hiatus Remote Access Trojan (HiatusRAT) malware.

This malware has been used by cyber actors to exploit vulnerabilities in Chinese-branded web cameras and digital video recorders (DVRs).

The campaign, which began earlier in the year, included scanning activities targeting such devices in countries such as the United States, Australia, Canada, New Zealand, and the United Kingdom. Initially focused on outdated network devices, the campaign has since expanded, with cybersecurity firms observing its use against organizations in Taiwan and even against a U.S. government server involved in defense contract submissions.

The FBI's alert emphasized that the attackers exploited known vulnerabilities and default credentials in older, unsupported devices - many of which are integral to video surveillance systems. These devices often lack manufacturer patches, making them particularly susceptible to compromise.

Scott Gee, the American Hospital Association's (AHA) deputy national advisor for cybersecurity and risk, highlighted the importance of including Internet of Things (IoT) devices in patch management programs, and not just patching traditional IT systems. The FBI recommends replacing outdated equipment with newer, supported models to mitigate risk.

For further guidance, the AHA encourages organizations to consult their cybersecurity resources or contact their cybersecurity advisor directly.

Source: https://www.aha.org/news/headline/2024-12-19-fbi-issues-alert-hiatusrat-malware

Commentary

As mentioned in the above source, the HiatusRAT malware campaign works by exploiting known vulnerabilities and default credentials in outdated or unsupported devices such as web cameras and digital video recorders.

These devices, often used in corporate environments for physical security, are typically connected to the internet but lack robust security measures. Once compromised, the malware allows attackers to remotely access and control the devices, turning them into entry points for broader network infiltration.

The attackers can use these compromised systems to monitor internal activities, pivot into more sensitive parts of the network, or even launch further attacks from within the organization's infrastructure.

For corporate security and data protection, the implications of such a breach are significant.

Video surveillance systems, while primarily used for physical monitoring, are increasingly integrated into broader IT ecosystems. If these systems are hacked, attackers could gain visibility into physical layouts, employee routines, and potentially sensitive operational activities.

Moreover, compromised devices can serve as persistent footholds for attackers, enabling long-term surveillance or data exfiltration. This undermines not only physical security but also the integrity of digital systems. Organizations may face regulatory consequences, reputational damage, and financial losses if such breaches lead to exposure of personal or proprietary information.

The final takeaway is that to maintain safety, organizations must up-date firmware, replace unsupported hardware, and include IoT devices in cybersecurity policies.

Finally, your opinion is important to us. Please complete the opinion survey:

Product

Articles

Is It Okay To Cry At Work? You Make The Call

An article discusses crying at work. We want to know what you think. You make the call and join the conversation.

FBI Warns Of IoT Malware: How Does It Affect Video Surveillance In Organizations?

The FBI issued a warning about malware compromising certain IoT devices, including video surveillance equipment. We examine and provide IoT best practices for organizations.

Staffing Algorithms, Negligence, And Employment Practice Liability

A senior living facility agrees to pay nearly $2M in fees and expenses concerning its staffing algorithm. We examine the liability exposure from staffing algorithms.

The Many Faces Of Payroll Fraud: What Steps Can Organizations Take?

An office manager goes to prison for committing payroll fraud. We examine the facts and the different types of payroll fraud, as well as provide loss prevention steps.

Crypto-Kidnappings Surge In France And Europe: Why Now?

A kidnapping attempt is made on the daughter of a cryptocurrency executive. This is just one of other crimes, including abductions, against crypto executives. Why now?