

Hackers are able to attack H.264 IP cameras through the Open Systems Services such as HTTP, RTSP, FTP which are commonly embedded in the cameras. This is particularly true for IP cameras, as they are designed to support open standards. In theory any device linked to the Internet is susceptible to the risks of hackers’ attacks. This is a serious issue, which can cause harm to public safety and privacy. With the obtained video data and images, some have been uploaded to the Internet and are available to Web browsers. At present, that appears unlikely.There has been much media attention and news reports recently on surveillance cameras being easily invaded by hackers (see for example). If the industry were to start getting serious about IoT security and standards put in place, we could, at the very least, diminish the magnitude of the problem. The sad thing is, it doesn't have to come to that. Until that changes, we can expect to see the numbers Trend Micro and other security companies report increase until we finally reach a tipping point. To date, however, that simply hasn't been the case. Given those circumstances, one would think that every smart device manufacturer would make increased security of the devices they sell a top priority. There is explosive growth of the number of smart devices in recent years, and hackers have gleefully appointed them by the tens of thousands and turned them into botnet armies for hire. While the industry has known about cyber-risks, manufacturers have been unable to properly address the risk without knowing the root cause and attack methods." Due to this shift in the landscape, manufacturers and users must pay attention to the security of these IoT devices. "More verticals are seeking connected, AI-powered video surveillance applications, causing a clear paradigm shift from a relatively closed-off network to a more interconnected network operated heavily by cloud-based technologies. Oscar Chang, of Trend Micro, had this to say about the findings: The company found that of the attacks, fully 75 percent relied on simple brute-force tactics. They're among the vast crop of 'low hanging fruit' of web-connected devices these days. IP cameras send video directly to the internet as it is captured, and are typically used for surveillance. Worse, IP cameras don't tend to have great security in place to begin with, making it relatively easy for hackers to control them remotely. According to their latest statistics, the security company has blocked more than five million cyber-attacks against IP cameras, just in the past five months.

Recently, Trend Micro published some statistics that just about everyone should find disturbing.
