Security cameras are vulnerable to attacks using infrared light

20 Sep 2017

1

Ben-Gurion University of the Negev (BGU) researchers have demonstrated that security cameras infected with malware can receive covert signals and leak sensitive information from the very same surveillance devices used to protect facilities.

The method, according to researchers, will work on both professional and home security cameras, and even LED doorbells, which can detect infrared light (IR), not visible to the human eye.

In the new paper, the technique the researchers have dubbed "aIR-Jumper" also enables the creation of bidirectional, covert, optical communication between air-gapped internal networks, which are computers isolated and disconnected from the internet that do not allow for remote access to the organization.

The cyber team led by Dr Mordechai Guri, head of research and development for BGU's Cyber Security Research Center (CSRC), shows how IR can be used to create a covert communication channel between malware installed on an internal computer network and an attacker located hundreds of yards outside or even miles away with direct line of sight.

The attacker can use this channel to send commands and receive response messages.

To transmit sensitive information, the attacker uses the camera's IR-emitting LEDs, which are typically used for night vision. The researchers showed how malware can control the intensity of the IR to communicate with a remote attacker that can receive signals with a simple camera without detection. Then the attacker can record and decode these signals to leak sensitive information.

The researchers shot two videos to highlight their technique. The first video shows an attacker hundreds of yards away sending infrared signals to a camera. The second video shows the camera infected with malware responding to covert signals by exfiltration data, including passwords.

According to Dr Guri, "Security cameras are unique in that they have 'one leg' inside the organisation, connected to the internal networks for security purposes, and 'the other leg' outside the organization, aimed specifically at a nearby public space, providing very convenient optical access from various directions and angles."

Attackers can also use this novel covert channel to communicate with malware inside the organization. An attacker can infiltrate data, transmitting hidden signals via the camera's IR LEDs. Binary data such as command and control (C&C) messages can be hidden in the video stream, recorded by the surveillance cameras, and intercepted and decoded by the malware residing in the network.

"Theoretically, you can send an infrared command to tell a high-security system to simply unlock the gate or front door to your house," Guri says.

Latest articles

Indian textile sector struggles with energy intensity despite renewable push: ICRA report

Indian textile sector struggles with energy intensity despite renewable push: ICRA report

Musk’s Mars obsession poses strategic risk to SpaceX’s $1.5 trillion IPO valuation

Musk’s Mars obsession poses strategic risk to SpaceX’s $1.5 trillion IPO valuation

Indian banks push RBI to double lending cap for mergers as deal activity heats up

Indian banks push RBI to double lending cap for mergers as deal activity heats up

India’s Russian Crude Imports Hit Five-Month High as State Refiners Fill Gap

India’s Russian Crude Imports Hit Five-Month High as State Refiners Fill Gap

Currency Pressure Forces Mercedes-Benz India to Hike Prices by 2% from January 2026

Currency Pressure Forces Mercedes-Benz India to Hike Prices by 2% from January 2026

Lloyds Engineering Forms Defense Subsidiary to Tap India’s Military Boom; Shares Rise

Lloyds Engineering Forms Defense Subsidiary to Tap India’s Military Boom; Shares Rise

JSW Energy Unit Signs 25-Year Pact to Supply 400 MW Power to Karnataka Discoms

JSW Energy Unit Signs 25-Year Pact to Supply 400 MW Power to Karnataka Discoms

Foxconn to Invest $510 Million in New Kaohsiung Headquarters in Taiwan

Foxconn to Invest $510 Million in New Kaohsiung Headquarters in Taiwan

A Maersk Names Robert Erni as New Chief Financial Officer

A Maersk Names Robert Erni as New Chief Financial Officer

Business History Videos

History of hovercraft Part 3 | Industry study | Business History

History of hovercraft Part 3...

Today I shall talk a bit more about the military plans for ...

By Kiron Kasbekar | Presenter: Kiron Kasbekar

History of hovercraft Part 2 | Industry study | Business History

History of hovercraft Part 2...

In this episode of our history of hovercraft, we shall exam...

By Kiron Kasbekar | Presenter: Kiron Kasbekar

History of Hovercraft Part 1 | Industry study | Business History

History of Hovercraft Part 1...

If you’ve been a James Bond movie fan, you may recall seein...

By Kiron Kasbekar | Presenter: Kiron Kasbekar

History of Trams in India | Industry study | Business History

History of Trams in India | ...

The video I am presenting to you is based on a script writt...

By Aniket Gupta | Presenter: Sheetal Gaikwad

view more
View details about the software product Informachine News Trackers