Peep show: 40K IoT cameras worldwide stream secrets to anyone with a browser
- Reference: 1749549607
- News link: https://www.theregister.co.uk/2025/06/10/40000_iot_cameras_exposed/
- Source link:
Supporting the bulletin issued by the Department of Homeland Security (DHS) earlier this year, which warned of exposed cameras potentially being used in Chinese espionage campaigns, the team at Bitsight was able to tap into feeds of sensitive locations.
The US was the most affected region, with around 14,000 of the total feeds streaming from the country, allowing access to the inside of datacenters, healthcare facilities, factories, and more.
[1]
Bitsight said these feeds could potentially be used for espionage, mapping blind spots, and gleaning trade secrets, among other things.
[2]
[3]
Aside from the potential national security implications, cameras were also accessed in hotels, gyms, construction sites, retail premises, and residential areas, which the researchers said could prove useful for petty criminals.
Monitoring the typical patterns of activity in retail stores, for example, could inform robberies, while monitoring residences could be used for similar purposes, especially considering the privacy implications.
[4]
"It should be obvious to everyone that leaving a camera exposed on the internet is a bad idea, and yet thousands of them are still accessible," said Bitsight in a report.
"Some don't even require sophisticated hacking techniques or special tools to access their live footage in unintended ways. In many cases, all it takes is opening a web browser and navigating to the exposed camera's interface."
Bitsight looked at two types of internet-connected cameras relying on HTTP and RTSP technologies, which are typically used in consumer and commercial contexts respectively.
[5]
While the researchers said all it takes to fingerprint these cameras is a browser and a uniform resource identifier (URI), finding them isn't quite as simple, but far from impossible for a motivated individual or group.
For HTTP-based cameras, Bitsight said most camera manufacturers implement an API that returns a single frame from a live feed, at the time the request was made, provided the correct URI and parameters are used.
It would take some study of each manufacturer's technical documentation, but the live frames could be captured when systematically testing the URIs until an image is returned.
"This is essentially how we detected exposed HTTP-based cameras from various manufacturers: first identifying the likely manufacturer, then determining which specific URIs to test against that brand and model until we found the one that provided the screenshot we were looking for," Bitsight said.
RTSP cameras are designed for low-latency continuous streaming, which is why they're more common in commercial scenarios such as surveillance systems.
Fingerprinting these was more difficult than HTTP-based cameras, a process carried out using identifiers such as HTML favicon hashes, headers, and titles, because these types of hints aren't as abundant.
"The only useful piece of information we can check is the RTSP server header," it said, but RTSP endpoints typically do not reveal information about said header. As a result, the number of affected camera vendors identified by the researchers was limited.
HTTP-based cameras accounted for 78.5 percent of the total 40,000 sample, while RTSP feeds were comparatively less open, accounting for only 21.5 percent.
[6]Chinese spy crew appears to be preparing for conflict by backdooring 75+ critical orgs
[7]China accuses Taiwan of running five feeble APT gangs, with US help
[8]Ivanti makes dedicated fans of Chinese spies who just can't resist attacking its buggy kit
[9]Chinese snoops tried to break into US city utilities, says Talos
Altogether, the camera findings exposed feeds from highly sensitive locations such as hospitals, factories, [10]datacenters , and more, which as the DHS warned in February could be exploited by [11]spies and criminals.
The non-public DHS security bulletin, reported by [12]ABC News earlier this year, reportedly zeroed in on cameras that typically lack encryption and security controls enabled by default.
The bulletin also focused on [13]Chinese-made cameras , of which the department expects tens of thousands to be operating in [14]critical infrastructure organizations across the US, with special concern surrounding the energy and chemical sectors.
Chinese spies have previously accessed these camera feeds, and the DHS reportedly warned that they are likely to do so again.
"A cyber actor could leverage cameras placed on IT networks for initial access and pivot to other devices to exfiltrate sensitive process data that an actor could use for attack planning or disrupting business systems," the bulletin said, according to the broadcaster.
"A cyber actor could use cameras placed on safety systems to suppress alarms, trigger false alarms, or pivot to disable fail-safe mechanisms."
In addition to state-sponsored threats, Bitsight said the cybercriminal underground is teeming with interested parties seeking similar access, albeit likely for different ends.
Scouring marketplaces and forums, they found signs of individuals sharing IP addresses with descriptions of the feeds, such as bedrooms, workshops, and more.
The researchers said these kinds of communities are filled with individuals who may be looking to stalk or attempt to extort individuals with footage taken from inside their private residences. ®
Get our [15]Tech Resources
[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aEhWlx3ezlDjyunEIgiRywAAAAE&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aEhWlx3ezlDjyunEIgiRywAAAAE&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aEhWlx3ezlDjyunEIgiRywAAAAE&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aEhWlx3ezlDjyunEIgiRywAAAAE&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/research&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aEhWlx3ezlDjyunEIgiRywAAAAE&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[6] https://www.theregister.com/2025/06/09/china_malware_flip_switch_sentinelone/
[7] https://www.theregister.com/2025/06/05/china_taiwan_us_apt_report/
[8] https://www.theregister.com/2025/05/23/ivanti_chinese_spies_attack/
[9] https://www.theregister.com/2025/05/22/chinese_crew_us_city_utilities/
[10] https://www.theregister.com/2024/09/12/uk_datacenters_cni/
[11] https://www.theregister.com/2024/09/18/chinese_spies_found_on_us_hq_firm_network/
[12] https://abcnews.go.com/US/internet-connected-cameras-made-china-spy-us-infrastructure/story?id=118533418
[13] https://www.theregister.com/2022/08/24/hikvision_camera_patch/
[14] https://www.theregister.com/2024/02/07/its_not_just_volt_typhoon/
[15] https://whitepapers.theregister.com/
Re: It all wears rather thin
Indeed it will be interesting to see when America brings all manufacturing back to its shores (lol, yeah right). The web interface for these new US cameras will probably be orders of magnitude worse and written by one of Elon's script kiddiez using ChatGPT.
And that's before the NSA have demanded a backdoor for a live feed.
Re: It all wears rather thin
Chinese government back doors are rather academic when the front door is left standing open.
Re: It all wears rather thin
Right now China have released a better, more efficient, AI than whatever America has produced. They're making advances in medicine and heathcare.
What are America doing? Ripping babies out of the arms of their mothers and sending in the army to shoot the people who protest about it.
Some country.
Re: It all wears rather thin
There is a lot of Chinese kit involved in these, but - let's be honest - just because it is cheap and quickly made: who wants to spend the extra money on the same thing, with the same flaws, made elsewhere?
No need to look for nefarious spying reasons for the leaky cameras, no matter how much we'd like to think we're that interesting.
I was doing this over 20 years ago...
..with a simple Google search. Great to see little progress has been made.
"Cyber Actors"
"Look at me -- I'm a computer!"
Re: "Cyber Actors"
Nicholas Craig masterclass on [1]How to be Sci-Fi
[1] https://www.youtube.com/watch?v=NT8_W7BWYp0
No Mention Of.....
.....SHODAN. Really?
Quote (Wkipedia): "In November 2021, PCMagazine described how Shodan was used by AT&T to detect Internet of Things devices infected with malware."
"It should be obvious to everyone that leaving a camera exposed on the internet is a bad idea"
It should be; but it isn't. And many users don't even know they have done something stupid and potentially dangerous.
Every reader here should know but why would Joe Public? I don't recall any public information campaigns or warning stickers on product like there are on cigarettes and for album lyrics.
The UK and Europe have at least enacted legislation to try and prevent people connecting unsecured kit to the net but it's not 100% effective.
I imagine both would be deemed unacceptable in the US for being some sort of 'infringement upon freedom', something only commies, socialists and non-patriots would support.
Re: "It should be obvious to everyone that leaving a camera exposed on the internet is a bad idea"
> Every reader here should know
Should jolly well hope so:
Wed 21 Feb 2018 [1]Rock-a-byte, baby: IoT tot-monitoring camera lets miscreants watch 10,000s of kids online
Mon 29 May 2017 [2]Internet of snitches: Anyone who can sniff 'Thing' traffic knows what you're doing
Thu 9 Mar 2017 [3]Oops! 185,000-plus Wi-Fi cameras on the web with insecure admin panels
Thu 3 Sep 2015 [4]IoT baby monitors STILL revealing live streams of sleeping kids
Thu 20 Nov 2014 [5]Webcam hacker pervs in MASS HOME INVASION
Sun 17 Aug 2014 [6]Boffins find hundreds of thousands of woefully insecure IoT devices
7th February 2012 17:01 GMT [7]TRENDnet home security camera flaw exposes thousands
Then I got bored and tried Ars Technica
Jan 11, 2011 [8]Peep show: inside the world of unsecured IP security cameras but I missed the El Reg bite and stopped.
[1] https://www.theregister.com/2018/02/21/mi_cam_flaws/
[2] https://www.theregister.com/2017/05/29/internet_of_snitches_anyone_who_can_get_your_traffic_knows_what_youre_doing/
[3] https://www.theregister.com/2017/03/09/185000_wifi_cameras_naked_on_net/
[4] https://www.theregister.com/2015/09/03/baby_monitors_insecure_internet_things/
[5] https://www.theregister.com/2014/11/20/insecure_webcam_peeping_tom_threat/
[6] https://www.theregister.com/2014/08/17/boffins_find_ihundreds_of_thousandsi_of_woefully_insecure_iot_devices/
[7] https://www.theregister.com/Print/2012/02/07/home_video_camera_security_snafu/
[8] https://arstechnica.com/gadgets/2011/01/one-mans-journey-through-the-world-of-unsecured-ip-surveillance-cams/
Finding them isn't quite as simple, but far from impossible
(plus technical-sounding stuff about fingerprinting and finding web APIs)
The "isn't quite as simple" means having to wade through all of the documentation for nmap plugins and nessus scripts?
If anyone has been concerned about these cameras and read up any of the online newstories for the last 25-plus years, they would already know about the equally old tools that searched for open cameras. Back when having a webcam was exciting and cutting edge, finding random ones across the globe was the game to play: after looking out over Sydney Harbour from a deliberately open camera, the next one on the list was probably an office in Hong Kong which let you play with the PTZ.
A good chunk of this story read like the DOHS saying "oh, we were really clever, here are all the things we did, we are worth paying, Sir" rather than "we tried the tools that worked last century - well, after we remembered to download the latest versions".
It all wears rather thin
Chinese espionage campaigns. Blah effing blah.
How about American spying? You think they don't do it? It's reds under the beds again. Oh those bad Commies. But American spying is good clean and benefits the spied upon.
As the USA imposes tariffs against supposedly friendly countries, an act of economic war, don't think the USA is on 'our' side. It isn't. We should kick all American technology companies out of Europe.