The Jerusalem Post

Cyber experts identify serious security flaw in digital cameras

- • By EYTAN HALON

The latest models of digital cameras are increasing­ly vulnerable to ransomware and malware attacks through their USB and WiFi connectivi­ty, researcher­s at leading Israeli cybersecur­ity company Check Point Software Technologi­es revealed on Sunday.

Check Point Research, the threat intelligen­ce arm of the company, discovered vulnerabil­ities in the internatio­nally standardiz­ed protocol for the transfer of digital images from camera to PC, known as the Picture Transfer Protocol (PTP).

The protocol has evolved in recent years from digital image transfer alone to a range of different commands to support tools, such as the capture of live photos and upgrading the camera’s firmware.

Containing sensitive content with highly personal and emotional value, digital cameras are a lucrative target for malicious hackers who successful­ly identify vulnerabil­ities and can even demand a ransom to release picture files.

Using Canon’s EOS 80D DSLR camera, equipped with both USB and WiFi connectivi­ty, researcher­s discovered multiple critical vulnerabil­ities in the PTP. As the protocol is standardiz­ed and embedded in other leading camera brands, researcher­s believe similar vulnerabil­ities can also be found in other leading vendors.

Researcher­s found that for users transferri­ng photos via public WiFi networks, attackers in close proximity to the camera could “easily” establish a rogue WiFi access point by sniffing the Internet network and then bearing the same name as the one used by the camera to automatica­lly connect, thereby enabling hackers to infect the device with malware and ransomware.

In the case of USB connection­s, attackers that have already hacked the user’s PC can exploit the connection to infect the camera.

“Any ‘smart’ device, including the DSLR camera, is susceptibl­e to attacks,” said Check Point security researcher Eyal Itkin.

“Cameras are no longer just connected to the USB, but to the WiFi network and its surroundin­g environmen­t. This makes them more vulnerable to threats as attackers can inject ransomware into both the camera and the PC it is connected to. The photos could end up being held hostage until the user pays the ransom for them to be released.”

Check Point, which presented its findings at the DEF CON hacking conference in Las Vegas on Sunday, informed Canon prior to the presentati­on and worked together to patch the vulnerabil­ities in an update released last week.

“At this point, there have been no confirmed cases of these vulnerabil­ities being exploited to cause harm,” Canon said in the update published on August 6.

To avoid infection, Check Point researcher­s recommend that camera owners verify that their device is using the latest firmware version, turning off the camera’s WiFi when not in use and refraining from connecting cameras to public WiFi networks.

 ?? (Wolfgang Rattay/Reuters) ?? CHECK POINT RESEARCH discovered vulnerabil­ities in the internatio­nally standardiz­ed protocol for the transfer of digital images from camera to PC.
(Wolfgang Rattay/Reuters) CHECK POINT RESEARCH discovered vulnerabil­ities in the internatio­nally standardiz­ed protocol for the transfer of digital images from camera to PC.

Newspapers in English

Newspapers from Israel