Cyberwar continues: video cameras have become a new weapon in the conflict between Israel and Palestine

Carding 4 Carders

Professional
Messages
2,731
Reputation
12
Reaction score
1,362
Points
113
How do RTSP protocol vulnerabilities help hacktivists wreak havoc behind enemy lines?

After the Hamas attacks on Israel, not only physical but also cyber warfare developed between the warring parties . Hacktivists have already attacked industrial monitoring and data collection systems, and now they have chosen a new target — poorly protected video surveillance cameras.

Researchers have found at least 165 cameras in Israel that use the RTSP protocol. In Palestine, there are also such devices — about 29 of them. It is quite difficult to cover the entire territory, so there may actually be many more vulnerable objects.

RTSP is a protocol that allows you to transmit video in real time, but does not provide either encryption or password protection. According to experts, even a novice hacker armed with widely available tools and manuals can hack such a system. And RTSP cameras pose a number of threats in a cyberwar environment.

Most of the open cameras were found in major cities — Tel Aviv, Petah Tikva and Rishon Lezion. In Palestine, they are concentrated in the West Bank, possibly due to power supply restrictions in the Gaza Strip.

These devices can be exploited by politically motivated hackers for surveillance, intelligence gathering, or compromising information. Cameras are especially dangerous in private homes and commercial organizations, as they allow you to spy on people, eavesdrop on personal conversations, and track their movements.

Cybercriminals are more interested in corporate networks of companies and government agencies, which are also easily accessible via RTSP.

Another danger is the deliberate dissemination of disinformation. The video stream can be manipulated to mislead the enemy about the real situation, to sow chaos and panic behind enemy lines.

Finally, like any other "smart" devices, public cameras can be used to create botnets and carry out DDoS attacks.

To prevent such incidents, experts recommend that camera owners protect themselves in advance.

Ideally, IP cameras should work in an isolated segment of the corporate network with configured traffic encryption and the use of modern authorization standards, such as WPA2 or WPA3.

It is critical to set complex, unique passwords without using default passwords. Regular firmware updates will help fix known vulnerabilities.

It is important to restrict access to cameras by IP addresses and protocols, allowing connection only from specific devices and via VPN. Switching to secure protocols like HTTPS will also strengthen security.

Only a comprehensive approach to settings and timely elimination of system gaps will minimize risks and prevent leaks.
 
Top