LIVE NEWS
  • Visionary NPR leader Kevin Klose has died : NPR
  • UN experts urge member states to suspend Israel arms transfers | United Nations News
  • Israeli start-up makes world’s first lab-grown chocolate bar
  • Space Force Urges Industry to Invest in Satellite Production
  • Breath carries clues to gut health
  • Why has Italy’s Giorgia Meloni suspended a defence pact with Israel? | US-Israel war on Iran News
  • Enjin Price Prediction: ENJ Pumping, But Why?
  • Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Wartime Usage of Compromised IP Cameras Highlight Their Danger
Cybersecurity

Wartime Usage of Compromised IP Cameras Highlight Their Danger

primereportsBy primereportsMarch 27, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Wartime Usage of Compromised IP Cameras Highlight Their Danger
Share
Facebook Twitter LinkedIn Pinterest Email


Compromised Internet-connected cameras — once the fodder of botnet operators and online voyeurs — have become an important military asset in recent conflicts, with Russian and Ukrainian forces hacking cameras to gather intelligence on the other side, Iran using compromised devices for targeted strikes, and a joint US-Israeli mission reportedly relying on connected cameras for the successful strike on Iran’s leader.

In the latest incident, Israel and the US reportedly hijacked Iran’s network of traffic cameras, which the government used to surveil protesters and to track the movements of Iranian leader Ayatollah Ali Khamenei prior to targeting him with an air strike, killing him on Feb. 28, according to reports this month by the Financial Times and the Associated Press. Following that attack, Iran responded by increasing its attempts to gain eyes in Israel, Qatar, Bahrain, Kuwait, the United Arab Emirates, and Cyprus, according to a report from Israeli cybersecurity firm Check Point Software.

Related:Intermediaries Driving Global Spyware Market Expansion

The shift in focus highlights that attacks on IP cameras have evolved, exploiting vulnerabilities and co-opting the connected devices for botnets to much more serious compromises for intelligence gathering, says Noam Moshe, a lead vulnerability researcher with Claroty, a cyber-physical security firm.

“I really do believe that there has been a shift … to actually exploiting and controlling these devices, both for military and intelligence reasons, [as well as] for propaganda and political division,” he says.

Compromising IP cameras used to be an activity limited to demonstrations of lax attack surfaces, the buildout of device-based botnets by cybercriminals, and the invasion of private spaces by hackers. However, the increasing use by nation-states as a cheap way to create a point of presence in an enemy nation underscores that organizations need to take the threat seriously, says Sergey Shykevich, threat intelligence group manager at Check Point Research.

“Access to cameras provides attackers with direct visibility into targeted territories,” he says. “The biggest mistake is to leave those cameras unpatched when there are available patches or leaving the default manufacturing credentials.”

Hacked IP Cameras Offer Eyes on the Inside

While attacks on cyber-physical systems have been considered serious but not necessarily valuable to date — with a few exceptions, such as the Stuxnet attack and the early days of Russia’s invasion of Ukraine — the wartime use of IP cameras to aid targeting inside enemy territory and gauge the damage inflicted following attacks has considerable more value to nation-states.

Related:At RSAC, the EU Leads While US Officials Are Sidelined

In addition, as the US and Israel’s war with Iran continues, the Iranian government appears to have widened its targeted to include the private sector — a tactic it has used before — as well as industrial controllers, such as SCADA and PLCs, says Claroty’s Moshe.

Rather than focus on targeting specific organizations inside countries, Iran’s proxies are widening their scans and looking for vulnerable cyber-physical devices — especially IP cameras and industrial control systems — in specific countries, he says.

“We are seeing a big shift to opportunistic attacks, where Iran and other affiliated nations simply look for any exposed device that is affiliated with a specific country,” Moshe says. “That increases the likelihood of companies that we [otherwise wouldn’t think] of being a target of a nation-state … essentially being caught in the cost crossfire simply because their assets are exposed and they are inside the wrong ‘country.'”

The result is that targeting a specific nation’s IP camera infrastructure is relatively uncommon, according to experts.

In addition, camera and Internet of Things (IoT) device makers have become better at securing their products. Instead, the most common insecure devices connected to the Internet are self-managed consumer devices, says Silas Cutler, a principal security researcher at Censys, an Internet intelligence firm.

Related:Blame Game: Why Public Cyber Attribution Carries Risks

“Enterprise deployments, such as those found in large organizations or government agencies, are rare, as these are often managed within private networks,” he says.

Legacy, Shadow Devices at Risk

Legacy devices that are inadvertently connected to the Internet are the most common reason that a camera may be exposed to compromise, Cutler says. In addition, many governments provide some access to traffic cameras for public benefit, and that could also lead to compromise.

Companies should worry about outdated and shadow technology that is connected to the public Internet, he says. In addition, they should actively scan for known vulnerable cameras and devices in their networks.

If they can detect a compromise, companies do have time to reduce the blast radius of an attack, because in most cases, a hacked device has to be analyzed to be used, says Moshe, who presented four vulnerabilities in Axis cameras at the Black Hat USA session in August.

“It is important to know that, when cameras are found through scanning, it requires time and analysis to prepare before practical use,” he says. “Once an attacker finds an exposed camera, further analysis is often required to understand exactly where the camera is monitoring and what information can be obtained from it.”

Defense in depth continues to be the ally of enterprises. Companies should scan their own IP address ranges to find unprotected devices and patch the devices that they do know about, says Check Point’s Shykevich.

“To reduce risk, companies should maintain strong cyber hygiene by regularly patching systems and enforcing robust password practices,” he says. “In addition, placing IoT devices behind perimeter protections such as firewalls with intrusion prevention capabilities adds an extra layer of defense.”



Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSen. Warren says Fed nominee Kevin Warsh would be Trump rubber stamp
Next Article a16z’s Guy Wuollet says crypto is leaving hoodie phase for ‘collared shirt’ decade
primereports
  • Website

Related Posts

Cybersecurity

Sweden Blames Pro-Russian Group for Cyberattack Last Year on Its Energy Infrastructure

April 15, 2026
Cybersecurity

Sitehop’s SAFEcore Edge enables ultra-low-latency, hardware-enforced post-quantum encryption

April 15, 2026
Cybersecurity

Microsoft drops its second-largest monthly batch of defects on record

April 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Visionary NPR leader Kevin Klose has died : NPR
  • UN experts urge member states to suspend Israel arms transfers | United Nations News
  • Israeli start-up makes world’s first lab-grown chocolate bar
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.