![]() ![]() It said 97 customers, or less than two percent of its approximate 6,000 customer base, had their cameras accessed and video or image data viewed. Verkada confirmed the hackers “compromised” its platform on March 8 and 9, 2021. A user name and password for an administrator account was publicly exposed on the internet, allowing the hackers access. They used a “Super Admin” account that allowed them to view all of Verkada customers’ cameras. “It’s just wild how I can see the things we always knew were happening, but we never got to see them.”Īccording to Kottman, the group used unsophisticated methods to gain access to Verkada’s servers. The hack “exposes just how broadly we’re being surveilled, and how little care is put into at least securing the platforms used to do so, pursuing nothing but profit,” Kottmann said. The group’s reasons for hacking are “lots of curiosity, fighting for freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism-and it’s also just too much fun not to do it.” Kottman’s press release took credit for hacking Intel Corporation and Nissan Motor Company. The intent behind the breach was to show the pervasiveness of video surveillance and the ease with which such systems can be compromised. Kottman said the breach was carried out by an international hacker collective. ![]() The incident was reported in March 2021 after a hacker identified as Tillie Kottmann contacted Bloomberg News with details about the hack. They got into cameras at schools, prisons, police departments, hospitals, and other companies. Swiss hacker Tillie Kottmann, who was associated with the hack, told Bloomberg why they did it: “lots of curiosity, fighting for freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism-and it’s also just too much fun not to do it.Share: Share on Twitter Share on Facebook Share on G+ Share with emailĪn international group of hackers gained access to the security cameras at 68 organizations that use Silicon Valley start-up Verkada, Inc. In March, hacktivists breached security-camera startup Verkada, exposing footage from more than 150,000 organizations, including Tesla, Cloudflare, schools, jails, hospitals, and police stations. Many such acts tend to be politically motivated, but a few also expose ways in which technology can be used against people. Some of those were recorded during the Capitol Hill riot. At the beginning of January, DDoSecrets released a collection of more than a million videos downloaded by a hacktivist from the right-wing social network Parler. GabLeak is just one of the many recent incidents. “2020 set a record for the most information leaked to the public in a single year, one that was quickly smashed by the first months of 2021," wrote DDoSecrets co-founder Emma Best. In the past few months, the volume of data made public by hacktivists skyrocketed, because companies are hosting a lot more data compared to several years ago. This data was leaked to transparency collective Distributed Denial of Secrets (DDoSecrets), which now makes it available to journalists and researchers upon request. At the end of February, a hacktivist who calls themself “JaXpArO and My Little Anonymous Revival Project” breached far-right social media platform Gab, pulling out 70 gigabytes of data from the backend databases.The attacker obtained user profiles, private posts, and chat messages written by users that include white supremacists, supporters of the QAnon movement, neo-Nazis, and conspiracy theorists, some of whom were associated with the Capitol Hill riot on January 6. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |