Thursday, February 27, 2025
HomePoCHackers can use Surveillance Cameras and Infrared Light to Transfer Signals to...

Hackers can use Surveillance Cameras and Infrared Light to Transfer Signals to Malware

Published on

SIEM as a Service

Follow Us on Google News

Organizations use to protect their internal networks from Internet attacks by using firewalls, intrusion detection systems(IDSs) and intrusion prevention systems (IPSs). For a higher degree of protection, so-called ‘air-gap‘ isolation is used.

Once the malware deployed attackers try to establish communication over the covert channel to bypass IPS, IDS, and Firewalls. Over the years various covert channels used by attackers.

Security researchers from Ben-Gurion University of the Negev (BGU) introduced a new covert channel which uses the Infrared and Surveillance camera as a Communication Channel and they Named as aIR-Jumper.

Targeting air-gapped Computers

Air-gap computers need to be compromised with Malware by using Social Engineering methods are by using Insiders. Once deployed malware search for Surveillance camera by using Open ports, IP address and MAC header Response.

Once network mapped malware tries to connect with cameras by stealing the password from Computer or by exploiting the vulnerability to control the IR LEDs. Researchers published a PoC explaining technical details.

Also Read AES-256 keys can be sniffed within Seconds Using €200 Worth Hardware kit

Data Exfiltration and Infiltration – Surveillance Cameras

With Exfiltration scenario, Malware that presents inside the organization can get to the surveillance cameras across the local network and controls the IR illumination.

Then it transfers sensitive data like PIN codes, passwords, and encryption keys are then modulated, encoded and transmitted over the IR signals.An attacker who is sitting in the line of sight can retrieve these IR signals and decode it.

Many surveillance and security cameras monitor public areas which allow attackers to easily establish a line of sight with them.

Researchers said For testing and evaluation, we executed a program which encodes a binary file and transmits it by means of the IR LEDs. The program catches the camera’s IP, the encoding along with the IR intensities’ (amplitudes) timing parameters and the binary file to transmit.

Infiltration

With the infiltration scenario, an attacker standing in a public area uses IR LEDs to send hidden signals to the surveillance camera(s). Binary data such as command and control (C&C) and beacon messages are encoded on top of the IR signals.

The signals covered in the video stream are then intercepted and decoded by the malware residing on the network. The exfiltration and infiltration can be combined to establish bidirectionally, ‘air-gap’ communication between the compromised network and the attacker.

Since surveillance cameras can receive light in the IR wavelength, it is conceivable to deliver data into the organization through the video stream recorded by the surveillance cameras, using covert IR signals.

Detection and Countermeasures

Detection can be done at the network level by deep packet inspection, by monitoring the network traffic from hosts in the network to the surveillance cameras.

Disabling the IR LEDs in the surveillance cameras may prevent the exfiltration channel presented in this paper.

The infiltration channel can be prevented by adding an IR filter to the surveillance camera.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection...

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from...

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

RSync Vulnerabilities Allow Hackers to Take Full Control of Servers – PoC Released

A series of critical security vulnerabilities in the widely-used Rsync file synchronization tool have...

Parallels Desktop 0-Day Exploit Enables Root Privileges – PoC Released

A critical zero-day vulnerability in Parallels Desktop virtualization software has been publicly disclosed after...

PoC Exploit Released for F5 BIG-IP Command Injection Vulnerability

Security researchers have disclosed critical details about CVE-2025-20029, a command injection vulnerability in F5’s BIG-IP...