News

Unpatched vulnerability in AVTECH cameras: hackers are taking over devices to create botnets.

Unpatched vulnerability in AVTECH cameras: hackers are taking over devices to create botnets.

Citizen Sec

@CitizenSec , 05-09-2024

News
#Information Security
#Critical vulnerability
Unpatched vulnerability in AVTECH cameras: hackers are taking over devices to create botnets.

Serious vulnerabilities have been discovered in AVTECH surveillance cameras, which malicious actors use to infect devices with malware. The vulnerability, identified as CVE-2024-7029, is related to the brightness adjustment function in AVTECH cameras and allows dangerous commands to be executed remotely.


The American Cybersecurity and Infrastructure Security Agency (CISA) stated that a successful attack could allow an attacker to input and execute commands on behalf of the device owner. The issue remains unresolved and affects AVM1203 model cameras with firmware versions up to and including FullImg-1023-1007-1011-1009. Although these cameras are no longer produced, they are still used in commercial and medical institutions, as well as in the transportation sector.


Akamai reports that attacks have been occurring since March 2024, although evidence of the vulnerability has been known since February 2019. The vulnerability did not have an official identifier code until this month. The main goal of the attackers is to create a botnet that can use devices to distribute malware.


To protect against this threat, it is recommended to update the camera firmware to the latest version if possible and to follow the manufacturer's recommendations. It is also important to regularly check your devices for suspicious activity and use network firewalls for protection.This situation once again underscores the importance of timely software updates and careful monitoring of connected devices in the network.


You will be interested

Special edition
#Information Security

Как защитить детей в цифровом мире: почему безопасность в интернете — это важно

Современные дети растут в эпоху цифровых технологий — смартфоны, планшеты, социальные сети и онлайн-игры стали неотъемлемой частью их жизни. Интернет открывает массу возможностей для учёбы, творчества и общения, но вместе с этим приносит и серьёзные риски.

@citizensec

30-05-2025
Article
#Information Security

Регламент по использованию корпоративной электронной почты

Правила использования корпоративной почты: что разрешено, что запрещено, меры безопасности и ответственность.

@CitizenSec

19-05-2025
Special edition
#Information Security

Women in cybersecurity from Kazakhstan

The special edition is dedicated to women in cybersecurity who overcome challenges, inspire others, and make the world safer. We share the stories of three professionals, their paths in cybersecurity, career advice, and tips on online security. Learn how to start your journey in cybersecurity and grow in this dynamic field.

@citizensec

03-05-2025
News
#Information Security

Attention to Everyday IT Tools: New Tactic of a Chinese Spy Group

Microsoft Warns: Chinese Spy Group Uses Everyday IT Tools to Hack Networks

@turin.medet

06-03-2025
News
#Information Security
#Critical vulnerability

Zebo-0.1.0 and Cometlogger-0.1: Dangerous Programs Stealing Data and Controlling Computers

Experts have discovered two dangerous programs that seem harmless at first. These programs can steal personal data, monitor computer activity, and even take control of the system.

@CitizenSec

26-12-2024
News
#Information Security

Postman Workspaces Expose Over 30,000 API Keys and Sensitive Tokens

Thousands of Postman workspaces accidentally revealed sensitive data such as API keys and access tokens. Learn how to secure your API development environment and protect your organization's data.

@CitizenSec

21-11-2024
News
#Information Security

New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency

SteelFox was first identified in August 2023, but its activity has increased markedly. More than 11,000 infection attempts have been recorded in recent months.

@CitizenSec

11-11-2024
News
#Critical vulnerability
#Information Security

Critical vulnerability CVE-2024-43093 threatens the security of Android users

This problem allows hackers to gain unauthorized access to important Android system folders.

@CitizenSec

05-11-2024
News
#Information Security

ChatGPT was persuaded to create an exploit by slipping instructions in 16-bit format

A Mozilla researcher has proposed a new way to bypass content filters in large language models (LM) used to prevent abuse.

@CitizenSec

01-11-2024
News
#Information Security

A new tool to bypass cookie encryption in Google Chrome: how does it work and what does it mean for your online security?

Recently, cybersecurity researcher Alexander Hagen has developed a tool that can bypass a new security feature in Google Chrome called App-Bound Encryption.

@CitizenSec

30-10-2024