Incident: Security Flaws in Chinese Home Security Cameras Sold on Amazon

Published Date: 2019-09-30

Postmortem Analysis
Timeline 1. The software failure incident with Chinese-made home security cameras being hijacked by hackers was reported in an article published on September 30, 2019 [89502]. Therefore, the software failure incident likely occurred around September 2019.
System 1. ieGeek 1080p and Sricam 720p cameras' app and inbuilt security flaw [89502] 2. Victure 1080p camera's security vulnerability [89502] 3. Vstarcam C7837WIP default username and easily guessable default password [89502]
Responsible Organization 1. Chinese manufacturers of the home security cameras were responsible for causing the software failure incident by producing cameras with serious security flaws that allowed hackers to hijack them [89502]. 2. Amazon was also responsible for the software failure incident as they were promoting and selling these vulnerable cameras on their platform despite the known security issues [89502].
Impacted Organization 1. Families and children using the Chinese-made home security cameras marketed as baby monitors were impacted by the software failure incident [89502].
Software Causes 1. Weak passwords and security flaws in the software of the Chinese-made home security cameras allowed hackers to hijack the cameras and spy on families and children [89502]. 2. Inbuilt security flaws in the ieGeek 1080p and Sricam 720p cameras allowed WiFi passwords to be sent unencrypted over the internet, enabling hackers to access and control the cameras [89502]. 3. The Victure 1080p camera had vulnerabilities that made it worryingly simple for hackers to gain root access, giving them complete control of the camera [89502]. 4. Default username and easily guessable default password settings in the Vstarcam C7837WIP camera violated security best practices, allowing hackers to control the camera [89502].
Non-software Causes 1. Weak passwords used in the cameras allowed hackers to easily gain access and control them [89502]. 2. Default usernames and easily guessable default passwords were set in some cameras, making them vulnerable to hacking [89502]. 3. Lack of quality control in the manufacturing process of the cameras, leading to serious security flaws [89502]. 4. Failure of the Chinese manufacturers to address the security flaws in their products despite being alerted by researchers [89502]. 5. Inadequate scrutiny of products by online marketplaces like Amazon before endorsing and selling them [89502].
Impacts 1. Hackers were able to hijack Chinese-made home security cameras marketed as baby monitors, allowing them to spy on families and children in their own homes by accessing and controlling the cameras remotely [89502]. 2. Users reported instances of strangers viewing their families and speaking to them through the camera's microphone, causing fear and discomfort [89502]. 3. The security flaws in the cameras allowed hackers to gain root access, giving them complete control over the devices [89502]. 4. Researchers discovered that default usernames and easily guessable passwords were set on some cameras, making them vulnerable to hacking [89502]. 5. The software failure incident raised concerns about the lack of quality control in these products, risking people's security and privacy [89502].
Preventions 1. Implementing strong password policies and encryption mechanisms to secure WiFi passwords and user credentials [89502]. 2. Conducting thorough security testing and audits on IoT devices before they are marketed and sold to consumers [89502]. 3. Enforcing stricter quality control measures on products sold on online marketplaces like Amazon to ensure they meet security standards [89502]. 4. Promptly addressing and fixing reported security vulnerabilities in IoT devices to prevent exploitation by hackers [89502]. 5. Enhancing communication and collaboration between consumer rights organizations like Which? and manufacturers to address security flaws in products [89502].
Fixes 1. Implementing stronger security measures such as encryption for WiFi passwords to prevent unauthorized access to the cameras [89502]. 2. Conducting thorough security testing and audits on IoT devices before they are marketed and sold to ensure they meet security standards [89502]. 3. Enforcing stricter regulations and standards for IoT devices to protect consumer privacy and security [89502].
References 1. Consumer experts at Which? [89502] 2. Amazon reviewers [89502] 3. US-based security expert [89502]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to security flaws in home security cameras being promoted on Amazon has happened again within the same organization or with its products and services. The incident involved Chinese-made home security cameras, such as the ieGeek 1080p, Sricam 720p, Victure 1080p, and Vstarcam C7837WIP, which were marketed as providing safety to families and babies but had serious security vulnerabilities. These vulnerabilities allowed hackers to access and control the cameras, leading to privacy breaches and potential spying on users [89502]. (b) The software failure incident related to security flaws in home security cameras has also occurred with products from multiple organizations. The article mentions that the Victure Baby Monitor Pet WiFi Camera, listed at £19.99, had a similar issue where a user reported hearing a voice saying 'hello' from the device's speaker, causing chills. Additionally, a US-based expert identified critical security flaws in cameras like the Elite Security and Accfly Camhi APP Outdoor Security Camera 1080P, indicating that the problem extends beyond just one organization's products [89502].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the security flaws found in the Chinese-made home security cameras marketed as baby monitors. The cameras had serious security issues, including weak passwords and unencrypted transmission of WiFi passwords over the internet, allowing hackers to access and control the cameras to spy on families [89502]. (b) The software failure incident related to the operation phase is demonstrated by instances where hackers were able to remotely access and take control of the security cameras, leading to privacy breaches and unauthorized surveillance of families. Users reported incidents where strangers were viewing their families and speaking through the camera, causing distress and invasion of privacy [89502].
Boundary (Internal/External) within_system (a) The software failure incident related to the Chinese-made home security cameras being hijacked by hackers can be categorized as within_system failure. The failures, including weak passwords and inbuilt security flaws in the cameras, allowed hackers to access and control the cameras to spy on families and children [89502]. The security issues, such as unencrypted transmission of WiFi passwords over the internet and default usernames and passwords, were internal to the system design and implementation, contributing to the vulnerability exploited by hackers.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: The software failure incident in this case was primarily due to weak passwords and serious security flaws in the Chinese-made home security cameras marketed as baby monitors. These vulnerabilities allowed hackers to hijack the cameras and spy on families and children in their homes without human participation in the hacking process [89502]. (b) The software failure incident occurring due to human actions: Human actions also played a significant role in the software failure incident. For example, the default username and easily guessable default password set by the manufacturers for the Vstarcam C7837WIP camera contributed to the security breach. Additionally, the practice of writing passwords and usernames clearly on the side of the product and uploading them online alongside reviews by users also facilitated the exploitation of the cameras by hackers [89502].
Dimension (Hardware/Software) hardware, software (a) The software failure incident occurring due to hardware: - The article reports that Chinese-made home security cameras, marketed as baby monitors, were found to have serious security issues, including weak passwords and inbuilt security flaws [89502]. - Researchers found that WiFi passwords were sent unencrypted over the internet, allowing hackers to access and control the cameras remotely [89502]. - Some of the cameras had passwords and usernames written clearly on the side of the product, making it easier for unauthorized access [89502]. (b) The software failure incident occurring due to software: - The software failure incidents in the article were primarily due to software vulnerabilities such as weak passwords, unencrypted transmission of data, and inbuilt security flaws in the cameras [89502]. - Hackers were able to exploit these software vulnerabilities to gain control of the cameras and spy on families and children in their homes [89502]. - The article highlights that the software flaws in the cameras allowed hackers to remotely access and control the devices, posing serious security risks to users [89502].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident reported in the articles is malicious in nature. Hackers were able to hijack Chinese-made home security cameras, marketed as baby monitors, by exploiting serious security flaws such as weak passwords and unencrypted transmission of WiFi passwords over the internet. This allowed hackers to access and control the cameras, leading to incidents where strangers were able to view and speak to families through the cameras, causing distress and privacy violations [89502]. The incident involved unauthorized access and control of the devices with the intent to spy on individuals and potentially steal personal data, indicating a malicious objective behind the software failure.
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident related to the security cameras being hijacked by hackers on Amazon can be attributed to poor decisions made by the manufacturers and sellers. The cameras had serious security flaws such as weak passwords, unencrypted transmission of WiFi passwords, default usernames and passwords, and easily guessable credentials. These poor decisions by the manufacturers led to the vulnerability of the cameras, allowing hackers to access and control them remotely [89502].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident related to development incompetence is evident in the security flaws found in Chinese-made home security cameras marketed as baby monitors on Amazon. The cameras had serious security issues such as weak passwords, unencrypted transmission of WiFi passwords over the internet, default usernames and easily guessable passwords, and a lack of quality control in the products [89502]. (b) The software failure incident related to accidental factors includes instances where hackers were able to hijack the cameras due to the security vulnerabilities present in the devices. For example, hackers could access and control the cameras remotely, leading to incidents where strangers were viewing families and speaking through the camera without authorization [89502].
Duration temporary The software failure incident related to the security flaws in Chinese-made home security cameras being promoted on Amazon can be categorized as a temporary failure. The failure was due to contributing factors introduced by certain circumstances, such as weak passwords and security vulnerabilities in the cameras, allowing hackers to hijack and control them [89502]. The incident was not a permanent failure caused by all circumstances but rather specific vulnerabilities in the software and design of the cameras.
Behaviour crash, omission, value, other (a) crash: The software failure incident in the articles can be categorized as a crash. The cameras' software vulnerabilities allowed hackers to take control of the wireless cameras, enabling them to spy on families and children in their homes. This loss of control over the cameras' functions and the ability for unauthorized individuals to manipulate them aligns with the definition of a crash where the system loses its state and fails to perform its intended functions [89502]. (b) omission: The software failure incident can also be classified as an omission. The cameras omitted to perform their intended functions of providing security and privacy to families by allowing unauthorized access and control by hackers. This failure to fulfill their primary purpose of safeguarding homes and individuals indicates an omission in the system's performance [89502]. (c) timing: The timing of the software failure incident is not explicitly mentioned in the articles. Therefore, it is unknown if the failure was due to the system performing its intended functions too late or too early. (d) value: The software failure incident can be associated with a failure in value. The cameras, marketed as home security devices and baby monitors, failed to deliver on their promise of safety and privacy. The security flaws in the software allowed hackers to exploit the devices, leading to a breach of privacy and potential harm to the users. This incorrect performance of the intended functions highlights a failure in value [89502]. (e) byzantine: The software failure incident does not exhibit characteristics of a byzantine failure, which involves inconsistent responses and interactions within a system. The incident primarily revolves around security vulnerabilities that allowed unauthorized access and control, rather than erratic or inconsistent behavior [89502]. (f) other: The software failure incident can be further described as a failure in security integrity. The vulnerabilities in the software of the cameras compromised the security and privacy of users, leading to unauthorized access and control by hackers. This breach in security integrity resulted in a significant risk to the safety and privacy of individuals, highlighting a failure beyond the typical categories of software failures [89502].

IoT System Layer

Layer Option Rationale
Perception sensor, network_communication, embedded_software (a) sensor: The software failure incident related to the Chinese-made home security cameras being hijacked by hackers can be attributed to sensor error. The cameras had security flaws where WiFi passwords were sent unencrypted over the internet when requested, allowing hackers to access and control the cameras [89502]. (b) actuator: The incident did not specifically mention any failures related to actuator errors. (c) processing_unit: The software failure incident did not directly involve failures related to processing errors. (d) network_communication: The failure in this incident can be linked to network communication errors as the security issues with the cameras allowed hackers to remotely access and control the devices over the internet [89502]. (e) embedded_software: The failure can also be associated with embedded software errors as the cameras had vulnerabilities that allowed hackers to gain root access and complete control of the devices [89502].
Communication link_level, connectivity_level The software failure incident reported in the articles is related to the communication layer of the cyber physical system that failed at both the link_level and connectivity_level. 1. At the link_level: - The failure involved weak passwords and security flaws in Chinese-made home security cameras, allowing hackers to control the cameras and spy on families [Article 89502]. - WiFi passwords were sent unencrypted over the internet, making it easy for hackers to access and control the cameras [Article 89502]. - The default username and easily guessable default password in one of the cameras allowed complete control by hackers [Article 89502]. 2. At the connectivity_level: - The failure involved the cameras being part of the Internet of Things (IoT), connecting to the web via WiFi links and being controlled remotely [Article 89502]. - Researchers found it worryingly simple to gain root access to one of the cameras, giving hackers complete control [Article 89502]. - A critical security flaw was exposed that could affect a large number of cameras, allowing hackers to steal personal data and spy on homes [Article 89502].
Application TRUE The software failure incident described in the articles is related to the application layer of the cyber physical system. This failure was due to serious security issues with the Chinese-made home security cameras, specifically the ieGeek 1080p, Sricam 720p, Victure 1080p, and Vstarcam C7837WIP cameras. The vulnerabilities in these cameras allowed hackers to access and control them, leading to unauthorized access to families' homes and the ability to spy on them. The flaws included weak passwords, unencrypted transmission of WiFi passwords over the internet, default usernames and easily guessable passwords, and the ability to gain root access to the devices, giving hackers complete control [89502].

Other Details

Category Option Rationale
Consequence property (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident involving Chinese-made home security cameras being promoted on Amazon despite being hijacked by hackers resulted in serious security issues. Hackers were able to access and control the wireless cameras, allowing them to spy on families and children in their own homes. This breach of security led to instances where strangers were able to view families and speak to them through the camera's microphone, causing significant distress to the users [89502]. Additionally, the software flaws allowed hackers to gain root access to the cameras, giving them complete control over the devices [89502]. The security vulnerabilities in these cameras not only compromised the privacy and safety of the users but also put their personal data at risk, highlighting the impact on people's material goods and data due to the software failure.
Domain information The software failure incident reported in the articles is related to the industry of **information**. The incident involves Chinese-made home security cameras, often marketed as baby monitors, being promoted on Amazon despite being hijacked by hackers due to serious security flaws such as weak passwords and unencrypted transmission of WiFi passwords over the internet [Article 89502]. These cameras are part of the Internet of Things (IoT) category, which connects products to the web for remote control through various devices like smartphones, tablets, and home hubs [Article 89502]. The security vulnerabilities in these cameras allowed hackers to spy on families and control the devices remotely, posing a significant risk to users' privacy and security.

Sources

Back to List