The Verkada "Hack"? Was Not A Hack

The Verkada "Hack" Was Not A Hack

"With a single breach, those scenes — and glimpses from more than 149,000 security cameras — were suddenly revealed to hackers, who had used high-level log-in credentials to access and plunder Verkada's vast camera network." - Washington Post

.

Last week's Verkada "hack" was not a hack. They left the key under the doormat for the painter to get in while they were away for the weekend. The international hacktivist organization, Advanced Persistent Threat 69420, gained access to the cameras because a super admin username and password had been exposed on the internet and allowed them to see footage from nearly 150,000 cameras. In addition to this, they discovered they could execute custom code and hijack the cameras for future use due to built-in features. It was a breach of data security that resulted from irresponsibility on behalf of the Verkada team and their more prominent clients.


1) Sloppiness with the Verkada team. The alleged hackers used a basic super admin password to access the root systems. Once they were in, they had access to everything.


Verkada could have prevented the breach by using better passwords, MFA, and other fundamental techniques to avoid brute force attacks. But in reality, they left the door unlocked so that the bad guy could stroll right in, which is equivalent to another social dilemma plaguing the country, "I left the key FOB in my new Mercedes, and the car was stolen." As the proverb says, 'Locks keep honest people honest,' and the same goes for digital security.


2) Laziness on the part of the Verkada clients. The clients who use Verkada are "sophisticated" tech companies, who right now need to disclose to the SEC that potentially ALL of their IP has been stolen(for companies that are publicly traded).


The Verkada system is designed to aggregate security data/video from multiple facilities so admins can monitor it from a centralized command center. The Verkada customers were exposed, beyond the data intended for the Verkada system, because they did not segregate their networks adequately. Essentially, the camera monitoring the factory is on the same network as the machine putting the cars together on the factory floor. The camera network should have had multiple barriers from the network that transmits intellectual property.


Like the Solarwinds gap in security, there will be no way to measure the extent of the exposure caused by this gap. While the hacktivist group, who exposed the hack, seem to have good intentions, there is no telling who and how long cybercriminals and malicious actors had access to Verkada's network of cameras. 


For this incident to be considered a hack, it would have to come with the understanding that there was a loophole or vulnerability someone cleverly found their way through. In this case, there was no clever loophole; it was the blatant lack of responsibility that caused the breach. 


 Companies have to start asking an essential, multi-part question. How do we protect our data, our client's data, and the data we put in the hands of third-parties that are providing a product or a service. By adhering to fundamental digital security best practices and reducing its IT footprint, Verkada could have wholly avoided this mishap.

要查看或添加评论,请登录

Michael Abboud的更多文章

  • The Silent Killer

    The Silent Killer

    Corruption: The Silent Killer of Innovation In the fast-paced world of business and technology, innovation is often…

  • Celebrating Innovation: Columbia University Graduate Capstone Project on DigitalBunker365

    Celebrating Innovation: Columbia University Graduate Capstone Project on DigitalBunker365

    As the Executive Sponsor of a Columbia University Graduate Capstone team, I am thrilled to share the culmination of an…

    5 条评论
  • Dreamers Win! With AI at our side, we are only limited by the boundary of our imaginations.

    Dreamers Win! With AI at our side, we are only limited by the boundary of our imaginations.

    The Power of Imagination in the Age of AI In the rapidly evolving landscape of artificial intelligence, the balance of…

  • Is Log4J even worse than you think? Probably…

    Is Log4J even worse than you think? Probably…

    The Log4J Shell is being called the worst security vulnerability in a decade. When you dig into the details…it’s…

  • How to Make Your Office 365 Email More Secure

    How to Make Your Office 365 Email More Secure

    4 easy steps to enhance the security of your company’s email Email remains the primary point of entry for hackers…

    1 条评论
  • Don’t Bring a Sword to a Gun Fight

    Don’t Bring a Sword to a Gun Fight

    As companies continue to splurge on cybersecurity, hackers enjoy record levels of success. There’s a famous scene in…

    2 条评论
  • VPNs are jeopardizing the security of your business

    VPNs are jeopardizing the security of your business

    The Risk. The issue with corporate VPNs is that while they protect data traveling between a personal computer and a…

  • Don’t get burned by your WFH strategy

    Don’t get burned by your WFH strategy

    For most CEOs the possibility of a pandemic was lower on the list than a zombie apocalypse. According to a report on…

  • Fire the "IT Guy"

    Fire the "IT Guy"

    The title to this blog is not going to make any of us at TetherView popular with IT Managers. However, we think it’s…

    1 条评论
  • Compliance is NOT Security

    Compliance is NOT Security

    When we’ve met with organizations after a breach, there’s one thing we hear time and time again from the companies that…

社区洞察

其他会员也浏览了