NewsSecurity News

HiatusRAT Actors Targeting Web Cameras and DVRs

The Federal Bureau of Investigation (FBI) is issuing an Private Industry Notification (PIN) to bring attention to HiatusRAT1 scanning campaigns targeting Chinese-branded web cameras and DVRs.

HiatusRAT is a Remote Access Trojan (RAT) that has likely been in use since July 2022. Cybercriminals frequently utilize RATs to remotely access and control targeted devices. Initially, the Hiatus campaign focused on exploiting outdated network edge devices.

In March 2024, HiatusRAT operators launched a scanning campaign aimed at Internet of Things (IoT) devices across the United States, Australia, Canada, New Zealand, and the United Kingdom. The campaign targeted web cameras and DVRs, exploiting vulnerabilities such as CVE-2017-7921, CVE-2018-9995, CVE-2020-25078, CVE-2021-33044, CVE-2021-36260, and weak default passwords supplied by vendors.

Many of these vulnerabilities remain unpatched by the vendors. The attackers specifically focused on Xiongmai and Hikvision devices with telnet access, employing Ingram, a webcam-scanning tool available on GitHub, and Medusa, an open-source brute-force authentication tool, to compromise Hikvision cameras. The targeted TCP ports included 23, 26, 554, 2323, 567, 5523, 8080, 9530, and 56575.

Further details can be found at https://www.ic3.gov/CSA/2024/241216.pdf

Kerry Dean

Kerry is a Content Creator at www.systemtek.co.uk she has spent many years working in IT support, her main interests are computing, networking and AI.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.