Camfecting
Camfecting, in the field of computer security, is the process of attempting to hack into a person's webcam and activate it without the webcam owner's permission.[1] The remotely activated webcam can be used to watch anything within the webcam's field of vision, sometimes including the webcam owner themselves. Camfecting is most often carried out by infecting the victim's computer with a virus that can provide the hacker access to their webcam. This attack is specifically targeted at the victim's webcam, and hence the name camfecting, a portmanteau of the words camera and infecting.
Typically, a webcam hacker or a camfecter sends his victim an innocent-looking application which has a hidden Trojan software through which the camfecter can control the victim's webcam. The camfecter virus installs itself silently when the victim runs the original application. Once installed, the camfecter can turn on the webcam and capture pictures/videos. The camfecter software works just like the original webcam software present in the victim computer, the only difference being that the camfecter controls the software instead of the webcam's owner.
Notable cases
Marcus Thomas, former assistant director of the FBI's Operational Technology Division in Quantico, said in a 2013 story in The Washington Post that the FBI had been able to covertly activate a computer’s camera — without triggering the light that lets users know it is recording — for several years.[2]
In November 2013, American teenager Jared James Abrahams pleaded guilty to hacking over 100-150 women and installing the highly invasive malware Blackshades on their computers in order to obtain nude images and videos of them. One of his victims was Miss Teen USA 2013 Cassidy Wolf.[3]
Researchers from John Hopkins University have shown how to covertly capture images from the iSight camera on MacBook and iMac models released before 2008, by reprogramming the microcontroller's firmware.[4]
Preventative software
Recently webcam privacy software has been introduced by such companies such as Stop Being Watched or Webcamlock. The software exposes access to a webcam, and prompts the user to allow or deny access by showing what program is trying to access the webcam. Allowing the user to accept a trusted program the user recognizes, or terminate the attempt immediately. Other companies on the market such as soomz.io manufacture and sell sliding lens covers that allow users to retrofit the computer and close access to the camera lens.
Risk sources
A computer that does not have a reasonably up-to-date webcam software or any anti-virus (or firewall) software installed and operational may be at increased risk for Camfecting. Softcams may nominally increase this risk, if not maintained or configured properly.
References
- ↑ Kiyuna, A.; Conyers, L. CYBERWARFARE SOURCEBOOK. Lulu.com. p. 33. ISBN 9781329063945.
- ↑ Timberg, Craig. "FBI's search for 'Mo,' suspect in bomb threats, highlights use of malware for surveillance". Washington Post. Archived from the original on 21 December 2013. Retrieved 7 December 2013.
- ↑ Moss, Caroline (March 18, 2014). "Hacker Who 'Sextorted' Miss Teen USA Gets 18 Months In Prison". Business Insider. Retrieved March 19, 2014.
- ↑ Soltani, Ashkan (18 December 2013). "Research shows how MacBook Webcams can spy on their users without warning". Retrieved 27 September 2016.
See also
External links
- Protection software for Windows: Mywebcamlock
- Protection software for OSX: Camera Lock
- Physical protection: Sliding Lens Cover
- Web cam hacking virus alert
- Web cam virus writer arrested in Spain
- Webcam under hacker's control
- Data Privacy Day