Nearly a month after a console cowboy identified a security vulnerability in Trendnet streaming IP cameras, Trendnet issued a security advisory. So far there have been 26 vulnerable models identified that allow voyeurs to spy in real time on homes and offices. Since many of the cameras were not registered, this vulnerability may remain an exploitable Peeping Tom paradise for a long time. What happens when a console cowboy identifies a security vulnerability in Trendnet streaming IP cameras? Nearly a month later countless people have snuck in the backdoor without password authentication for a peep show. The vulnerability allows users to tune in and to spy in real-time on thousands of private lives via Trendnet home security cameras. “There does not appear to be a way to disable access to the video stream, I can’t really believe this is something that is intended by the manufacturer. Lets see who is out there :),” wrote user ‘SomeLuser’ on the Console Cowboys blog.Since looking for these Trendnet cameras “manually is boring and tedious,” SomeLuser created a Python script that uses the Shodan search engine to find the URL of web cam video streams, regardless of if it has a password on it or not. By now there are all kinds of lists circulating on forums, pastebin and sites like 4chan, giving armchair surfers unobstructed views into offices, homes, living rooms and kids’ bedrooms.The Verge posted numerous video cam screenshots and noted, “Since the link for each feed is the IP address of the camera appended with the code that allows you to access the stream, it’s not too hard to track down exactly who you’re looking at.”The particular camera that the security bug was discovered in is a discontinued model that sells for around $70, though Someluser says the bug existed in additional models, meaning a wider range of camera owners are vulnerable (including, but perhaps not limited to, models TV-IP110W, TV-IP110WN, TV-IP121WN, and TV-IP410). The leaked feeds were a mix of small businesses – a store entrance or a stack of servers – and private homes. Several of these residential use cameras were aimed at a crib, suggesting that these were being used as baby monitors or even “nanny cams” to monitor childcare workers. None of the homes with cameras appeared to be particularly lavish, which suggests the cameras were not as much for protecting valuable property as they were to monitor residents or employees.Yesterday on 2/6/12, nearly one month after the 1/10/12 vulnerability was posted on Console Cowboys, Trendnet finally issued an IP camera vulnerability notice. “TRENDnet has recently gained awareness of an IP camera vulnerability common to many TRENDnet SecurView cameras. It is TRENDnet’s understanding that video from select TRENDnet IP cameras may be accessed online in real time. Upon awareness of the issue, TRENDnet initiated immediate actions to correct and publish updated firmware which resolves the vulnerability.” “Trendnet SecurView Cameras bought between April of 2010 to the present are believed to be vulnerable.” There are currently 11 camera models listed as affected, but the advisory states that the company will “publish all outstanding firmware within the next 48 hours.” Zak Wood, Trendnet’s director of global marketing, told the BBC, “We first became aware of this on 12 January. As of this week we have identified 26 [vulnerable] models. Seven of the models – the firmware has been tested and released. We anticipate to have all of the revised firmware available this week. We are scrambling to discover how the code was introduced and at this point it seems like a coding oversight.”The company claims it can notify registered users, but many of its customers do not register their IP cameras. That should make voyeurs happy as this vulnerability may be around for a very long time. If you are using such a camera, then update your firmware ASAP! Even before this latest vulnerability, there have been online communities devoted to spying on unprotected or open IP-based camera streams. Way back in 2005, Kevin Poulsen at The Register warned that a simple Google search string could reveal “nearly 1,000 installed network cameras made by Swedish-based Axis Communications, the other turns up about 500 cameras sold by Panasonic.” Ironic, is it not, that a device meant to provide security can decimate both privacy and security?Meanwhile there is a debate underway on if police can conduct public surveillance from video cameras installed on private property. Privacy International published a list of “47 county and state police departments, 10 sheriff’s offices, 12 prosecutor’s and district/state attorney’s offices” who attend the ISS World surveillance industry conferences right “alongside Libyan and Egyptian intelligence agencies….Small town law enforcement seems to be just as fascinated by the new spy technologies as the Bahraini intelligence services.”Like this? Here’s more posts:Hacking For Privacy: 2 days for amateur hacker to hack smart meter, fake readings25 More Ridiculous FBI Lists: You Might Be A Terrorist If . . .Firesheep moment for SCADA: Hacking critical infrastructure systems now as easy as pushing a button?Irony: Surveillance Industry Objects to Spying Secrets & Mass Monitoring LeaksPrivacy Advocates Sue DHS for Big Bro Fake ‘Friends’ Monitoring Social MediaHuge 4th Amendment Win for Privacy: Supreme Court Requires Warrant for GPS TrackingDreamHost database hacked: Change your FTP/shell access and email passwordsDARPA’s Spy Telescope Will Stream Real-Time Video from Any Spot on EarthBusted! DOJ says you might be a felon if you clicked a link or opened emailPrivacy Freaks Rejoice: Privacy to be a ‘Hot Job Skill’ in 2012Social Media Monitoring on Gov’t Steroids: Anything might come back to bite youWoz on smartphones: Wishes his iPhone could do all his Android canData Privacy Day: Social media ‘private’ data is fair game for e-discovery in courtDo you give up a reasonable expectation of privacy by carrying a cell phone? Follow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe