Skip to Content
(Photo 104000219 © Airubon | Dreamstime.com
Security & privacy

Security camera hack: Hackers break into Tesla, jails, hospitals, schools

No matter where we go, we’re under constant surveillance. Cameras are set up everywhere, from restaurants and airports to businesses and hospitals. Plus, many of these cameras have facial recognition technology. This means a security camera hack or breach could expose your comings and goings to the entire world.

Tap or click here for more on facial recognition databases and how they are used. Since high-tech cameras are so valuable, it’s no wonder why hackers see them as enticing targets. A group of hackers recently invaded a security camera company with setups throughout the country.

Hackers accessed live feeds from 150,000 cameras from hospitals, schools and businesses like Tesla and Cloudflare. They exposed people inside women’s health clinics and psychiatric hospitals. Not only that, but hackers say they can see the full video archive of every customer.

Here’s why you should be concerned about this security camera hack

According to security camera company Verkada, over 5,200 organizations use its tech. That includes the Salvation Army, school districts and cities.

The company’s blog boasts of its advanced People Analytics feature. It uses artificial intelligence to give customers high-quality images of everyone on camera.

“From there, users can search and filter based on many different attributes, including gender traits, clothing color, and even a person’s face,” according to a Verkada article.

Can security cameras be hacked? How do hackers access security cameras?  Are your home security cameras at risk of hacking? Yep! This security camera hack exposes a growing trend of everyday surveillance.
There’s also a Face Search tab that lets Verkada customers see thumbnails of people who appeared on camera.

That’s just one of Verkada’s many advanced features. Aside from facial recognition, customers can also take advantage of heatmaps and vehicle detection programs.

At this point, it’s not clear how many customers use these features. Still, it’s safe to say that these cameras provide ample potential for data tracking.

Speaking of tracking, the U.S. Customs and Border Protection collects face maps of travelers in certain American ports. Its recent proposal wants to expand that facial recognition technology to all American ports.

So if you want to travel in 2021, be prepared to share your face with the world. Here’s how that could impact your travel plans — and the future of America.

How did they do it?

Bloomberg first reported this security camera hack. Reporter William Turton said Verkada cameras revealed hospital staffers tackling a man, as well as Tesla workers bustling around an assembly line in Shanghai. “The hackers said they obtained access to 222 cameras in Tesla factories and warehouses,” Turton wrote on Twitter.

He also spoke to hacker Tillie Kottman, who claimed to be part of the hacking collective that broke into Verkada’s network. Formerly known as @nyancrimew, Kottman allegedly sent tweets alluding to the attack. According to Newsweek, they posted this a few days before the hack: “What if we just absolutely ended surveillance capitalism in two days?”

Hacktivists broke into security cameras across the U.S. to expose malpractice. This security camera hack reveals the scope of camera surveillance in public places.
This original tweet has been deleted. Here’s a screenshot of a Twitter thread detailing the hack.

What this security camera hack means for you

Twitter booted Kottman from the platform for their role in the hack. But their social media posts suggest this privacy breach was for political reasons rather than financial ones. Still, Turton’s findings have grim connotations.

“Hackers watched through the camera of a Verkada employee who had set one of the cameras up inside his home,” he wrote on Twitter. “One of the saved clips from the camera shows the employee completing a puzzle with his family.”

Kottman said the hacking collective broke in by stealing credentials to a “super admin” account. These accounts give users full control of Windows. Users can install programs and bolster security settings. Tap or click here for our full guide on admin accounts.

After logging in, the group could easily access all of the cameras … and leak the contents online. Verkada claims it has disabled all administrator accounts.

In the meantime, you should keep a close eye on the security cameras in your own home. Sure, they weren’t involved in this particular hack — but they’re still attractive targets for bad guys. Tap or click here for some security camera safety tips to keep hackers out.

Keep reading

Delete your personal information from this scary site now

Chrome browser vulnerability under attack — Update now

Ask me your digital question!

Navigating the digital world can be intimidating and sometimes downright daunting. Let me help! Reach out today to ask your digital question. You might even be on my show!

Ask Me