Bitcoin extorted new tricks, Canon SLR was hacked, and White Hat used a hole to redeem the photo.

Until now, we still often hear the use of bitcoin for drug trading, money laundering, and even more illegal crimes that are not yet known to the public.

Including the hacking of computer ransom bitcoin events in the early years, everyone may feel that these messages are too far away or too small, and they will pass.

But if I say that you often take this item that you are playing with and very cherished, is it possible to recruit?

The latest potential victim of Bitcoin: SLR camera

According to the National Enquiry Report, a group of security researchers successfully exploited the vulnerability of the Canon EOS 80D digital camera and redeemed the camera owner's photo with Bitcoin. (Report original: https://www.theinquirer.net/inquirer/news/3080359/canon-dslr-ransomware )

How did they do it? It turned out that the researcher of the network company check Point Research just completed the operation by using the picture transfer protocol (PTP) of the camera. And this software is usually used to transfer pictures from the device to the computer.

note!

This operation may open the door to hackers.

With the development of technology, most cameras now support the use of WiFi connections to transfer pictures, eliminating the need to forget to bring a card reader or USB.

This feature is called PTP/IP (Internet Picture Transfer Protocol). However, this feature is convenient for users and is also prone to security risks. Because you can enjoy the WiFi transmission and never use USB transmission, you may be targeted by hackers. Because the image transmission based on the Internet, it is a valuable attack carrier for hackers.

Why is that?

As the inspection study pointed out, PTP is an unauthenticated protocol that can support dozens of complex commands. Therefore, it may be abused by hackers to inject malicious code into unsuspecting cameras.

In this particular vulnerability, our researchers were able to set up a ransomware program via WiFi to encrypt the camera's storage.

When the attack starts, there will be only one extortion message on the camera screen asking the owner to exchange photos with Bitcoin, otherwise it will be destroyed or published for other purposes. (Interested friends can check out the hacking practice on YouTube https://www.youtube.com/watch?v=75fVog7MKgg )

But everyone doesn't have to worry too much. Although this may seem a little scary, research shows that the possibility of hackers successfully exploiting this particular vulnerability is very embarrassing.

In general, if the photographer does not have a way, it will not use WiFi for picture transmission. After all, the WiFi transmission picture is directly slower than the SD card and the WiFi transmission speed is not slow.

On the other hand, the researchers told Canon about the vulnerability. Canon's response speed is still very fast. A camera firmware patch was released last week and a security warning notice was issued. However, it is unclear whether other brands of cameras will have this vulnerability?

In the same way, various emerging technologies are helping everyone to improve, but at the same time, they hope to avoid bringing new hidden dangers to everyone, and immediately appear harmful loopholes, and they can also find and promptly remedy them.

Source | thenextweb

Finishing | Carol

Produced | Blockchain Base Camp (blockchain_camp)

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Opinion

SBF Trial Records Fully Exposed Blame-shifting, Amnesia, Contradictions

Today is the real highlight, as the prosecution lawyer will conduct a half-day long cross-examination of SBF after th...

Blockchain

Viewpoint | Exchange is the public chain platform

If 2019 is almost a stand-alone platform currency, let me think about " What is value capture? " and "...

Blockchain

Vicious competition causes frequent DDos attacks on exchanges. What is the cost of the attack?

Source: Financial Network Chain Finance Cryptocurrency exchange Bitfinex tweeted on February 28 that it was suspected...

Blockchain

The cryptocurrency exchange "closed tide", running to catch up with P2P

The cryptocurrency exchange, once regarded as “stable and not paying”, is more crazy than other fields,...

Blockchain

The real life of the owner of the exchange: the horror of the thief, the night can not linger

Xu Mingxing once dreamed that someone had kidnapped him and asked him to hand over Bitcoin. Awakened in his dream, he...

Blockchain

Understanding the role of different roles in cryptocurrency exchanges

Originally written by Shane Molidor, Head of Global Business Development at BitMax & GDM, compiled by the Bluemou...