DSLR Firmware Flaw Can Leave You Vulnerable to Ransomware: Here's How to Stay Safe
A recent security report has revealed how even DSLRs at risk from malicious cyberattacks, showing just how far online hacking and thefts have come to. According to Check Point Software's presentation at the ongoing DEFCON, DSLRs which include Wi-Fi connectivity can be easily left vulnerable to ransomware and malware attacks, hence presenting the risk of financial loss or data theft even in an unsuspecting piece of hardware.
How can cameras be hacked?
The process is actually not all that complicated. Hackers can simply search for Wi-Fi SSIDs of cameras, particularly in prominent tourist hotspots. Given how DSLRs, mirrorless cameras and even premium compact cameras have become more accessible, it is likely that every tourist spot would include some cameras that include Wi-Fi connectivity. It is further important to note that Wi-Fi connectivity has steadily become more common in mainstream, semi-professional and professional cameras, which makes this flaw even more significant.
Once a Wi-Fi SSID is spotted, an attacker can then easily authenticate the connection from their end without knowledge of the camera owner, and transfer a malware that encrypts the plugged-in SD card that includes photographs that can be private, sensitive or simply emotional in nature. The reason why this can be done now is because of camera innovation itself — previously, Wi-Fi in cameras only allowed for one-sided transfer of images, from the camera to a smartphone or a laptop. Nowadays, Wi-Fi and Bluetooth are being used for more features such as using a smartphone as a viewfinder and remote controller, streaming live to social media, etc. This necessitates two-way transfer of data between the camera and the target device.
Once the malware is installed, the entire camera firmware will likely be locked out of user access, until a ransom is paid to a target internet address. Further users with malicious intentions can simply steal data for identity theft, or delete all files as part of nefarious objectives. Commonly referred to as Picture Transfer Protocol (PTP), such flaws can be particularly sensitive in nature