Ugly Hedgehog - Photography Forum
Home Active Topics Newest Pictures Search Login Register
Main Photography Discussion
Canon Hacks, Ransomware possible
Page 1 of 2 next>
Aug 12, 2019 11:09:33   #
TBerwick Loc: Houston, Texas
 
I don't know if this has been covered or seen as I haven't been around for a few days.

Just read at Petapixel that Canon DSLRs have a vulnerability in the Wireless or USB transfer protocol that would allow hackers to take control of the camera and install Ransomware. All photos would be encrypted and not recoverable unless a ransom was paid. It appears that patches to the camera's operating system will correct the issue.

The company that discovered the flaw used a Canon 80D as their test bed but apparently the flaw was on most, if not all, of the wireless capable cameras. There was an official Security Advisory issued by Canon so you should be able to find it with a little effort.

The company that discovered the vulnerability apparently only worked with Canon but assumes other major manufacturers "might" have the same vulnerability as the communication protocol is common and most likely used in other cameras as well.

Just a word to the wise as our camera are really pretty sophisticated computers with a lens.

Reply
Aug 12, 2019 11:28:40   #
Architect1776 Loc: In my mind
 
TBerwick wrote:
I don't know if this has been covered or seen as I haven't been around for a few days.

Just read at Petapixel that Canon DSLRs have a vulnerability in the Wireless or USB transfer protocol that would allow hackers to take control of the camera and install Ransomware. All photos would be encrypted and not recoverable unless a ransom was paid. It appears that patches to the camera's operating system will correct the issue.

The company that discovered the flaw used a Canon 80D as their test bed but apparently the flaw was on most, if not all, of the wireless capable cameras. There was an official Security Advisory issued by Canon so you should be able to find it with a little effort.

The company that discovered the vulnerability apparently only worked with Canon but assumes other major manufacturers "might" have the same vulnerability as the communication protocol is common and most likely used in other cameras as well.

Just a word to the wise as our camera are really pretty sophisticated computers with a lens.
I don't know if this has been covered or seen as I... (show quote)


This I read applies to Nikon, Sony et al.

Reply
Aug 12, 2019 11:58:02   #
olemikey Loc: 6 mile creek, Spacecoast Florida
 
TBerwick wrote:
I don't know if this has been covered or seen as I haven't been around for a few days.

Just read at Petapixel that Canon DSLRs have a vulnerability in the Wireless or USB transfer protocol that would allow hackers to take control of the camera and install Ransomware. All photos would be encrypted and not recoverable unless a ransom was paid. It appears that patches to the camera's operating system will correct the issue.

The company that discovered the flaw used a Canon 80D as their test bed but apparently the flaw was on most, if not all, of the wireless capable cameras. There was an official Security Advisory issued by Canon so you should be able to find it with a little effort.

The company that discovered the vulnerability apparently only worked with Canon but assumes other major manufacturers "might" have the same vulnerability as the communication protocol is common and most likely used in other cameras as well.

Just a word to the wise as our camera are really pretty sophisticated computers with a lens.
I don't know if this has been covered or seen as I... (show quote)


I had read a piece a while back on PC & laptop system vulnerabilities via the USB pathway and external USB devices, so makes sense that it could also be used get in to other devices you are uploading/downloading to and from. I have also seen these same warnings for all smart devices in your home! It's tough out there, so be diligent.....

Reply
 
 
Aug 12, 2019 12:01:43   #
RichardSM Loc: Back in Texas
 
Most interesting I’ve read the article on this too. What will attacker’s think of next to do?

I use a program called Malwarebytes professional which works very well on catching rogue threats on my computers.

I don’t know how many people use this on this site in their computers are something similar for me it’s well worth it.

Reply
Aug 12, 2019 12:04:44   #
Soul Dr. Loc: Beautiful Shenandoah Valley
 
RichardSM wrote:
What will attacker’s think of next to do?


Any way they can get money dishonestly from people.

will

Reply
Aug 12, 2019 12:12:49   #
speters Loc: Grangeville/Idaho
 
TBerwick wrote:
I don't know if this has been covered or seen as I haven't been around for a few days.

Just read at Petapixel that Canon DSLRs have a vulnerability in the Wireless or USB transfer protocol that would allow hackers to take control of the camera and install Ransomware. All photos would be encrypted and not recoverable unless a ransom was paid. It appears that patches to the camera's operating system will correct the issue.

The company that discovered the flaw used a Canon 80D as their test bed but apparently the flaw was on most, if not all, of the wireless capable cameras. There was an official Security Advisory issued by Canon so you should be able to find it with a little effort.

The company that discovered the vulnerability apparently only worked with Canon but assumes other major manufacturers "might" have the same vulnerability as the communication protocol is common and most likely used in other cameras as well.

Just a word to the wise as our camera are really pretty sophisticated computers with a lens.
I don't know if this has been covered or seen as I... (show quote)


Its not only Canon but many other manufacturers cameras as well, only Canon is the first to address this issue. The warning is out there, but it is addressed to Nikon, Sony, Pentax and others that provide firmware updates for their customers as well!

Reply
Aug 12, 2019 17:43:44   #
Architect1776 Loc: In my mind
 
speters wrote:
Its not only Canon but many other manufacturers cameras as well, only Canon is the first to address this issue. The warning is out there, but it is addressed to Nikon, Sony, Pentax and others that provide firmware updates for their customers as well!


Absolutely.

Reply
 
 
Aug 12, 2019 19:22:58   #
Harry0 Loc: Gardena, Cal
 
RichardSM wrote:
Most interesting I’ve read the article on this too. What will attacker’s think of next to do?
I use a program called Malwarebytes professional which works very well on catching rogue threats on my computers.
I don’t know how many people use this on this site in their computers are something similar for me it’s well worth it.


I had that software running when I opened a spoofed Microsoft security upgrade, and I was hit with the ".docm" ransomeware.
Sometimes you'll never know where a backdoor is. Win10 is riddled. A major hotel chain here was hit- thru the wireless connection to the lobby aquarium. The bad guy managed to find and copy names, addresses, credit cards and phone numbers of thousands of past guests. Just sitting in the lobby, playing with his laptop.

Reply
Aug 12, 2019 20:07:22   #
RichardSM Loc: Back in Texas
 
You did not have a secure computer system.

I’ve been running win 10 from the day it was offered no problems with it ever.

I travel all over the country I maintain a Verizon MIFI system because it’s works best for my wife and I, we are RV ‘s.

I don’t go to BS sites and don’t open BS email either.

We both own our own laptops my model is keel it simple.



Harry0 wrote:
I had that software running when I opened a spoofed Microsoft security upgrade, and I was hit with the ".docm" ransomeware.
Sometimes you'll never know where a backdoor is. Win10 is riddled. A major hotel chain here was hit- thru the wireless connection to the lobby aquarium. The bad guy managed to find and copy names, addresses, credit cards and phone numbers of thousands of past guests. Just sitting in the lobby, playing with his laptop.

Reply
Aug 13, 2019 05:40:09   #
wdross Loc: Castle Rock, Colorado
 
TBerwick wrote:
I don't know if this has been covered or seen as I haven't been around for a few days.

Just read at Petapixel that Canon DSLRs have a vulnerability in the Wireless or USB transfer protocol that would allow hackers to take control of the camera and install Ransomware. All photos would be encrypted and not recoverable unless a ransom was paid. It appears that patches to the camera's operating system will correct the issue.

The company that discovered the flaw used a Canon 80D as their test bed but apparently the flaw was on most, if not all, of the wireless capable cameras. There was an official Security Advisory issued by Canon so you should be able to find it with a little effort.

The company that discovered the vulnerability apparently only worked with Canon but assumes other major manufacturers "might" have the same vulnerability as the communication protocol is common and most likely used in other cameras as well.

Just a word to the wise as our camera are really pretty sophisticated computers with a lens.
I don't know if this has been covered or seen as I... (show quote)


If it can be hooked up to the internet in any way, there is a chance for the photos to be encrypted by ransonware. Manufactures are working on protecting both you and the photos, but hackers will always try to find a new way in.

Reply
Aug 13, 2019 06:38:54   #
Ollieboy
 
Architect1776 wrote:
This I read applies to Nikon, Sony et al.


I always keep my cameras in airplane mode. I don't anticipate any future problems.

Reply
 
 
Aug 13, 2019 07:21:00   #
markngolf Loc: Bridgewater, NJ
 
RichardSM wrote:
Most interesting I’ve read the article on this too. What will attacker’s think of next to do?

I use a program called Malwarebytes professional which works very well on catching rogue threats on my computers.

I don’t know how many people use this on this site in their computers are something similar for me it’s well worth it.


I've been using Malwarebytes for 8 years. Excellent protection.
Mark

Reply
Aug 13, 2019 08:06:57   #
ggab Loc: ?
 
TBerwick wrote:
I don't know if this has been covered or seen as I haven't been around for a few days.

Just read at Petapixel that Canon DSLRs have a vulnerability in the Wireless or USB transfer protocol that would allow hackers to take control of the camera and install Ransomware. All photos would be encrypted and not recoverable unless a ransom was paid. It appears that patches to the camera's operating system will correct the issue.

The company that discovered the flaw used a Canon 80D as their test bed but apparently the flaw was on most, if not all, of the wireless capable cameras. There was an official Security Advisory issued by Canon so you should be able to find it with a little effort.

The company that discovered the vulnerability apparently only worked with Canon but assumes other major manufacturers "might" have the same vulnerability as the communication protocol is common and most likely used in other cameras as well.

Just a word to the wise as our camera are really pretty sophisticated computers with a lens.
I don't know if this has been covered or seen as I... (show quote)


80d has a firmware patch

Reply
Aug 13, 2019 08:09:52   #
ggab Loc: ?
 
TBerwick wrote:
I don't know if this has been covered or seen as I haven't been around for a few days.

Just read at Petapixel that Canon DSLRs have a vulnerability in the Wireless or USB transfer protocol that would allow hackers to take control of the camera and install Ransomware. All photos would be encrypted and not recoverable unless a ransom was paid. It appears that patches to the camera's operating system will correct the issue.

The company that discovered the flaw used a Canon 80D as their test bed but apparently the flaw was on most, if not all, of the wireless capable cameras. There was an official Security Advisory issued by Canon so you should be able to find it with a little effort.

The company that discovered the vulnerability apparently only worked with Canon but assumes other major manufacturers "might" have the same vulnerability as the communication protocol is common and most likely used in other cameras as well.

Just a word to the wise as our camera are really pretty sophisticated computers with a lens.
I don't know if this has been covered or seen as I... (show quote)


https://www.uglyhedgehog.com/t-605432-1.html#10405332

Reply
Aug 13, 2019 09:45:02   #
PGHphoto Loc: Pittsburgh, PA
 
TBerwick wrote:
I don't know if this has been covered or seen as I haven't been around for a few days.

Just read at Petapixel that Canon DSLRs have a vulnerability in the Wireless or USB transfer protocol that would allow hackers to take control of the camera and install Ransomware. All photos would be encrypted and not recoverable unless a ransom was paid. It appears that patches to the camera's operating system will correct the issue.

The company that discovered the flaw used a Canon 80D as their test bed but apparently the flaw was on most, if not all, of the wireless capable cameras. There was an official Security Advisory issued by Canon so you should be able to find it with a little effort.

The company that discovered the vulnerability apparently only worked with Canon but assumes other major manufacturers "might" have the same vulnerability as the communication protocol is common and most likely used in other cameras as well.

Just a word to the wise as our camera are really pretty sophisticated computers with a lens.
I don't know if this has been covered or seen as I... (show quote)


Interesting that firmware update is only available for the 80D. although Canon could be working on other models. I would expect that the WiFi coding for most canon cameras would be similar and have the same vulnerabilities. With certain websites giving a LOT of information on the hack (see https://www.bleepingcomputer.com/news/security/canon-dslr-camera-infected-with-ransomware-over-the-air/ ) I would think this is a priority. Safe connecting would seem to prohibit the malicious code from propagating since the infecting access point itself would have to have been compromised or unsecured.

I have only used the WiFi connection on my 70d to connect to my phone for remote triggering. A good safety principle is to never connect to a public, unsecured, access point (for camera OR phone).

Reply
Page 1 of 2 next>
If you want to reply, then register here. Registration is free and your account is created instantly, so you can post right away.
Main Photography Discussion
UglyHedgehog.com - Forum
Copyright 2011-2024 Ugly Hedgehog, Inc.