Ugly Hedgehog - Photography Forum
Home Active Topics Newest Pictures Search Login Register
Main Photography Discussion
Canon Hacks, Ransomware possible
Page <prev 2 of 2
Aug 13, 2019 09:58:38   #
PGHphoto Loc: Pittsburgh, PA
 
RichardSM wrote:
You did not have a secure computer system.

I’ve been running win 10 from the day it was offered no problems with it ever.

I travel all over the country I maintain a Verizon MIFI system because it’s works best for my wife and I, we are RV ‘s.

I don’t go to BS sites and don’t open BS email either.

We both own our own laptops my model is keel it simple.



Most malware is introduced by the user themselves by clicking links they know nothing about or installing something downloaded from an internet site claiming to want to help them. If you see an email that wants you to click a link and enter a user id/password, don't click on it even if it looks legitimate (many hackers use links to sites that look like Microsoft but it is just a little different address from actual site).

If you think you have a legitimate email from a site that says your password has been compromised, don't click on any link in the email and go directly to the company website or even better - call the company's customer service phone. Do not type in and go to any url from the email either.

Reply
Aug 13, 2019 10:19:37   #
xt2 Loc: British Columbia, Canada
 
TBerwick wrote:
I don't know if this has been covered or seen as I haven't been around for a few days.

Just read at Petapixel that Canon DSLRs have a vulnerability in the Wireless or USB transfer protocol that would allow hackers to take control of the camera and install Ransomware. All photos would be encrypted and not recoverable unless a ransom was paid. It appears that patches to the camera's operating system will correct the issue.

The company that discovered the flaw used a Canon 80D as their test bed but apparently the flaw was on most, if not all, of the wireless capable cameras. There was an official Security Advisory issued by Canon so you should be able to find it with a little effort.

The company that discovered the vulnerability apparently only worked with Canon but assumes other major manufacturers "might" have the same vulnerability as the communication protocol is common and most likely used in other cameras as well.

Just a word to the wise as our camera are really pretty sophisticated computers with a lens.
I don't know if this has been covered or seen as I... (show quote)


Simply turn off the camera’s Wi-Fi unless using it to transfer files at home, etc.

Cheers!

Reply
Aug 13, 2019 10:26:50   #
lev29 Loc: Born and living in MA.
 
TBerwick wrote:
... Just read at Petapixel that Canon DSLRs have a vulnerability in the Wireless or USB transfer protocol that would allow hackers to take control of the camera and install Ransomware. All photos would be encrypted and not recoverable unless a ransom was paid. It appears that patches to the camera's operating system will correct the issue ...
Here is the article to which the Petapixel piece was referring:
https://research.checkpoint.com/say-cheese-ransomware-ing-a-dslr-camera/ .

Reply
 
 
Aug 13, 2019 10:43:10   #
Soul Dr. Loc: Beautiful Shenandoah Valley
 
PGHphoto wrote:

Most malware is introduced by the user themselves by clicking links they know nothing about or installing something downloaded from an internet site claiming to want to help them. If you see an email that wants you to click a link and enter a user id/password, don't click on it even if it looks legitimate (many hackers use links to sites that look like Microsoft but it is just a little different address from actual site).

If you think you have a legitimate email from a site that says your password has been compromised, don't click on any link in the email and go directly to the company website or even better - call the company's customer service phone. Do not type in and go to any url from the email either.
img src="https://static.uglyhedgehog.com/images/s... (show quote)


Another way to check an email for a scam is to check the header and see where the email came from.

Reply
Aug 13, 2019 11:02:11   #
Wingpilot Loc: Wasilla. Ak
 
RichardSM wrote:
Most interesting I’ve read the article on this too. What will attacker’s think of next to do?

I use a program called Malwarebytes professional which works very well on catching rogue threats on my computers.

I don’t know how many people use this on this site in their computers are something similar for me it’s well worth it.


I use Malwarebytes on my MacBook Pro, and I like it. If something gets into my computer, it gets rid of it right now as soon as I do a scan. I’d recommend Malwarebytes to anyone as a necessary bit of insurance.

Reply
Aug 13, 2019 11:47:54   #
RichardSM Loc: Back in Texas
 
markngolf wrote:
I've been using Malwarebytes for 8 years. Excellent protection.
Mark


Yes it is! I was introduced too it when it first came out I believe it was shareware or something like that.
I also use a very good antivirus program and no one program can do all things for the good of a computer either, I understand that too. But good habits when using a computer makes for a better operation to.

Reply
Aug 13, 2019 13:20:16   #
PGHphoto Loc: Pittsburgh, PA
 
RichardSM wrote:
Yes it is! I was introduced too it when it first came out I believe it was shareware or something like that.
I also use a very good antivirus program and no one program can do all things for the good of a computer either, I understand that too. But good habits when using a computer makes for a better operation to.


You folks do understand that antivirus running on a PC will not help you avoid the malware getting loaded on the camera through WiFi - right ? It may stop the USB connection from infecting your camera but doesn't help if you connect your camera to an unsecured and compromised WiFi connection.

Reply
 
 
Aug 13, 2019 13:35:57   #
PHRubin Loc: Nashville TN USA
 
There is no vulnerability if Wi-Fi and Bluetooth are turned off.

Reply
Aug 13, 2019 13:42:54   #
RichardSM Loc: Back in Texas
 
PGHphoto wrote:

Most malware is introduced by the user themselves by clicking links they know nothing about or installing something downloaded from an internet site claiming to want to help them. If you see an email that wants you to click a link and enter a user id/password, don't click on it even if it looks legitimate (many hackers use links to sites that look like Microsoft but it is just a little different address from actual site).

If you think you have a legitimate email from a site that says your password has been compromised, don't click on any link in the email and go directly to the company website or even better - call the company's customer service phone. Do not type in and go to any url from the email either.
img src="https://static.uglyhedgehog.com/images/s... (show quote)


I thought I said that in one or more of my earlier reply’s or did you miss that? That’s ok I think you understand!

Reply
Aug 13, 2019 13:59:07   #
PGHphoto Loc: Pittsburgh, PA
 
PHRubin wrote:
There is no vulnerability if Wi-Fi and Bluetooth are turned off.


Exactly - just didn't want folks to think running an antivirus on their PC has anything to do with the camera being protected as a few people have been commenting on their favorite PC antivirus.

Reply
Aug 13, 2019 14:01:06   #
PGHphoto Loc: Pittsburgh, PA
 
RichardSM wrote:
I thought I said that in one or more of my earlier reply’s or did you miss that? That’s ok I think you understand!


Thats what I was extending the for ! Your response was exactly correct.

Reply
 
 
Aug 13, 2019 14:18:24   #
rook2c4 Loc: Philadelphia, PA USA
 
Although perhaps theoretically possible, I think it is far more likely to get struck by lightning twice in one day than it is for a hacker, who just happens to have in-depth knowledge on the system of the very camera you are using, to take control over your camera and lock you out with ransomware. And no one with common sense would ever pay the ransom, as the hacker will simply vanish with the transferred money without supplying the procedure to deactivate the ransomware.

Reply
Aug 13, 2019 19:04:33   #
Ramsay2303
 
Thx so much for the info.
I love Canon having some of them, with I use on a daily basis.
I've haven't thought about that before, and it's good to know.

Reply
Aug 13, 2019 19:22:51   #
ggab Loc: ?
 
TBerwick wrote:
I don't know if this has been covered or seen as I haven't been around for a few days.

Just read at Petapixel that Canon DSLRs have a vulnerability in the Wireless or USB transfer protocol that would allow hackers to take control of the camera and install Ransomware. All photos would be encrypted and not recoverable unless a ransom was paid. It appears that patches to the camera's operating system will correct the issue.

The company that discovered the flaw used a Canon 80D as their test bed but apparently the flaw was on most, if not all, of the wireless capable cameras. There was an official Security Advisory issued by Canon so you should be able to find it with a little effort.

The company that discovered the vulnerability apparently only worked with Canon but assumes other major manufacturers "might" have the same vulnerability as the communication protocol is common and most likely used in other cameras as well.

Just a word to the wise as our camera are really pretty sophisticated computers with a lens.
I don't know if this has been covered or seen as I... (show quote)


I do not know if the Petapixel article mentioned this, however this is a case where a vulnerability was found and is being fixed before any cases of ransomware attacks were reported.

I posted this yesterday afternoon. Not sure why it didn't make it into the daily list:

https://www.uglyhedgehog.com/t-605432-1.html#10405332

Reply
Aug 14, 2019 20:23:06   #
PacificNWRider
 
I just happened to see the actual article on this, this week. A researcher was able to get ransomware into a computer via the camera, when the camera’s wireless (WiFi) was connected to a rogue access point. There was an exploitable condition in the camera’s operating system image transfer protocol. The camera in the effort was a Canon 80D. The researcher worked with Canon to help fix the vulnerability. I would suspect that fix is in the next firmware update for any Canon cameras which use the same image transfer protocol.


TBerwick wrote:
I don't know if this has been covered or seen as I haven't been around for a few days.

Just read at Petapixel that Canon DSLRs have a vulnerability in the Wireless or USB transfer protocol that would allow hackers to take control of the camera and install Ransomware. All photos would be encrypted and not recoverable unless a ransom was paid. It appears that patches to the camera's operating system will correct the issue.

The company that discovered the flaw used a Canon 80D as their test bed but apparently the flaw was on most, if not all, of the wireless capable cameras. There was an official Security Advisory issued by Canon so you should be able to find it with a little effort.

The company that discovered the vulnerability apparently only worked with Canon but assumes other major manufacturers "might" have the same vulnerability as the communication protocol is common and most likely used in other cameras as well.

Just a word to the wise as our camera are really pretty sophisticated computers with a lens.
I don't know if this has been covered or seen as I... (show quote)

Reply
Page <prev 2 of 2
If you want to reply, then register here. Registration is free and your account is created instantly, so you can post right away.
Main Photography Discussion
UglyHedgehog.com - Forum
Copyright 2011-2024 Ugly Hedgehog, Inc.