Iran Hacking Security Cameras for Spying, Israel Warns
▼ Summary
– Iran is restricting internet access for its citizens amid tensions with Israel and the US, pushing them toward potentially insecure domestic apps.
– A suspected shooter in Minnesota used data broker sites to find targets’ personal information, highlighting risks of widely available data.
– WIRED released a package on civil liberties and surveillance, including guides on protesting safely and protecting against government surveillance.
– Iran is reportedly hacking Israeli security cameras for espionage, prompting warnings to secure or disable vulnerable devices.
– Ukraine’s hackers attacked Russian telecom Orion Telecom, disrupting internet and TV services on Russia Day, claiming to target agencies involved in the war.
Israeli authorities have issued a stark warning about Iranian cyberespionage efforts targeting private security cameras across Israel. The alert comes amid heightened tensions between the two nations following recent missile exchanges. According to cybersecurity experts, Iranian operatives are attempting to infiltrate unprotected surveillance systems to gather intelligence on strike locations and improve future attack accuracy.
Refael Franco, former deputy director of Israel’s National Cyber Directorate, publicly urged citizens to either secure their cameras with robust passwords or disable them entirely. Many internet-connected devices, including security cameras, remain vulnerable to hacking if basic security measures aren’t implemented. This isn’t the first time such devices have been exploited during conflicts—similar tactics have been used in other global cyber warfare incidents.
Meanwhile, Ukraine’s Main Intelligence Directorate (HUR) reportedly executed a crippling cyberattack against Russian telecom provider Orion Telecom, disrupting internet and television services on Russia’s national holiday. The assault allegedly disabled hundreds of servers and wiped backup systems, significantly delaying recovery efforts. Hackers affiliated with Ukraine’s BO Team claimed responsibility, leaving a taunting message: “Happy holiday, disrespectful Russians. Soon you’ll be living in the Stone Age—and we’ll help you get there.”
In another major cybersecurity development, satellite communications giant Viasat confirmed a breach linked to China’s notorious Salt Typhoon hacking group, known for infiltrating global telecom networks. The group had previously targeted major US providers like AT&T and Verizon, raising concerns about persistent vulnerabilities in critical infrastructure. Viasat is cooperating with federal investigators to assess the damage.
On the data privacy front, the UK’s Information Commissioner’s Office (ICO) fined genetic testing firm 23andMe £2.31 million ($3.1 million) for failing to protect user data during a 2023 breach. Hackers exploited weak account security, accessing sensitive genetic information from over 155,000 UK residents. The ICO emphasized that the company’s lack of mandatory two-factor authentication violated data protection laws—a flaw since rectified.
As digital threats escalate globally, individuals and organizations must prioritize cybersecurity measures, from securing IoT devices to enforcing multi-layered authentication. The recent incidents underscore how quickly unaddressed vulnerabilities can be weaponized in geopolitical conflicts and criminal exploits. Staying informed and proactive remains the best defense against evolving cyber risks.
(Source: Wired)