Feeds

FTC slaps TRENDnet with 20 years' probation over webcam spying flaw

Insecure code is a Peeping Tom's charter

Internet Security Threat Report 2014

The Federal Trade Commission has reached a settlement with US wireless webcam manufacturer TRENDnet that will commit the firm to third-party security audits for the next 20 years, plus two years of free technical support for its customers.

The FTC began its investigation last year after a list of the IP addresses of over 700 TRENDnet customers was posted online, allowing anyone to take a remote peek through the webcams' lenses. The company rushed out a security patch to fix the problem, but the FTC report says that TRENDnet failed in several of the most basic levels of secure software, and needed to be punished.

"The Internet of Things holds great promise for innovative consumer products and services," said FTC chairwoman Edith Ramirez in a statement. "But consumer privacy and security must remain a priority as companies develop more devices that connect to the Internet."

The report found in February 2010 that the firm added a Direct Video Stream Authentication (DVSA) feature, which allowed users to make the camera feeds public. The DVSA had a flaw that allowed the feeds to be secretly set as public regardless of the owner's settings, and the FTC noted that 20 models of the firm's cameras, some of which were branded under the title "SecurView", were vulnerable.

The FTC's investigation found that since April 2010 TRENDnet had not taken "reasonable steps" to ensure that its webcam products were secure. There was no security review of the original code base, nor any penetration testing done before the code's release. The FTC also notes that login names and passwords of the IP webcams were transmitted and stored on PCs and mobile in plain text, making them easy to slurp.

Under the terms of the settlement, the firm will face a security audit every two years for the next 20 years and is barred from "misrepresenting" the secure nature of its products. No direct financial penalty was made against the company, but TRENDnet has been instructed to contact customers about security issues, provide them with free technical support for the next two years, and appoint a chief security officer.

There is growing concern over the increasing attention software crackers are spending looking into flaws in devices such as webcams. Last month a Texas family found the webcam monitoring their two-year old daughter had been hacked, and a British or European man was heard shouting obscenities at the child.

In that case, the cracker had exploited a flaw in in the control software of the family's Foscom webcam and given himself root access. The family is reportedly looking into pursuing a class-action suit against the Chinese vendor.

There is a vast pool of unsecured or insecure hardware out there. In March a researcher managed to temporarily hijack 420,000 IPv4 devices by finding those requiring admin/admin or root/root username-password login, or no password at all to get root access. Thankfully he just used it to map out the internet, but the study raised some serious security questions.

There's no doubt that many manufacturers are now looking more seriously at the issue, but not quickly enough for the FTC. Searching on the vulnerability-scanning search engine Shodan still shows far too many vulnerable systems waiting to be cracked, and companies with an interest should check out their systems before the Feds take note. ®

Internet Security Threat Report 2014

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.