![]() ![]() Verkada’s report about the incident agreed that the hackers had “gained access to a tool that allowed the execution of shell commands on a subset of customer cameras”. This made it easy to breach the software startup’s databases and all cameras belonging to Verkada’s customers. Kattie claimed that the hacker group was able to acquire Verkada’s administrator account’s credentials that were available online with “super admin” rights. Twitter considered suspending Kattie Kottman’s account as the best measure after he’d leaked Tesla’s security footages. However, it’s not clear whether the hashtag only refers to Verkada’s attack or a code for a collection of breaches against other companies that could expose millions of surveillance cameras to risk. Kattie took to social media with the # OperationPanopticon hashtag. ![]() It’s in the public domain that Kattie was credited for penetrating Intel’s data systems in august 2020 and Nisan Motors Inc. Kottman explained that their hackers’ pursuit fueled the move to conduct this attack with “lots of curiosity, fighting for freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism-and it’s also just too much fun not to do it.” Tillie Kottmann, a member of “APT-69420 Arson Cats” claimed credit of the Verkada breach. Worrisomely, some of the cameras have inbuilt facial recognition software that makes it easy to identify and recognize the individuals captured on the videos. The hacker group also claimed that they had full access to the entire video archives of Verkada’s customers. Multinationals like carmakers Tesla and Nissan and the software company Cloudflare fell victims to the data security breach.Ī report released by Tillie Kottman, a 21-year-old hacker revealed that the hackers had indicated that the breach was meant to show how vulnerable Verkada’s cameras are. The breach exposed over 150,000 surveillance cameras in sensitive institutions like police departments, schools, hospitals, companies, and prisons. Our data collected from Shanghai factories and other places mentioned are stored on local servers,” said Tesla.Hackers were able to intrude on Verkada’s camera feeds on March 8th and 9th. “Based on our current understanding, the cameras being hacked are only installed in one of our suppliers, and the product is not being used by our Shanghai factory or any of our Tesla stores or services centers. “Our internal security team and external security firm are investigating the scale and scope of this issue, and we have notified law enforcement,” the spokesperson added.Ĭurrently, Verkada’s chief information security officer with an internal team and an external security firm are investigating the intensity of the incident.įurther, the company is working to notify customers and also setting up a support line to address questions, sources informed. Talking about the incident, a Verkada spokesperson said “We have disabled all internal administrator accounts to prevent any unauthorized access,”. Kottmann.įurther, Kottmann mentioned their reasons for hacking are “lots of curiosity, fighting for the freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism - and it’s also just too much fun not to do it.” Previously, Kottmann has claimed credit for hacking chipmaker Intel Corp. Tillie Kottmann is one of the hackers who claimed credit for breaching San Mateo, California-based Verkada. According to Tillie Kottmann, their main intention is to show the pervasiveness of video surveillance and the ease with which systems could be broken into. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |