South Korea removed 1,300 cameras from its military bases after discovering they're designed to feed back to a Chinese server (www.businessinsider.com)
from MicroWave@lemmy.world to world@lemmy.world on 17 Sep 2024 17:54
https://lemmy.world/post/19878965

South Korea’s military has been forced to remove over 1,300 surveillance cameras from its bases after learning that they could be used to transmit signals to China, South Korean news agency Yonhap reported.

The cameras, which were supplied by a South Korean company, “were found to be designed to be able to transmit recorded footage externally by connecting to a specific Chinese server,” the outlet reported an unnamed military official as saying.

Korean intelligence agencies discovered the cameras’ Chinese origins in July during an examination of military equipment, the outlet said.

#world

threaded - newest

MediaBiasFactChecker@lemmy.world on 17 Sep 2024 17:55 next collapse
Business Insider - News Source Context (Click to view Full Report)

Information for Business Insider:
> MBFC: Left-Center - Credibility: High - Factual Reporting: Mostly Factual - United States of America
> Wikipedia about this source

Yonhap News Agency - News Source Context (Click to view Full Report)

Information for Yonhap News Agency:
> MBFC: Right-Center - Credibility: High - Factual Reporting: Mostly Factual - South Korea
> Wikipedia about this source

Search topics on Ground.News

https://en.yna.co.kr/view/AEN20240913003000315
https://www.businessinsider.com/south-korea-military-removes-1300-cctv-cameras-china-bases-security-2024-9

Media Bias Fact Check | bot support

SatansMaggotyCumFart@lemmy.world on 17 Sep 2024 18:00 next collapse

I wonder if my toiletcam feeds to that server too.

oldfart@lemm.ee on 17 Sep 2024 19:13 collapse

Share the URL if you find out it does

SatansMaggotyCumFart@lemmy.world on 17 Sep 2024 19:49 collapse

What’s a URL?

hakunawazo@lemmy.world on 18 Sep 2024 06:03 collapse

urinal related livecam

ptz@dubvee.org on 17 Sep 2024 18:07 next collapse

Don’t all cheap IP cameras feed back to at least one server in China?

I bought two different no-name brands from Amazon several years back, and both models of them were trying to call home. I ran them on an isolated network, so they couldn’t get anywhere, but they were persistent little buggers. Oh, and the root password to one of them was hardcoded to “1234567” lol

Tangent, but if anyone can recommend a good IP camera that just craps out an RTSP stream locally and doesn’t phone home anywhere, DM me lol.

AnIntenseMoist@lemmy.world on 17 Sep 2024 18:43 next collapse

Don’t DM, reply so we may spread the word.

curbstickle@lemmy.dbzer0.com on 17 Sep 2024 18:45 next collapse

Reolink, amcrest. Amcrest dont get anything starting with ASH in the model name.

If you want ONVIF, be sure to check the specs, many cheaper models drop support, but not all.

Some YI cameras have easily replaced firmware and can do rtsp too, but you have to do your homework on those models to be sure you’re getting one that can be modded.

You’ll still want to (IMO) toss any of them in a vlan without internet access, and rather than provide that vlan access to an NVR on another vlan, I’d lean toward your NVR having a second connection to that vlan. I’m a huge fan of segmentation though, so YMMV.

ptz@dubvee.org on 17 Sep 2024 18:51 next collapse

Yeah, that was my old setup: dedicated VLAN with the NVR and cameras in it. Had a firewall rule so I could access the NVR from regular LAN but nothing “got out” of the camera VLAN without being requested from the LAN first.

At first I had the NVR in the LAN with FW rules to reach the cameras in their VLAN, but my FW at the time struggled with all the simultaneous streams going through it so I moved the NVR in with the cams.

Maybe I’ll just stick with my current setup of just getting old analog camera housings and sticking Raspberry Pi + camera module inside lol

curbstickle@lemmy.dbzer0.com on 17 Sep 2024 19:00 collapse

Dual nic NVR then? You could even just throw a simple switch with no uplink (but preferably managed so you can tag the traffic) and for extra safety just allow only the LAN traffic you want on the NIC/Port connected to your regular LAN from the NVR.

Nothing wrong with a DIY can though! As long as it works of course

ptz@dubvee.org on 17 Sep 2024 19:11 collapse

“NVR” in my case is just Zoneminder lol. I run it on a dedicated USFF PC and didn’t want to deal with multi-homing it or a USB ethernet adapter. When I upgrade it, yeah, I’ll probably get something with a dual NIC and go that route.

Right now, yeah, it’s all DIY since I scrapped those cameras years ago (neither held up well to UV after 6-7 months outdoors), so I’m less concerned about it with all of them being RPis now. The only thing I lack is PoE since I didn’t want to spring for the HATs.

curbstickle@lemmy.dbzer0.com on 17 Sep 2024 19:32 collapse

Yeah all of my servers are on usff PC’s, so I get it.

If you do a hypervisor like proxmox, then throw your NVR in a VM, you can just create a couple of virtual NICs (though you’ll be back at that FW issue I’m sure).

USB NICs are pretty well supported these days though, and cheap to boot. Just need to be certain you’ve got usb3 if you want to make use of that gig though!

I’ve got a few pi-a-likes that I’m doing similar camera fun with, though using some webcams in there and a 3d printed case. At least that way they match my diy temp sensors with esp32s!

TranscendentalEmpire@lemm.ee on 17 Sep 2024 21:58 collapse

I can vouch for reolink, they have fairly straight forward nvr with decent cameras for the money. Been using their poe nvr system for around 5 years now and have never had an issue with it.

Eldritch@lemmy.world on 17 Sep 2024 18:55 next collapse

Not a plug and play solution. But if you aren’t averse to tinkering. RPI zero with a CSI camera and v4lrtsp server. can get you done rather cheap. Depending on your needs.

ptz@dubvee.org on 17 Sep 2024 19:13 collapse

That’s actually my current setup :)

Got some old analog cameras at an estate sale, gutted them, and put some Pi + camera modules inside. Couldn’t get the original optics to work with it, and they lack PoE, but they’re otherwise doing well (3 years and going). Just occasionally have to reboot them more than I’d like.

Haven’t messed with v4lrtsp server, but zoneminder has been good to me. Will check that out.

Eldritch@lemmy.world on 17 Sep 2024 19:29 collapse

Yes you don’t get things like Poe Etc. At least not on the zero models. There are hats for the full size pi. But you have full control and they are upgradable. I have a zero w in the official enclosure. Double-sided tape to a wall with a micro b cord plugged into power it. Can access the stream over Wi-Fi and get 30 frames per second 720P easy. Could easily do much better than that even. But the original Raspberry Pi camera module I think is the limitation. Because the cores on the Zero are barely being touched at all. In the low double digits if that.

It’s so light on resources that if someone had an old USB hub. And some old web cameras laying around. You could run multiple cameras off of a single Raspberry Pi zero. I think you would hit Port bandwidth saturation before you would hit a CPU limit. Unless of course you’re trying to reincode.

oldfart@lemm.ee on 17 Sep 2024 19:11 next collapse

I’m really surprised that military in such a technologically advanced country just connected random IP cams to the internet

ptz@dubvee.org on 17 Sep 2024 19:13 next collapse

Right?!

otp@sh.itjust.works on 18 Sep 2024 00:41 next collapse

They were on sale!!!

oldfart@lemm.ee on 18 Sep 2024 04:52 collapse

That’s fine, I got them too but they’re isolated

UnderpantsWeevil@lemmy.world on 19 Sep 2024 13:34 next collapse

It’s a big bureaucracy and procurement often just means going to the private sector and scooping up what’s on sale.

Non-zero chance the Koreans are running around with explosive pagers in their pockets right now.

abff08f4813c@j4vcdedmiokf56h3ho4t62mlku.srv.us on 21 Sep 2024 22:01 collapse

From the Yonhap article,

The company that supplied the cameras is suspected to have falsified the equipment's country of origin, and the military is considering taking legal action against it.

And also,

military and intelligence authorities found out the surveillance cameras supplied by a South Korean company were produced in China during military equipment examinations

The TLDR is that these cameras were supposed to be sourced domestically but the company behind it committed fraud to make a quick buck.

andrew_bidlaw@sh.itjust.works on 17 Sep 2024 20:24 next collapse

Same with russian ‘grandma phones’ with big buttons. Some researches found thst although they don’t provide any functionality besides basic phone\sms stuff, they do try to call their motherbase, sending all credentials and geoloc. IIRC there was no argument about them sending the content of smses and voicecalls, but it’s troubling as it is.

+ Russian as in sold there, they are chinese, sometimes with a local branding.

dezmd@lemmy.world on 18 Sep 2024 02:41 next collapse

Ubiquiti G3 and G4 cams do rtsp direct streams without needing Unifi Protect services on a unifi gateway device. G5 requires unifi prot but can rtsp from the protec gateway.

ulterno@lemmy.kde.social on 19 Sep 2024 12:33 collapse

Just get some raspberry pi camera.

What to do about IR vision though?

ptz@dubvee.org on 19 Sep 2024 12:36 collapse

I don’t currently have them, but there is (or was?) a NoIR version of the Pi cameras that didn’t have IR filters. That should let the IR LED illuminators work same as most other cameras advertised with night vision.

ulterno@lemmy.kde.social on 19 Sep 2024 12:51 collapse

That would be pretty useful.
I’m still looking for how I might manage to use my old phone’s camera anyway. Seems like a waste of good engineering to keep the pinout and protocol closed.

fluxion@lemmy.world on 17 Sep 2024 19:14 next collapse

China is the only country that gives you lifetime free cloud storage for your devices

Agent641@lemmy.world on 19 Sep 2024 11:54 collapse

Whether you like it or not

HappyTimeHarry@lemm.ee on 17 Sep 2024 21:06 next collapse

If they found out it goes to a specific server, why not just block the server and maybe isolate the network from the internet? I guess its easier to replace them but what’s to say the replacements can’t have the same flaw if other precautions aren’t in place, like how do you even get to installing cameras on military bases without thoroughly vetting the firmware on them fist?

Jumi@lemmy.world on 17 Sep 2024 21:12 next collapse

Just use a system that connects to a server on base and nothing else

billiam0202@lemmy.world on 17 Sep 2024 21:38 next collapse

Why not have the cameras on a VLAN that has no Internet access?

CosmicTurtle0@lemmy.dbzer0.com on 17 Sep 2024 21:40 next collapse

This is just bad spy craft. You don’t tell the person who bugged you that you found their bug. You mess with their head by setting up false flags.

Like have maps of China and what look like troop movements.

Or details about tank man.

thesporkeffect@lemmy.world on 17 Sep 2024 22:31 collapse

Maybe this is a double head fake and they have compromised the server in China?

abff08f4813c@j4vcdedmiokf56h3ho4t62mlku.srv.us on 21 Sep 2024 21:58 collapse

I wonder if this was the case. From the bloomberg article,

"No data has actually been leaked," they added.

And from Yonhap,

found to be designed to be able to transmit recorded footage externally

So maybe they were designed that way, but it didn't work because the cam network was offline?

Keep in mind that this was on the border with North Korea, so, they'd (the South Korean military) have a very high level of paranoia on being hacked to begin with.

Wispy2891@lemmy.world on 17 Sep 2024 21:27 next collapse

So if they purchased Ring cameras that are feeding everything to American AWS servers it would be ok?

Seems stupid that in a military install they’re using cloud shit

tal@lemmy.today on 17 Sep 2024 22:18 collapse

Well, they did remove it when they found out. But…

Look. I’m looking at a Thinkpad. Lenovo owns that line now. I dunno if they can push firmware updates to old, pre-Lenovo models, but they can to current versions. Those things are pretty common in a business setting. AFAIK, the US has never raised any issues with Lenovo and security a la Huawei. But if there was an honest-to-God, knock-down, drag-out war, I assume that Beijing is gonna see whether it can leverage anything like that. And I’ve got, what…a microphone? A camera? Network access? Maybe interesting credentials or other things in memory or on my drive? I mean, there are probably things that you could do with that.

Then think of all the personal phones that military people have. Microphone. Camera. Network access and radio. Big fat firmware layer.

My guess is that if you did a really serious audit of even pretty secure environments, you’d find a lot of stuff floating around that’s potentially exploitable, just due to firmware updates. If you exclude firmware updates, then you’re vulnerable to holes that haven’t been patched.

Okay, maybe, for some countries, you can use all domestic manufacturers. I don’t think that South Korea could do that. Maybe the US or China could. But even there, I bet that there are supply chain attacks. I was reading a while back about some guy selling counterfeit Cisco hardware. He set up a bunch of bogus vendors on Amazon. His stuff got into even distribution channels with authorized Cisco partners, made it into US military networks.

arstechnica.com/…/counterfeit-cisco-gear-ended-up…

Counterfeit Cisco gear ended up in US military bases, used in combat operations

That guy was just trying to make a buck, though I dunno if I’d have trusted his products. But you gotta figure that if that could have happened, there’s room for intelligence agencies to make moves in that space. And that’s the US, which I bet is probably the country most-able to avoid that. Imagine if you’re a much smaller country, need to pull product from somewhere abroad.

pycorax@lemmy.world on 18 Sep 2024 01:29 collapse

Look. I’m looking at a Thinkpad. Lenovo owns that line now. I dunno if they can push firmware updates to old, pre-Lenovo models, but they can to current versions.

China aside, Lenovo has lost all semblance of trust after the whole Superfish debacle. Sure it’s been more than a decade now but their response to that and the fact that it was even approved internally calls a lot into question. I wouldn’t dare go near any of their devices.

rimu@piefed.social on 18 Sep 2024 01:41 collapse

TIL, if anyone is curious https://en.wikipedia.org/wiki/Superfish#Lenovo_security_incident

fine_sandy_bottom@lemmy.federate.cc on 18 Sep 2024 05:19 collapse

Ok so after a quick read it looks like they bundled some software which allowed third parties to eavesdrop on https traffic with a fairly trivial hack?

I’ve had lenovo laptop’s forever. I could be described as a fan boy. I’d never heard about this. It’s never nice to hear that something you’re a fan of has problems like this.

I guess the only mitigating factor is that it wasn’t intentional on Lenovo’s part.

[deleted] on 17 Sep 2024 22:24 next collapse
.
interurbain1er@sh.itjust.works on 18 Sep 2024 20:22 collapse

I remember when, I think, Sony was hacked because of the movie « the interview ». It created enough of a news cycle shitstorm that our corporate overlords became excessively generous with our infosec budget and made it a tier 1 priority.

It went for measly .5% to a whooping 25% of IT expenditure.

On the other hand to really show they didn’t understand anything about it they recruited an experienced CISO and fired him a month later because an accountant’s workstation was hit by a ransomware. The guy barely had the time to start building a plan and launch a bunch of audit but still got the full blame for decades of neglects. (He eventually sued them and settled).

SaltySalamander@fedia.io on 18 Sep 2024 00:17 next collapse

Not if they were configured correctly. I.e. on their own, non-Internet connected VLANs.

[deleted] on 18 Sep 2024 02:26 collapse
.
fallingcats@discuss.tchncs.de on 18 Sep 2024 16:10 next collapse

I think you misunderstood me he previous comment. Not the devices need to be configured correctly, but the network they’re connected to.

UnpledgedCatnapTipper@lemmy.blahaj.zone on 18 Sep 2024 18:34 collapse

If the network the cameras connect to has no way to reach the Internet, then the cameras can’t reach the Internet.

[deleted] on 19 Sep 2024 04:11 collapse
.
MehBlah@lemmy.world on 19 Sep 2024 13:06 collapse

That is a really weak argument. It implies that no one inspects the device. The cameras I have are blocked at the router on their own vlan and since I pulled the cover off of them I know they have no other means of connecting to a network. A really weak argument

Neon@lemmy.world on 18 Sep 2024 05:47 next collapse

How the fuck did that happen?

Dear south korean government

please hire me instead. I promise I’m so paranoid, this will never happen.

febra@lemmy.world on 18 Sep 2024 08:35 next collapse

Capitalism. They just bought the cheapest reliable enough option they could find and didn’t give two craps about infosec, because that’s too expensive to actually properly do. Minimize the financial losses of an upfront purchase. (I worked more than enough jobs in hardware design to know what management cares about and what it doesn’t)

Also, big yikes for the Israel flag in your username.

finitebanjo@lemmy.world on 18 Sep 2024 08:52 collapse

I think this is more of an OPSEC issue than an Infosec one, but both terms work.

BruceTwarzen@lemm.ee on 18 Sep 2024 08:44 next collapse

Like every military operation, the job always goes to the lowest bidder, that is still overpriced, because it’s just tax money. That’s what always cracks me up about stuff that is marketed as military grade.

finitebanjo@lemmy.world on 18 Sep 2024 08:50 collapse

It’s still expensive because everything has to go through OPSEC.

UnderpantsWeevil@lemmy.world on 19 Sep 2024 13:32 collapse

It’s expensive because it has to go through a dozen layers of private contractors.

The US military was remarkably good at rapidly churning out cheap, effective armorments during the WW and early Cold War era. But the LBJ/Nixon pivot to private industry eroded all the efficiency. Then Reagan kicked military spending into overdrive in the 80s, and it’s been a snowball of waste, fraud, and embezzlement ever since.

Now the model for military procurement is just a jobs program for Congressional districts. The epitome of the Do Nothing profession.

Cyberjin@lemmy.world on 18 Sep 2024 08:46 next collapse

Cheap devices

Agent641@lemmy.world on 19 Sep 2024 11:52 collapse

Suppliers lie.

I know a guy who is the sole reason that software written by <adversary> isnt being currently used in <host countries most top secret defense environment>. His boss told him to lie if asked, and he refused to and informed <end user>.

ajikeshi@lemmy.world on 18 Sep 2024 08:51 next collapse

PW;DR

Pringles@lemm.ee on 18 Sep 2024 19:14 collapse

Stuff like this is why I have to tell our Chinese CFO why we don’t want Huawei network devices. Yes Jeff, I know they are cheap as shit, you cheapskate, but you don’t put the cheapest solution in place to run your critical systems on!

UnderpantsWeevil@lemmy.world on 19 Sep 2024 13:28 collapse

Yes Jeff, I know they are cheap as shit, you cheapskate

Remind me again why you’d want an Apple (made in China) or OnePlus (made in China) or any of the other 70% of all cell phones available in the US? Are you just a big fan of paying extra for the same technology?

Or are you more wedded to phones made in Malaysia, India, or Vietnam for some peculiar reason?

you don’t put the cheapest solution in place

No shortage of high end Huawei models. They’ve been competitive with Samsung for nearly a decade.