Free backdoor webcam
They bought a consumer-grade D-Link Wi Fi web camera for roughly , and cracked it open.After installing a back-door to the Linux system that runs the camera, and then turning off the ability to update the system, they had an innocent seeming but compromised device that could be stealthily added to a network environment.Troj Ware Trojans are malicious programs that perform actions which are not authorized by the user: they delete, block, modify or copy data, and they disrupt the performance of computers or computer networks.Unlike viruses and worms, the threats that fall into this category are unable to make copies of themselves or self-replicate.In terms of functionality, Backdoors are similar to many administration systems designed and distributed by software developers.These types of malicious programs make it possible to do anything the author wants on the infected computer: send and receive files, launch files or delete them, display messages, delete data, reboot the computer, etc.“We were recently made aware of a cyber-security vulnerability that affects certain Dahua recorders and IP cameras.It's important to note that the vulnerability is not the result of a malicious attack on any specific installation where our products are deployed; it was discovered by [independent researcher] Bashis conducting independent testing of various suppliers' surveillance products,” said a statement on its website.
Keystroke Logging and Password Capture: Sub7 can record every keystroke made on the computer.
An anonymous reader writes: They might seems small and relatively insignificant, but cheap wireless web cams deployed in houses and offices (and connected to home and office networks) might just be the perfect way in for attackers.
Researchers from the Vectra Threat Lab have demonstrated how easy it can be to embed a backdoor into such a web cam, with the goal of proving how Io T devices expand the attack surface of a network.
There is also a group of Backdoors which are capable of spreading via networks and infecting other computers as Net-Worms do.
The difference is that such Backdoors do not spread automatically (as Net-Worms do), but only upon a special “command” from the malicious user that controls them.