Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Zero‑Day Attacks on Enterprise Software Reach Record High

March 6, 2026

Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

March 6, 2026

SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

March 6, 2026
Facebook X (Twitter) Instagram
Friday, March 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers
Cyber Security

Surge in Attacks on Surveillance Cameras Linked to Iranian Hackers

Team-CWDBy Team-CWDMarch 5, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A surge in attempts to compromise internet-connected surveillance cameras across the Middle East has been identified during the ongoing regional conflict, with activity attributed to infrastructure linked to Iranian threat actors.

The targeting, which began intensifying on February 28, has affected Israel, Qatar, Bahrain, Kuwait, the UAE and Cyprus, with additional focused activity observed in parts of Lebanon on March 1.

The findings, released by Check Point Research (CPR), point to a coordinated campaign against devices manufactured by Hikvision and Dahua.

The researchers said the pattern of activity aligns with Iran’s established military doctrine of using compromised cameras to support operational planning and battle damage assessment following missile strikes.

Activity Tied To Regional Escalation

According to CPR, the spike in exploitation attempts coincided with key geopolitical developments. Earlier, more targeted scanning was recorded on January 14–15, around the time Iran temporarily closed its airspace amid expectations of a possible US strike.

Subsequent waves of activity aligned with other high-profile events, including:

  • January 24 – A visit to Israel by the US Central Command commander during heightened tensions

  • Early February – Public warnings from Iranian leadership that a US strike could spark wider regional conflict

Read more on cyber operations in interstate conflicts: Expect Iran to Launch Cyber-Attacks Globally, Warns Google Head of Threat Intel

The infrastructure used in the campaign combines commercial VPN exit nodes, including Mullvad, ProtonVPN, Surfshark and NordVPN, along with virtual private servers assessed to be operated by multiple Iran-linked threat actors.

Specific Vulnerabilities Exploited

The campaign observed by CPR focused exclusively on Hikvision and Dahua products. Researchers observed scanning for known vulnerabilities, including authentication bypass and remote code execution (RCE) flaws. Patches are available for all identified issues.

Check Point examined exploitation attempts involving CVE-2021-33044 and CVE-2017-7921, traced to infrastructure attributed to Iran and active since the start of the year.

The researchers noted similar tactics during the 12-day conflict between Israel and Iran in June 2025. In one widely reported incident, a street camera facing the Weizmann Institute of Science was allegedly compromised shortly before a ballistic missile struck the site.

The report concluded that monitoring camera-targeting activity from known Iranian-linked infrastructure may offer early warning of potential follow-on kinetic operations.

To help mitigate these risks, defenders should eliminate public exposure by removing WAN access and using a VPN, while enforcing strong credentials and keeping firmware up-to-date.

Additionally, they should implement network segmentation for cameras on a dedicated VLAN and monitor for unusual login attempts and outbound connections.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGlobal Takedown Neutralizes Tycoon2FA Phishing Service
Next Article UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
Team-CWD
  • Website

Related Posts

Cyber Security

Zero-Click FreeScout Bug Enables Remote Code Execution

March 6, 2026
Cyber Security

Cisco Issues Patches for 48 Vulnerabilities

March 5, 2026
Cyber Security

Leaked Database Sheds Light on Iranian Crypto Sanctions Evasion

March 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Mobile app permissions (still) matter more than you may think

February 27, 2026

AI-powered financial scams swamp social media

September 11, 2025

How to tell if a voice call is AI or not

February 23, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.