Hackers could live-stream your home through your LifeShield security camera

Hackers could live-stream your home through your LifeShield security camera

* IoT camera’s admin passwords were easy for local attackers to determine* Once vulnerabilities had been exploited, unauthorised users could easily watch a live feed from compromised devices

Anyone buying a home security camera is probably buying it with the intention of increasing their security, not decreasing it.


And yet once again an internet-enabled CCTV camera has proven itself to be vulnerable to attack, allowing Peeping Toms to spy on unsuspecting users who believe they are safe in the privacy of their home.


Experts at Bitdefender publicly announced this month that they had found serious vulnerabilities in LifeShield home security cameras that could have allowed hackers to live-stream your home without your permission.


Upon closely examining the LifeShield home security camera (now known as Blue by ADT), Bitdefender’s researchers found that security weaknesses made it possible for a local attacker to:


Obtain the security camera’s administrator password, simply by knowing a camera’s MAC address.
Inject commands to gain root access to the device.
Gain unrestricted access to the camera’s audio and video feed.

In a technical white paper produced by Bitdefender, researchers explained how they were able to trick Lifeshield cameras into spilling their administrator passwords:



“The doorbell periodically sends heartbeat messages to cms.lifeshield.com containing information such as the MAC address, SSID, local IP address and the wireless signal strength. After receiving such a message, the server tries to authenticate to the camera using the basic authentication scheme. This means the password for the administrator can be obtained by decoding the base64 authori ..

Support the originator by clicking the read the rest link below.