Your DSLR Camera Can Be Prone To Ransomware; Here’s How

Your DSLR Camera Can Be Prone To Ransomware; Here’s How

Amongst the various devices/apps getting infected by ransomware attacks, we have a new device – a DSLR camera. A DSLR camera is susceptible to ransomware attacks, as hinted by a new report by Check Point Research.


It is suggested that the Picture Transfer Protocol (PTP) functionality found in DSLRs can easily be exploited, given that the PTP is unauthenticated. The vulnerability of the PTP can further be exploited over both USB and Wi-Fi, and allow for nearby attackers to attack the DSLR camera.






How Can The Attack Happen?


As per the research, the cybercriminals can easily fool PTP/USB and PTP/IP protocol by setting up a Wi-Fi access point and sniffing a specific GUID from the network.


Then, wireless access points are faked as the original one for the camera to connect to it, and the attack can be conducted once they are on the same LAN.


The Research


The research involved a Canon EOS 80D DSLR camera, which lets users add the free and open-source Magic Lantern software, allowing users to add new features to the cameras.


The researchers got rid of the camera’s firmware after following various steps and loaded it into a disassembler (IDA Pro). Following this, they accessed the PTP layer that had various PTP handlers (around 148), making the functionality highly vulnerable to malicious attacks.






After discovering various commands, it was found that Bluetooth-based attacks are also possible and much easier to perform.


Here’s a look at the ..

Support the originator by clicking the read the rest link below.