An unprecedented attack. This is how the cybercrime attributed to a collective of American hackers can be considered. Specifically, the attack consisted in accessing 150,000 security cameras. These belong to banks, prisons, schools, the Tesla car manufacturer, among others.

The attack is part of an operation

It is important to mention that the crime is part of an operation to expose “the surveillance state”. This according to statements by the hackers themselves. In this regard, images of the hacked surveillance videos were posted on Twitter.. The images were accompanied by the hashtag #OperationPanopticon. In particular, the surveillance camera images posted on Twitter show cells in a prison. Also, a man with a fake beard appears dancing in a bank warehouse.

On the other hand, the cybercriminals added information about their collective in the same publication. This was the case of Arson Cats, an alleged member of a group called APT-69420. He accompanied the series of tweeted images with the question, “What if we completely end surveillance capitalism in two days?” . He also added the following proclamation, “This is the tip of the tip of the tip of the tip of the iceberg.”

An attack via Verkada

Similarly, the hacker group claimed that it discovered the account credentials of an administrator at Silicon Valley-based Verkada. This, in turn, controls an online security systems platform. Therefore, the attack originated from this employee’s carelessness. Commenting on the attack, a Verkada spokesperson said: “We have disabled all internal administrator accounts to prevent any unauthorized access”.




He further stated, “Our internal security team and external security firm are investigating the scale and scope of this issue, and we have notified the authorities.” He added that the companies Verkada serves on its platform have been notified. The Verkada breach shows the risk of outsourcing security surveillance. As well as entrusting security to companies in the internet cloud.

Leave a Comment

Your email address will not be published. Required fields are marked *