Your videoconference system may be backdoor for hackers

Business Team at a Video Conference
Would they be smiling if they knew a hacker was watching? (iStockphoto)

IT security researchers have found vulnerabilities in video conferencing systems at thousands of top level corporations that may enable a hacker to spy on the boardroom.

Rapid7, based in Boston, Massachusetts in America, demonstrated the security flaw to a reporter from the New York Times, hacking into boardrooms, viewing video images and even taking control of the pan-tilt-zoom functions.

Exploiting this vulnerability, the hacker could easily read confidential reports and eavesdrop on conversations.

HD Moore, chief security officer at Rapid7, found he could gain access to several top venture capital and law firms, pharmaceutical and oil companies and even courtrooms. He even found a way into Goldman Sachs’ boardroom.

The problem has developed as video conferencing technology has migrated to the internet. Rapid7 says that the problem occurs when the IT department installs these systems outside the corporate firewall. The correct procedure is complex and often skipped, Moore said.

Many systems are set to answer incoming calls automatically so a user doesn’t even have to press OK to initiate the call.

While the story has been quick to spread on the internet, some commentators have dismissed the story, claiming that the concerns that it raises are overblown.

The videoconferencing industry has had security in mind since its inception and some of the most keen adopters of the technology have included banks and military organisations. According to Telepresence Options magazine, critical systems are always positioned behind firewalls.

And it’s immediately obvious if someone is “dialling” into the system as they are generally designed to ring loudly and turn on the monitors if anyone calls, so it’s highly unlikely that anyone could be caught unawares by a hacker.

Links
New York Times 
How to defend your boardroom against “videoconferencing hackers” and other mythical creatures

 

Georgina Turner image

Georgina Turner

Sales Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Logistics

AI-powered surveillance for logistics security

Logistics companies face immense pressure to optimise their operations, enhance security, reduce losses, and become…
Tecnosicurezza

Tecnosicurezza Launches AmpliSec

Tecnosicurezza has launched AmpliSec – its first connected high-security electronic locking system designed specifically for safes…
Cover Story - Empowering the Mobile Workforce with HID

Cover Story – Empowering the Mobile Workforce with HID

HID presents the latest in portable readers, depicting a modern world where secure access moves with you…
Frank Mueller headshot

How LiDAR protects railways

Frank Mueller, Hexagon, presents a thought leadership perspective of the use of LiDAR in railway infrastructure.
IP Bridges in schools

Alertex IP Bridges in Education

Luminite are delighted to announce that, following feedback from larger school estates, Alertex IP Bridges can now be linked…
DuoKey at GISEC

A Breakthrough in Fraud Detection at GISEC

DuoKey will unveil its groundbreaking use case for encrypted financial intelligence at GISEC Global in Dubai next week.
access control integration

HID Redefines Physical and Digital Security Integration

HID announced the launch of HID Integration Service, a platform that integrates physical security, cybersecurity and digital identity…
Image provided by Netgenium

School Safety with new IP audio lockdown system

A Northwest primary school has invested in a new IP (Internet Protocol) audio lockdown system to improve the protection of staff…
Image provided by Customs support group

Hello Post-Brexit Security Protocols

Jo Cloherty, Senior Commercial Manager at Customs Support Group, explores the 2025 Safety and Security Protocols that have…
Image provided by ICT

ICT combines legacy and executive force

Integrated Control Technology (ICT) demonstrates the power of legacy and leadership in determining success and growth in industry  
Scroll to Top