How To Stop People Hacking Your Webcam

How To Stop People Hacking Your Webcam

There are concerns that thousands of private webcams around the world could be streaming live images to anybody who wishes to view them — without their owner knowing — thanks to a Russian website providing a convenient list of every camera that can be accessed.

Picture: Cory Doctorow

But how is the website doing this? Just like with those who had concerns over Facebook’s Messenger app, the website is exploiting the fact that most users accept the default settings on webcams. People integrate technology into their lives without any thought about the security or privacy settings, blindly pressing “yes” when faced with a piece of technology asking you to stop and consider.

Peering into people’s lives

The issue has arisen over the past few years as webcams have grown to include extra features in a bid for customers’ business.

One of these features is the ability to access an external webcam over the internet from anywhere in the world from your smartphone, tablet, laptop or any web browser enabled device.

To allow this, the webcam connects to a user’s local home network and obtains an internet protocol (IP) address from their router. This then allows users to dial back into the webcam using that address and view the video field. This is useful for those using cameras for home/business security purposes, home support services or even just to check on the whereabouts of the family cat!

In the battle for new customers, many manufacturers have started to add features like these to separate their technology from the pack.

Unfortunately, the problem arises when the cameras are manufactured in the factory and the software is loaded. To make this process easier, each camera is given the same default username and password to use as a log in when accessing remotely.

While users are encouraged to change their password, some don’t. So the camera is made available to the world via the internet with a default password that is easily known to anyone who has bought the same type of camera (or can read it on the manufacturer’s website).

It is then a simple matter for unscrupulous types to scan for these cameras over the internet (by looking for devices using the correct ports) and then use the default password to log in and view the feed, keeping track of the details of each camera for collation on a website.

Cameras on baby monitors, closed-circuit TV monitoring as well as standalone webcams are all at risk from being access by the Russian website.

Webcam concerns

The issue was first revealed in September but has now raised concern around the world with the UK’s information commissioner urging Russian authorities to take down the website.

The Australian government also raised the alarm this month over the then .com website. There are now reports that the website’s new .cc domain name is registered to the Australia-administered Cocos Islands.

The majority of media reports so far have decided not to give the actual web address for the site but despite the global concerns it is still active, and registered via a popular domain name company.

The actual website lists more than 17,000 webcams in 126 countries, including 284 in Australia. The Australian camera images show the inside of shops, offices and homes, outside in gardens, doorways and driveways and a few baby cots and child play areas.

The website says the cameras are not hacked and access is only possible because they were left on “default password”.

What can we do?

So, how can people protect against this problem? First, it’s important to note that the issue only affects cameras that can be accessed remotely over the web. This means that, unless you’ve installed special software, your camera in your smartphone, tablet or laptop is safe from this type of exploit.

Picture: mrmayo

But if people do have a standalone camera (that either attaches to your computer in some way or is freestanding), then they should check their user manual and packaging for the camera to see if it claims to be accessible over the internet remotely.

If it does, then users should immediately change the password to access the camera over the internet. Instructions on how to do this should be available via the manual for the product or the manufacturer’s website. It’s as simple as that.

Isn’t this illegal?

Unfortunately, the methods by which people are accessing these cameras, while being unethical, are not actually illegal.

These cameras have been built to be accessed over the internet and individuals are using freely available tools and information to find and access these cameras.

While it might be the case that the Russian website eventually gets taken down due to government and media pressure, the exploit will continue to exist and webcams will continue to be available and images viewed until users close the gap by changing their passwords to something other than the default.

Privacy vs convenience of technology

The bigger question though is how did this happen? While a finger could be pointed at the manufacturer for using the same password for every device, responsibility also needs to rest with the user to make sure that they are not allowing their own inability to follow password guidelines and read security messages to interfere with their need for privacy.

As with the Facebook Messenger issue, the broader issue here comes back to our willingness to allow important decisions about our privacy to be quickly skimmed over with the hurried press of an “agree” button or the use of webcam without a glance at the instructions.

Until we can reconcile our use of technology with our desire for privacy and ensure that we all understand what we are using, these problems will continue to occur.

Perhaps this will ultimately take legislative intervention, requiring the government to save us from our own ambivalence.The ConversationMichael Cowling is Senior Lecturer & Discipline Leader, Mobile Computing & Applications at Central Queensland University. He does not work for, consult to, own shares in or receive funding from any company or organisation that would benefit from this article, and has no relevant affiliations.

This article was originally published on The Conversation. Read the original article.


  • There are dozens of websites dedicated to listing IP’s of non secure cameras which include schools, shopping centers, peoples homes and lots lots more.
    Super creepy, i just put an apple sticker on my camera because im paranoid of that shit since the day i saw my web camera light turn on for a few moments (could of just been a software bug, but pfffft)

    • Some laptops the indicating light is run via hardware and some software. The software ones with certain hacks I guess you’d call them, can be disabled when in use.
      Yeah it’s paranoid but it’s also sorta justified.

  • IP cameras are great for security and are cheap to run if you do them the correct way.
    Having set up many here are a few clues:
    Use high definition cams, nothing below 1080.
    Use motion detection on 3 second intervals and send still photos to a NAS.
    Change the password from the default.
    Block the default port 80 on the router and use a different port.
    Do not use the cloud to access your cam, as this is where cams often get hacked.

  • The simplest way to stop your webcam being hacked. Unplug it. Obviously Laptops don’t count here.

    • I think this article mainly refers to cameras that have their own connection to the network and aren’t relying on a separate computer to drive them. These are vulnerable because people equate “Plug and Play” with “Secure right out of the box” and don’t bother changing the default access passwords on the camera.

  • I may be mistaken, but the article seems to be referring to the site that lists Network Cameras accessible via the web, not webcams. It’s pretty misleading to infer that your webcam has a password that needs changing.

    These cameras are security cameras with network accessibility and often the requirement for remote access. Sure , you should change the password, but they’re not laptop webcams or other devices that people would consider a ‘webcam’.

    As for the LED light on your laptop webcam, it may well be on to indicate that your laptop is using the camera to detect your presence, legitimately! Many laptops now put themselves to sleep when they detect that you have moved away, they do it by using your webcam. Hence the light being active. Good computer security practises and checking for Malware are critical, but don’t assume that someone is watching you through your laptop’s camera.

  • Possibly a stupid question, but can you remotely access a camera in a smart TV? We have a Samsung smart TV which has a built in camera which you can use to control the TV, ie. wave at it to turn up the volume, change channel etc. We also Skype using the TV and camera. I’m not sure how the security works on these devices. Any advice? Thanks.

    • Any camera connected to the internet is hackable. It may take some digging, but any hacker that wants to get in badly enough will eventually find a vulnerability in the software that allows them to take access. This was shown in an episode of CSI: Cyber last season, when a perv watched a woman in her house by hacking the camera in her TV.
      My advice, cut a little piece of duct tape and put it over the camera when you’re not using it. Sure, you’ll lose the ability to control the TV with gestures, but it makes it impossible for someone to spy on you then.

  • Hi All, I just wanted to let you know I’ve created a Kickstarter project to make Static Cling Camera Covers!

    Static Cling Camera Covers offer the best way to protect your privacy and decorate your devices all in one!

    Get yours now on Kickstarter:

Show more comments

Comments are closed.

Log in to comment on this story!