Nation-states including Russia, Iran, Israel, Ukraine, and the US have been exploiting compromised IP cameras for military intelligence and targeting operations. The most notable recent case involved Israel and the US hijacking Iran's traffic camera network to track and ultimately target Ayatollah Khamenei. Iran has since expanded opportunistic scanning for exposed cameras and industrial control systems across multiple countries, including private sector targets. Security experts warn that legacy and shadow IoT devices are the most common attack surface, and recommend regular patching, strong password practices, network segmentation, and active scanning of IP ranges to detect exposed devices.
Sort: