Anonymous claims they hacked dozens of CCTV cameras in Russia

Anonymous hacktivists claimed on Twitter that they had hacked and gained access to dozens of external and internal security cameras in Russia, located, according to the hackers, in restaurants, offices, schools and so on.

The feeds from the cameras are collected on a special site called Behind Enemy Lines, where various messages are superimposed on the picture, reporting information about the Russian invasion of Ukraine in a country where any free media activity is blocked and severe censorship is introduced.

352 Ukraine civilians dead. Russians lied to 200RF.com. Slava Ukraine! Hacked by Anonymous.the message displayed on the feeds says.

200RF.com is another site posting information about Russian soldiers in Ukraine.

In total, the site collected data from more than 80 cameras, which the hackers divided into categories: “inside”, “outside”, “restaurants”, “offices”, “business”, “schools” and so on.

During the launch, the site had a “home” section, but now it is empty, and Anonymous writes that they have removed the video from the site:

After some discussions, we decided to remove [the section] with cameras in houses with respect for the privacy of Russian citizens. We hope you understand.reads the message left in this section.

Let me remind you that Anonymous hackers declared war on the Russian government.

Vice Motherboard journalists note that, according to their data, many cameras are indeed located in Russia. On one of the CCTV feeds, Motherboard looked at one of the convenience stores that had a Russian sign saying “Happy Easter”, suggesting that the channel was at least either live or filmed around that time of year. Another one ended up in the Siberian Tyumen region.

However, it is not clear exactly how the hacktivists gained access to them. Probably Anonymous used some kind of search engine (like Shodan).

One of the self-described Anonymous Twitter handles mentioned on the website did not immediately respond to a request for comment on how they gained access to these feeds, be that through a computer search engine such as Shodan or some other method.journalists of Vice Motherboard reported.

We also wrote that The popular node-ipc npm package removes files on systems of developers from Russia and Belarus.

By Vladimir Krasnogolovy

Vladimir is a technical specialist who loves giving qualified advices and tips on GridinSoft's products. He's available 24/7 to assist you in any question regarding internet security.

Leave a comment

Your email address will not be published. Required fields are marked *