camfecting
   HOME

TheInfoList



OR:

Camfecting, in the field of
computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
, is the process of attempting to hack into a person's
webcam A webcam is a video camera which is designed to record or stream to a computer or computer network. They are primarily used in videotelephony, livestreaming and social media, and security. Webcams can be built-in computer hardware or peripheral d ...
and activate it without the webcam owner's permission. The remotely activated webcam can be used to watch anything within the webcam's field of vision, sometimes including the webcam owner themselves. Camfecting is most often carried out by infecting the victim's computer with a virus that can provide the hacker access to their webcam. This attack is specifically targeted at the victim's webcam, and hence the name ''camfecting'', a
portmanteau A portmanteau word, or portmanteau (, ) is a blend of wordsTrojan software through which the camfecter can control the victim's webcam. The camfecter virus installs itself silently when the victim runs the original application. Once installed, the camfecter can turn on the webcam and capture pictures/videos. The camfecter software works just like the original webcam software present in the victim computer, the only difference being that the camfecter controls the software instead of the webcam's owner.


Notable cases

Marcus Thomas, former assistant director of the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and its principal Federal law enforcement in the United States, federal law enforcement age ...
's Operational Technology Division in Quantico, said in a 2013 story in ''
The Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large nati ...
'' that the FBI had been able to covertly activate a computer's camera—without triggering the light that lets users know it is recording—for several years. In November 2013, American teenager Jared James Abrahams pleaded guilty to hacking over 100-150 women and installing the highly invasive malware
Blackshades Blackshades is a malicious trojan horse used by hackers to control infected computers remotely. The malware targets computers using operating systems based on Microsoft Windows. According to US officials, over 500,000 computer systems have been in ...
on their computers in order to obtain nude images and videos of them. One of his victims was Miss Teen USA 2013
Cassidy Wolf Cassidy Marie Wolf (born July 5, 1994) is an American TV host, model and beauty queen who was crowned Miss Teen USA 2013. Pageants While attending Great Oak High School in Temecula, she was crowned Miss Greater San Diego Teen USA. Wolf was crow ...
. Researchers from
Johns Hopkins University Johns Hopkins University (Johns Hopkins, Hopkins, or JHU) is a private university, private research university in Baltimore, Maryland. Founded in 1876, Johns Hopkins is the oldest research university in the United States and in the western hem ...
have shown how to covertly capture images from the iSight camera on MacBook and iMac models released before 2008, by reprogramming the microcontroller's
firmware In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide h ...
.


Risk sources

A computer that does not have an up-to-date webcam software or any ''anti-virus'' (or firewall) software installed and operational may be at increased risk for camfecting.
Softcam A softcam is essentially a software-based camera. Softcams are computer software (that technically do not replace webcams) that allows one to stream or broadcast image, video, and/or audio files through a virtual webcam device. This allows the ...
s may nominally increase this risk, if not maintained or configured properly.


Preventive software

Recently{{when, date=December 2019 webcam privacy software was introduced by such companies such as Stop Being Watched or Webcamlock. The software exposes access to a webcam, and prompts the user to allow or deny access by showing what program is trying to access the webcam. Allowing the user to accept a trusted program the user recognizes, or terminate the attempt immediately. There is now a market for the manufacture and sale sliding lens covers that allow users to physically block their computer's camera and, in some cases, microphone.


See also

*
Espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangibl ...
*
Internet privacy Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via Internet. Internet privacy is a subset of data privacy. Pr ...
*
Optic Nerve (GCHQ) Optic Nerve is a mass surveillance programme run by the British signals intelligence agency Government Communications Headquarters (GCHQ), with help from the US National Security Agency, that surreptitiously collects private webcam still images from ...
*
Secret photography Secret photography refers to the use of an image or video recording device to photograph or film a person who is unaware that they are being intentionally photographed or filmed. It is sometimes called covert photography. A person may be unawa ...
*
Surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
*
Trojan Trojan or Trojans may refer to: * Of or from the ancient city of Troy * Trojan language, the language of the historical Trojans Arts and entertainment Music * ''Les Troyens'' ('The Trojans'), an opera by Berlioz, premiered part 1863, part 1890 ...
*
Webcam A webcam is a video camera which is designed to record or stream to a computer or computer network. They are primarily used in videotelephony, livestreaming and social media, and security. Webcams can be built-in computer hardware or peripheral d ...


References


External links


Web cam hacking virus alert



Webcam under hacker's control

Data Privacy Day

Camfecting Info Blog
Computer security Computing culture Cyberwarfare Hacking (computer security) Videotelephony