• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Critical FortiSIEM flaw under active exploitation, Fortinet warns

 | 

Charon Ransomware targets Middle East with APT attack methods

 | 

Hackers leak 2.8M sensitive records from Allianz Life in Salesforce data breach

 | 

SAP fixed 26 flaws in August 2025 Update, including 4 Critical

 | 

August 2025 Patch Tuesday fixes a Windows Kerberos Zero-Day

 | 

Dutch NCSC: Citrix NetScaler zero-day breaches critical orgs

 | 

Chrome sandbox escape nets security researcher $250,000 reward

 | 

Smart Buses flaws expose vehicles to tracking, control, and spying

 | 

MedusaLocker ransomware group is looking for pentesters

 | 

Google confirms Salesforce CRM breach, faces extortion threat

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57

 | 

Security Affairs newsletter Round 536 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Embargo Ransomware nets $34.2M in crypto since April 2024

 | 

Germany limits police spyware use to serious crimes

 | 

Phishing attacks exploit WinRAR flaw CVE-2025-8088 to install RomCom

 | 

French firm Bouygues Telecom suffered a data breach impacting 6.4M customers

 | 

Columbia University data breach impacted 868,969 people

 | 

SonicWall dismisses zero-day fears after Ransomware probe

 | 

Air France and KLM disclosed data breaches following the hack of a third-party platform

 | 

CISA, Microsoft warn of critical Exchange hybrid flaw CVE-2025-53786

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Hacking
  • Hacktivism
  • Internet of Things
  • Security
  • Exposed security cameras in Israel and Palestine pose significant risks

Exposed security cameras in Israel and Palestine pose significant risks

Pierluigi Paganini October 10, 2023

Many poorly configured security cameras are exposed to hacktivists in Israel and Palestine, placing the owners using them and the people around them at substantial risk.

After the Hamas attacks on Israel, the cyber war has also started between both sides and their supporters. Hacktivists have already targeted SCADA and ICS systems in Israel and Palestine, and other exposed systems are their next potential target.

The Cybernews research team has found at least 165 exposed internet-connected RTSP cameras in Israel and 29 exposed RTSP cameras in Palestine, which are open and accessible to anyone. Many more could be vulnerable.

RTSP stands for real-time streaming protocol. While this communication system is useful for transferring real-time data, it offers neither encryption nor lockout mechanisms against password-guessing.

“Only basic skills are needed for a bad actor to find a camera and brute-force login credentials, as well-known software tools and basic tutorials have long been in the wild. Exposed RTSP cameras can pose several risks and dangers in a cyberwar scenario,” researchers warn.

There are at least 37 exposed RTSP cameras in Tel Aviv, 16 in Potah Tiqva, and 13 in Rishon LeZion.

In Palestine, most of the exposed cameras are in the West Bank, which may be related to Israel’s electricity blockade in the Gaza strip.

Militants may watch and exploit vulnerable cameras

The first and most significant risk of exposed IP cameras is hackers gaining access. This would allow them to view live feeds and record footage, which could be used for surveillance, reconnaissance, or gathering sensitive information.

“Exposed cameras can invade people’s privacy if they are located in private or sensitive areas. Personal information, daily routines, or confidential conversations may be recorded and misused. This information could be used for intelligence gathering, espionage, or blackmail,” researchers write.

While individuals are at risk, it’s organizations or even government facilities that cyber adversaries are mainly interested in. Access to their RTSP cameras may provide a foothold for attackers to penetrate the network that the cameras are connected to. Once inside the network, they could move laterally to compromise other systems or steal data.

“Attackers might manipulate camera feeds to show misleading information, creating confusion or panic. For example, altering security camera footage to hide a break-in or to make it appear as if an event occurred when it did not,” researchers warn.

Also, like any other smart device, exposed cameras could be exploited by cybercriminals building botnets for denial of service (DDoS) attacks or any other malicious activities.

Therefore, the owners of exposed devices carry the responsibility not only for their own security but also for protecting the community.

Hide cameras with encrypted protocols and strong credentials

Separation and encryption, along with solid credentials, are the strategies that Cybernews researchers recommend to secure RTSP cameras.

In the best case, all security or other IP cameras should be connected to a separate protected subnet with end-to-end encryption, or WPA2 (Wi-Fi Protected Access 2), if the network is wireless.

  • Use encryption mechanisms to secure communications between the camera and the viewing client. A virtual private network (VPN) for remote access is preferred.
  • Ensure that RTSP cameras require solid and unique passwords for access. Using default or weak passwords is a common mistake that can easily lead to unauthorized access.
  • Keep camera firmware up to date to address security vulnerabilities and improve overall system security.
  • Implement access controls to limit who can view the camera feeds. This could involve using IP whitelisting or a VPN for remote access.
  • Consider moving to protocols that provide encryption such as HTTPS.

More info at the original post at: https://cybernews.com/security/exposed-security-cameras-pose-risk-in-israel-palestine/

You can read Cybernews’ research on exposed RTSP cameras worldwide for more details about the risks.

About the author: Ernestas Naprys at Senior Journalist Cybernews

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – security cameras, Israel)


facebook linkedin twitter

you might also like

Pierluigi Paganini August 13, 2025
Critical FortiSIEM flaw under active exploitation, Fortinet warns
Read more
Pierluigi Paganini August 13, 2025
Charon Ransomware targets Middle East with APT attack methods
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Critical FortiSIEM flaw under active exploitation, Fortinet warns

    Hacking / August 13, 2025

    Charon Ransomware targets Middle East with APT attack methods

    Malware / August 13, 2025

    Hackers leak 2.8M sensitive records from Allianz Life in Salesforce data breach

    Data Breach / August 13, 2025

    SAP fixed 26 flaws in August 2025 Update, including 4 Critical

    Uncategorized / August 13, 2025

    August 2025 Patch Tuesday fixes a Windows Kerberos Zero-Day

    Hacking / August 12, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT