Credential theft

Verkada Security Camera Network Breach: 150,000 Live Feeds Exposed

πŸ“… 2021-03-08 🏒 Verkada (cloud-managed security cameras)
Primary Source β†—

Incident Details

In March 2021, a collective including Swiss hacker Tillie Kottmann (‘deletescape’) gained access to Verkada’s global security camera management platform by discovering Verkada ‘Super Admin’ credentials exposed in a Jenkins CI/CD server. Using these credentials, the attackers gained root-level access to approximately 150,000 cameras across Verkada’s enterprise customers. Live camera feeds were accessed at Tesla manufacturing facilities, Cloudflare offices, Equinox gyms, Sandy Hook Elementary School, Halifax Health hospital, Madison County Jail, and Tempe Police Department. The attackers also scraped Verkada’s customer list. Kottmann stated the breach was conducted ‘for the lulz and the profit’ and to highlight how widespread surveillance infrastructure is. Bloomberg published screenshots and videos from the accessed cameras, creating significant privacy and security concerns. Verkada disabled internal administrator accounts and notified customers. The US Department of Justice indicted Kottmann in March 2021 on charges unrelated to the Verkada breach; Swiss authorities arrested Kottmann in September 2021.

Technical Details

Initial Attack Vector
Attackers (led by Swiss hacker Tillie Kottmann / 'deletescape') found 'Super Admin' credentials for Verkada's cloud video platform in a publicly accessible Jenkins server; used them to gain root access to all 150,000 cameras across thousands of Verkada's enterprise customers
Vendor / Product
Verkada (cloud-managed security cameras)
Software Package
Jenkins

Timeline

  1. 2021-03-08 Breach occurred
  2. 2021-03-09 Publicly disclosed
  3. 2021-03-09 Customers notified