By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Online Tech Guru
  • News
  • PC/Windows
  • Mobile
  • Apps
  • Gadgets
  • More
    • Gaming
    • Accessories
    • Editor’s Choice
    • Press Release
Reading: From Ukraine to Iran, Hacking Security Cameras Is Now Part of War’s ‘Playbook’
Best Deal
Font ResizerAa
Online Tech GuruOnline Tech Guru
  • News
  • Mobile
  • PC/Windows
  • Gaming
  • Apps
  • Gadgets
  • Accessories
Search
  • News
  • PC/Windows
  • Mobile
  • Apps
  • Gadgets
  • More
    • Gaming
    • Accessories
    • Editor’s Choice
    • Press Release
How Steam changes and a China strategy helped TinyBuild’s The King is Watching hit 500k sales

How Steam changes and a China strategy helped TinyBuild’s The King is Watching hit 500k sales

News Room News Room 7 March 2026
FacebookLike
InstagramFollow
YoutubeSubscribe
TiktokFollow
  • Subscribe
  • Privacy Policy
  • Contact
  • Terms of Use
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Online Tech Guru > News > From Ukraine to Iran, Hacking Security Cameras Is Now Part of War’s ‘Playbook’
News

From Ukraine to Iran, Hacking Security Cameras Is Now Part of War’s ‘Playbook’

News Room
Last updated: 6 March 2026 11:38
By News Room 5 Min Read
Share
From Ukraine to Iran, Hacking Security Cameras Is Now Part of War’s ‘Playbook’
SHARE

For decades, satellites, drones, and human spotters have all been part of war’s surveillance and reconnaissance tool kit. In an age of cheap, insecure, internet-connected consumer devices, however, militaries have gained another powerful set of eyes on the ground: every hackable security camera installed outside a home or on a city street, pointed at potential bombing targets.

On Wednesday, Tel Aviv–based security firm Check Point released new research describing hundreds of hacking attempts that targeted consumer-grade security cameras around the Middle East—with many apparently timed to Iran’s recent missile and drone strikes on targets that included Israel, Qatar, and Cyprus. Those camera-hijacking efforts, some of which Check Point has attributed to a hacker group that’s been previously linked to Iranian intelligence, suggest that Iran’s military has tried to use civilian surveillance cameras as a means to spot targets, plan strikes, or assess damage from its attacks as it retaliates for the US and Israeli bombings that have sparked a widening war in the region.

Iran wouldn’t be the first to adopt that camera-hacking surveillance tactic. Earlier this week, the Financial Times reported that the Israeli military had accessed “nearly all” the traffic cameras in Iran’s capital of Tehran and, in partnership with the CIA, used them to target the air strike that killed Ayatollah Ali Khamenei, Iran’s supreme leader. In Ukraine, the country’s officials have warned for years that Russia has hacked consumer surveillance cameras to target strikes and spy on troop movements—while Ukrainian hackers have hijacked Russian cameras to surveil Russian troops and perhaps even to monitor its own attacks.

Exploiting the insecurity of networked civilian cameras is, in other words, becoming part of the standard operating procedures of armed forces around the world: A relatively cheap and accessible means of getting eyes on a target hundreds of thousands of miles away. “Now hacking cameras has become part of the playbook of military activity,” says Sergey Shykevich, who leads threat intelligence research at Check Point. “You get direct visibility without using any expensive military means such as satellites, often with better resolution.”

“For any attacker who is planning military activity, it’s now a straightforward act to try it,” Shykevich adds, “because it’s easy and provides very good value for your effort.”

In the latest example of that recon technique, Check Point found that hackers had attempted to exploit five distinct vulnerabilities in Hikvision and Dahua security cameras that would have allowed their takeover. Shykevish describes dozens of attempts—which Check Point says it blocked—across Bahrain, Cyprus, Kuwait, Lebanon, Qatar, and the United Arab Emirates, as well as hundreds more in Israel itself. Check Point notes it could view attempted intrusions only on networks equipped with its firewall network appliances and that its findings are likely skewed by the company’s relatively larger customer base in Israel.

None of the five vulnerabilities are “complicated or sophisticated,” Shykevich says. All of them have been patched in previous software updates from Hikvision and Dahua and were discovered years ago—one as early as 2017. Yet as with hackable bugs in so many internet-of-things devices, they persist in security cameras because owners rarely install updates or even become aware that they’re available. (Hikvision and Dahua are both effectively banned in the United States due to security concerns; neither company responded to WIRED’s request for comment on the hacking campaign.)

Check Point found that the camera-hacking attempts were largely timed to February 28 and March 1, just as the US and Israel were beginning their air strikes across Iran. Some of the attempted camera takeovers also occurred in mid-January, as protests spread across Iran and the US and Israel made preparations for their attacks. Check Point says it has tied the targeting of the cameras to three distinct groups it believes to be Iranian in origin, based on the servers and VPNs they used to carry out the campaign. Some of those servers, Shykevich notes, have been previously linked in particular to the Iranian hacker group known as Handala, which several cybersecurity companies have identified as working on behalf of Iran’s Ministry of Intelligence and Security.

Share This Article
Facebook Twitter Copy Link
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The Trump administration says it can’t process tariff refunds because of computer problems

The Trump administration says it can’t process tariff refunds because of computer problems

News Room News Room 6 March 2026
FacebookLike
InstagramFollow
YoutubeSubscribe
TiktokFollow

Trending

Pokémon Card Market Watch: The Biggest Price Spikes to Check Out This Week

This week has been historic for Pokémon, as we celebrated the franchise’s 30th anniversary with…

6 March 2026

Review: Marley Spoon Meal Kit

This included a Persian turmeric chicken with dill-currant rice that fits seamlessly into Marley Spoon's…

6 March 2026

Valve’s Steam Machine may not launch this year

Valve still can’t reveal details about the Steam Machine, Steam Frame, and Steam Controller launch…

6 March 2026
News

This Jammer Wants to Block Always-Listening AI Wearables. It Probably Won’t Work

This Jammer Wants to Block Always-Listening AI Wearables. It Probably Won’t Work

Deveillance also claims the Spectre can find nearby microphones by detecting radio frequencies (RF), but critics say finding a microphone via RF emissions is not effective unless the sensor is…

News Room 6 March 2026

Your may also like!

GDC Awards 2026 to recognise Don Daglow and Rebecca Heineman
Gaming

GDC Awards 2026 to recognise Don Daglow and Rebecca Heineman

News Room 6 March 2026
72 ‘Buy It for Life’ Products: Cast-Iron, Tools, Speakers, Chairs, and More
News

72 ‘Buy It for Life’ Products: Cast-Iron, Tools, Speakers, Chairs, and More

News Room 6 March 2026
Grammarly is using our identities without permission
News

Grammarly is using our identities without permission

News Room 6 March 2026
The Future of Iran’s Internet Is More Uncertain Than Ever
News

The Future of Iran’s Internet Is More Uncertain Than Ever

News Room 6 March 2026

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site.

Read our privacy policy for more information.

Quick Links

  • Subscribe
  • Privacy Policy
  • Contact
  • Terms of Use
Advertise with us

Socials

Follow US
Welcome Back!

Sign in to your account

Lost your password?