- Building inspection
- Fire alarms system testing
- Household appliances
- Installation materials
- Industrial machinery
- IT & audio video
- Laboratory, test & measurement
- Lighting equipment
- Maritime, oil & gas
- Medical & healthcare equipment
- Military & aerospace product testing
- Wireless & telecom
We all know that connected products often have vulnerabilities, but now we're witnessing a devastating example of cybersecurity vulnerabilities with the Russian military intelligence's hacking into Ukrainian surveillance cameras. This breach, aimed at spying on Ukraine's air defenses and critical infrastructure, starkly highlights the dangers of products with substandard cybersecurity.
During a series of intensive missile and drone strikes on Kyiv, over 250,000 people were left without internet and electricity, exacerbating the harsh winter conditions. The Security Service of Ukraine (SBU) responded by blocking and dismantling the compromised cameras, and urged users to halt the online transmission and monitoring of security camera feeds. The breach involved the use of surveillance cameras to prepare and adjust military strikes on Kyiv.
President Volodymyr Zelenskyy reported five casualties and over 130 injuries due to the ongoing assaults on Kyiv and Kharkiv. Serhiy Popko, head of the Kyiv City Military Administration, later announced an increased death toll, marking it as the capital's worst tragedy since the full-scale invasion began.
The attack's sophistication was evident as Russian intelligence monitored the strikes by hacking into privately owned online surveillance cameras. Hackers gained remote access, altered camera angles, and used platforms like YouTube for real-time monitoring, turning everyday devices into espionage tools.
This incident is not isolated. Radio Free Europe reported long-standing Kremlin access to surveillance camera footage across Ukraine, with cameras manufactured by a Moscow-based firm using Russian software capable of tracking movements via facial recognition and license plate monitoring. These findings underscore the risks associated with foreign-controlled cybersecurity systems in critical infrastructure.
The Ukrainian government, recognizing these threats, began phasing out Russian software post-invasion. However, the SBU had already blocked over 10,000 surveillance cameras since the invasion's onset, showcasing the extensive reach of the breach.
The implications of these cyberattacks extend beyond surveillance. They disrupted internet and power supply services, affecting hundreds of thousands of residents. DTEK, an energy company, reported missile damages to power grid equipment, causing widespread blackouts. The outages not only impacted civilian life but also hampered emergency responses and critical infrastructure functionality.
These events underline the crucial need for manufacturers to adhere to robust cybersecurity standards. As connected products become increasingly integral to both civilian and military infrastructure, their vulnerability to hacking can have dire consequences. Manufacturers must prioritize cybersecurity, not as an afterthought, but as a core aspect of product design and functionality.
Moreover, authorities worldwide are recognizing the urgency of this issue. With the UK implementing mandatory cybersecurity requirements for connected products from April this year and the EU is to follow suit next year, there is a clear shift towards legislating cybersecurity standards. These measures aim to protect not just individual consumers but also national security and critical infrastructure.
In conclusion, the Ukrainian conflict serves as a stark reminder of the dangers posed by inadequate cybersecurity in connected products. It's a call to action for manufacturers to embrace existing cybersecurity standards and for authorities to enforce robust regulatory frameworks. As our world becomes increasingly interconnected, the line between digital security and physical safety is blurring, necessitating a proactive and comprehensive approach to cybersecurity. Now, whilst the Ukrainian situation is extreme, vulnerabilities exploited by criminals during more normal situations may also put people in harm’s way.
Want some help to get started? – Book a free online meeting with one from our cybersecurity team.
Tags: Cyber security
Geir Hørthe is responsible for the Nemko cyber security initiative. He has worked at Nemko for more than 30 years, in the capacity of test services, lab manager of safety, ATEX and medical departments. He has also been Managing Director at the Nemko office in London for two years. After he returned to Norway, he held...