* [Blog](https://www2.paloaltonetworks.com/blog) * [Network Security](https://www2.paloaltonetworks.com/blog/network-security/) * [IoT Security](https://www2.paloaltonetworks.com/blog/network-security/category/iot-security/) * Are the Security Cameras ... # Are the Security Cameras in Your Organization Safe from Cyber Attacks? [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fare-your-security-cameras-safe-from-cyberattacks%2F) [](https://twitter.com/share?text=Are+the+Security+Cameras+in+Your+Organization+Safe+from+Cyber+Attacks%3F&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fare-your-security-cameras-safe-from-cyberattacks%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Fare-your-security-cameras-safe-from-cyberattacks%2F&title=Are+the+Security+Cameras+in+Your+Organization+Safe+from+Cyber+Attacks%3F&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/network-security/are-your-security-cameras-safe-from-cyberattacks/&ts=markdown) \[\](mailto:?subject=Are the Security Cameras in Your Organization Safe from Cyber Attacks?) Link copied By [Qiang Huang](https://www.paloaltonetworks.com/blog/author/qiang-huang/?ts=markdown "Posts by Qiang Huang") Mar 15, 2021 5 minutes [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [enterprise IoT](https://www.paloaltonetworks.com/blog/tag/enterprise-iot/?ts=markdown) [Security Cameras](https://www.paloaltonetworks.com/blog/tag/security-cameras/?ts=markdown) Last week's Verkada Inc. security camera breach has caught the attention of many as the newest "hair-raising" violation in the world of enterprise IoT. Most are aware by now that an international hacker collective called "Advanced Persistent Threat 69420" broke into a massive stockpile of live feeds from Verkada's web-based network of security cameras. The breach left sensitive and private video surveillance footage from its customers hacked and exposed, allowing the perpetrators to go so far as pivoting into separate corporate networks of some customer accounts. The unfortunate incident exemplifies the extent of data security and privacy violations that can occur if video surveillance data falls into the wrong hands. Though investigations continue, lessons must be learned from this shocking incident. ## **Key Indications and Lessons to be Learned** The hacker's were candid enough to divulge how they managed to [orchestrate the breach](https://www.paloaltonetworks.com/resources/8-stages-of-the-iot-attack-lifecycle.html), and it wasn't out of the ordinary. Verkada's security cameras were accessed via a publicly exposed super admin password that was readily available on the internet. After obtaining "root" access or---the authorization to execute any command on a device---the hackers weaponized the security cameras by executing their own code into them. The weaponization and subsequent hijacking of the cameras made it possible to set up the devices as springboards to perpetrate secondary attacks and access the broader corporate networks of Verkada's customers. In light of the attack, two key indications jump out at us here at Palo Alto Networks: 1. The ease with which hackers were able to obtain the admin password clearly indicates that best practices for unmanaged devices were simply not being followed at customer sites. In all likelihood, their security teams were not aware of the very existence of these security cameras in their organizations. 2. **We believe having complete visibility of all devices in the organization is the first step towards protecting them.** 3. The fact that hackers could access the broader corporate networks demonstrates that the best practice of segmenting the network to keep IoT devices partitioned from IT devices was not applied. Mixing IT and IoT devices on the same network allows malware to spread from vulnerable IoT devices to IT devices, or vice-versa, making it easy for actors to move laterally. 4. **We believe continuous risk assessment and enforcement of easily manageable trust-based security policies would have raised an alert to easily prevent this from happening.** ## **Securing IoT is on Top of Our Mind** Last year Palo Alto Networks' Unit 42 threat intelligence team[analyzed 1.2 million IoT devices](https://start.paloaltonetworks.com/unit-42-iot-threat-report) in thousands of physical locations across enterprise IT and healthcare organizations in the United States. Our research revealed some astonishing facts about IoT devices in enterprise networks and reasons behind IoT-related cyberattacks. * We found that while security cameras make up only 5% of enterprise IoT devices, they account for 33% of all security issues. The large scale [Mirai attack](https://www.theverge.com/2016/10/24/13383968/hangzhou-xiongmai-ddos-attack-iot-mirai) of 2016 that compromised thousands of webcams is a good example to refer back to. * 30% of network-connected devices in an average enterprise are IoT assets, yet most organizations have no visibility into them and fail to manage their security posture or risk profile. * Weak passwords account for 13% of IoT threats. Operational misalignment between IoT device admins and IT teams is the main cause of password-related attacks. * We found that basic network segmentation best practices that create a strong perimeter defense around network tiers aren't being followed. In the case of healthcare, for instance, 72% of healthcare VLANs mix IT and IoT (or IoMT) devices. ## **IoT Security by Palo Alto Networks Protects All Devices---Including Security Cameras** Our IoT Security allows organizations to [gain active control and full visibility](https://www.paloaltonetworks.com/resources/ebooks/the-enterprise-buyer-guide-to-iot-security) into connected devices to natively secure them at scale. It provides risk-based policy recommendations to automate enforcement on the Next-Generation firewall, seamlessly integrating with your organization's existing security posture. Coming back to security cameras, we want to leave you with data that showcases how our IoT Security effectively helps discover, monitor and secure these devices. We recently surveyed over **135,000**active cameras from customer installed base, the findings are as follows: * With machine learning, our IoT Security discovered over **134** types of cameras and surveillance devices. * Over the course of the last 12 months, our IoT Security raised **99,000** alerts on the camera devices we monitor. * Majority of the alerts raised on the camera devices are related to insecure application usage (such as FTP and HTTP) or the manufacturer's default credential usage. * **79%** of all camera devices tracked by our IoT Security use clear text HTTP and FTP protocols. * Out of the 134 types of camera devices tracked in our IoT Security database, **27.6%** use a default manufacturer login credential. * Out of all the individual camera devices we have surveyed from our customer installed base, **78.2%** use a default manufacturer login credential. * Among all the camera devices we monitor, **53.6%** were found to have at least one vulnerability. * A total of **575** vulnerabilities have been tracked in our database associated with camera devices. The Verkada breach should serve as nothing short of a wake-up call to the growing problem of IoT-focused cyberattacks in enterprise environments. It should compel organizations to give serious thought to managing IoT's risks in the interest of protecting their business operations from similar data security and privacy violations. [Connect with us](https://www.paloaltonetworks.com/network-security/iot-security) to learn more about how our industry-first IoT Security protects every single device in your network while making single-purpose sensors a thing of the past. *** ** * ** *** ## Related Blogs ### [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### You Can't Spell Platformization Without IoT](https://www2.paloaltonetworks.com/blog/network-security/you-cant-spell-platformization-without-iot/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Network Access Control](https://www.paloaltonetworks.com/blog/category/network-access-control/?ts=markdown) [#### Unlock the power of IT and security solutions with ZERO IoT blindspots](https://www2.paloaltonetworks.com/blog/network-security/zero-iot-blind-spots/) ### [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown) [#### Converged Secure Connectivity For Critical Private Infrastructure](https://www2.paloaltonetworks.com/blog/network-security/converged-secure-connectivity-for-critical-private-infrastructure/) ### [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Reports](https://www.paloaltonetworks.com/blog/category/reports/?ts=markdown) [#### 2025 Report Exposes Widespread Device Security Risks](https://www2.paloaltonetworks.com/blog/network-security/2025-report-exposes-widespread-device-security-risks/) ### [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### The Modern Firewall for the Enterprise of Connected Devices](https://www2.paloaltonetworks.com/blog/network-security/the-modern-firewall-for-the-enterprise-of-connected-devices/) ### [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### Protecting the Utility Grid's Digital Ecosystem, from Core to Edge to AI](https://www2.paloaltonetworks.com/blog/network-security/protecting-the-utility-grid-digital-ecosystem-from-core-to-edge-to-ai/) ### Subscribe to Network Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language