(San Francisco) Tens of thousands of CCTV cameras from start-up Vercada set up in Tesla factories, hospitals, prisons, schools and other institutions have been hacked by hackers who have released stolen footage on Twitter.
“Have you ever wondered what the interior of a Tesla warehouse looks like? An account of the “APT-69 420 Orson Cats” group known as “Toti Crime” tweeted on Tuesday, with an alleged photo of the plant and the hashtag #OperationPanopticon.
“What if we end surveillance capitalism in two days?” Between different photos and videos of the same consumer companies and organizations, an employee dancing in a utility room at a bank in Utah to office chairs stacked at Equinox (a physical training company).
“We have suspended all internal admin accounts to prevent unauthorized access,” a Varkada spokesman said in response to an AFP request.
“Our internal security team and our external partner are examining the extent and scope of this issue, and we have informed the police,” he said, adding that the company has informed customers and has a dedicated communication channel to answer their questions. .
Automaker Tesla, a service provider for several websites, posted screenshots of the hacker account to show that they had access to computer surveillance systems used by Cloudflare.
“It’s just the tip of the iceberg,” they said.
“There’s an irony in exposing state intelligence and suddenly keeping all pairs of eyes on you,” they still laugh.
U.S. media reported that the account belonged to Tilly Cotman, an engineer in the hacker group.
Whatever their motivations, the attack will cause permanent damage to Vercada’s image.
Rick Holland, Security Manager at Cybersecurity Digital Shadows, responded by calling the company a “safe and lightweight scale” as an alternative to internal video recording networks.
But the intrusion is “an example of the risks associated with our ‘sourcing’ of this type of service to cloud providers”.
He believes hacking is undoubtedly the theft of personal data, and that legal action can be taken.
Other computer security experts believe that the hackers gained access to Vercada’s infrastructure through a “super administrator” account through phishing.