
"The cameras were located in offices that have been officially closed for nearly a year. In a statement to Ars Technica, a Cloudflare spokesperson said: "We were alerted that the Verkada security camera system that monitors main entry points and main thoroughfares in a handful of Cloudflare offices may have been compromised. Newsweek has not independently verified videos from the alleged breach. "Our internal security team and external security firm are investigating the scale and scope of this issue, and we have notified law enforcement," the representative said. Another post alluded to the hackers' motives, asking: "What if we just absolutely ended surveillance capitalism in two days?"Ī Verkada spokesperson said the company had disabled all of its internal administrator accounts in order to prevent any unauthorized access. "I cannot guarantee this twitter account will survive long," they wrote Tuesday, based on a snapshot from the Internet Archive.

Prior to the deletion, they tweeted multiple screenshots from the live security feeds. Kottman, who had been tweeting under the handle has been contacted for comment about the suspension and the Verkada hacking by Newsweek. As such, we don't permit the use of our services to directly distribute content obtained through hacking by the people or groups associated with a hack." "We do not condone attempts to compromise or infiltrate computer systems. "The use of hacks and hacking to exfiltrate information from private computer systems can be used to manipulate the public conversation, and makes all of us less secure online," the social network said in a blog post published in October 2020. The reason for Kottmann's account suspension was not immediately clear, but Twitter's rules say it's against the website's policies to share hacked information. It's not clear how many customers deploy facial recognition. On its website, Verkada suggests more than 5,200 enterprise organizations use its tech, highlighting The Salvation Army, Equinox Fitness Club and the City of Parkersburg in West Virginia. In another case, the hackers told Bloomberg they were able to peer through cameras looking at ICU beds inside a hospital in Texas. In one video, an exposed camera from a Massachusetts police station showed officers questioning a handcuffed man.

It denied its factory in Shanghai or any of its showrooms were affected, and said there was no security risk. That gave the group "root" control over cameras, meaning they could easily be accessed and viewed.Īccording to the hackers, video was available from over 200 cameras in Tesla factories and warehouses, and 330 cameras in Alabama's Madison County Jail.īut Reuters reported on Wednesday that Tesla China said the incident was limited to one of its suppliers' production sites in the Henan province. Kottmann told Bloomberg the hacking collective had infiltrated Verkada's network via a "super admin" account after credentials were left vulnerabile. Footage exposed in the cyberattack was from a variety of users, including police departments, prisons, schools, hospitals and businesses-the most high-profile appearing to be Tesla and Cloudflare.

The breach was first reported by Bloomberg. One 2019 Verkada blog post said: "Users can search and filter based on many different attributes, including gender traits, clothing color, and even a person's face." Bitcoin Surges on Retail Investors Bullish on Crypto, Wary of Dollar.Gab CEO Condemns Threats of Violence Against Social Network's Hackers.Hackers Target Tesla, Sandy Hook School in Sweeping Security Camera Breach.
