Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Conficker Worm Shipped With Police Body Cameras

Malware in Body Camera

Police body cameras acquired from Martel Electronics have been found to be infected with the notorious Conficker worm.

Malware in Body Camera

Police body cameras acquired from Martel Electronics have been found to be infected with the notorious Conficker worm.

Martel Electronics, a company based in Yorba Linda, California, specializes in video systems used by law enforcement, including in-car and body cameras used by police in the United States.

Florida-based IT services provider iPower Technologies has been working on developing a cloud-based system for police departments and government agencies to store and manage video from their cameras. While analyzing the Martel Frontline Camera, a body cam designed for police departments, iPower discovered that the devices acquired by the company for testing had been infected with a variant of Conficker, a threat also known as Downup, Downadup and Kido.

The company’s tests showed that a functional version of Conficker had been shipped with multiple cameras. Once the cameras were connected to a computer, the malware attempted to spread to other machines on the network and communicate with a command and control (C&C) server.

iPower uploaded a sample of the worm to VirusTotal, which shows that most antivirus products detect the threat based on its signature.

The computer services company said it attempted to contact Martel via phone and email last week, but it hasn’t received a response so it decided to make its findings public.

“This discovery has a huge impact, as these devices are being shipped every day to our law enforcement agencies,” said Jarrett Pavao, president of iPower.

Martel Electronics has not responded to SecurityWeek’s request for comment by the time of publication.

Advertisement. Scroll to continue reading.

Conficker, first spotted by the security community in November 2008, has infected millions of computers in hundreds of countries, being one of the largest botnets ever seen. Shortly after the threat emerged, Microsoft rushed to patch a Windows vulnerability exploited by the worm to spread, but many users failed to apply the update and the malware authors continued to improve their creation with new spreading mechanisms.

Academic researchers, Microsoft, domain registries and security firms teamed up in early 2009 to create the Conficker Working Group, an initiative whose goal was to disrupt the threat.

Despite the group’s clean-up efforts, Conficker is seen in the wild even today. In its threat report for the first half of 2014, F-Secure reported that the malware had been at the top of the infections chart, being particularly prevalent in the Middle East, South America and Asia.

Six years after the Conficker botnet was sinkholed, experts estimate that there are still nearly one million infected machines. Researchers told SecurityWeek in June that Conficker variants had been spotted in the networks of energy organizations in the United States, China and Korea.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.