1 min read

Iranian Hackers Hijack IP Cameras to Feed Military Ops in Middle East

Iranian Hackers Hijack IP Cameras to Feed Military Ops in Middle East

Check Point research has identified a rapid increase in Iranian threat actors compromising unsecured IP surveillance cameras across the region. By exploiting default credentials and known firmware flaws, they are pulling live video streams and embedding them into a coordinated intelligence pipeline that supports broader military campaigns throughout the Middle East.

The stolen footage gives attackers real‑time situational awareness, enabling them to plan strikes, track troop movements, and synchronize kinetic operations with precision. Defenders must prioritize securing IoT devices—enforcing strong authentication, applying firmware updates, segmenting camera networks, and monitoring for anomalous traffic—to prevent these low‑cost sensors from becoming a weaponized eyes‑in‑the‑sky.

Categories: Threat Intelligence

Source: Read original article