A group of hackers broke into Silicon Valley startup Verkada Inc., and gained access to live feeds of over 150,000 surveillance cameras inside Tesla’s Shanghai facility, Cloudflare Inc. Madison County jail, a Florida hospital, and even a school.
Companies whose security footage were exposed include carmaker Tesla Inc. and software provider Cloudflare Inc. Hackers were able to view video from inside women’s health clinics, psychiatric hospitals and few offices of Verkada itself. Some of the cameras, including in hospitals, use facial-recognition technology to identify people. The hackers say they also have access to the full video archive of all Verkada customers.
In a video seen by Bloomberg, a Verkada camera inside Florida hospital Halifax Health showed what appeared to be eight-hospital staffers tackling a man and pinning him to a bed. Halifax Health is featured on Verkada’s public-facing website in a case study entitled: “How a Florida Healthcare Provider Easily Updated and Deployed a Scalable HIPAA Compliant Security System.” Halifax’s spokesman confirmed Wednesday that it uses Verkada cameras but added that “we believe the scope of the situation is limited.”
The hackers’ methods were unsophisticated: they gained access to Verkada security systems through a ‘Super Admin’ account, that allowed them to see footage of all Verkada customers’ security cameras. Kottmann says they found a user name and password for an administrator account that was allegedly available on the Internet.
Another video, shot inside a Tesla warehouse in Shanghai, shows workers on an assembly line. The hackers said they obtained access to 222 cameras in Tesla factories and warehouses.
The data breach was carried out by an international hacker collective and intended to show the pervasiveness of video surveillance and the ease with which systems could be broken into, said Tillie Kottmann, one of the hackers who claimed credit breaching San Mateo, California-based Verkada. Kottmann, who uses they/them pronouns, previously claimed credit for hacking chipmaker Intel Corp. and carmaker Nissan Motor Co.
Kottmann said their reasons for hacking are “lots of curiosity, fighting for the freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism — and it’s also just too much fun not to do it.”
“We have disabled all internal administrator accounts to prevent any unauthorised access,” a Verkada spokesperson said in a statement.
“Our internal security team and external security firm are investigating the scale and scope of this issue, and we have notified law enforcement.”
A person with knowledge of the matter said Verkada’s chief information security officer, an internal team and an external security firm investigate the incident. The company is working to notify customers and set up a support line to address questions, said the person requested anonymity to discuss an ongoing investigation.
“We were alerted that the Verkada security camera system that monitors main entry points and main thoroughfares in a handful of Cloudflare offices may have been compromised,” San Francisco-based Cloudflare said in a statement. “The cameras were located in a handful of offices that have been officially closed for several months.” The company said it disabled the cameras and disconnected them from office networks.
Tesla said that “based on our current understanding, the cameras being hacked are only installed in one of our suppliers, and the product is not being used by our Shanghai factory or any of our Tesla stores or services centres. Our data collected from Shanghai factories and other places mentioned are stored on local servers.”
Other companies identified in this story didn’t immediately respond to requests for comment. Representatives of the jails, hospitals and schools named in this article either declined to comment or didn’t immediately respond to requests for comment.
A video seen by Bloomberg shows officers in a police station in Stoughton, Wisconsin, questioning a man in handcuffs. Sgt. Andrew Johnson, an official in Stoughton, confirmed to Bloomberg News that the department uses Verkada cameras. The hackers say they also gained access to Sandy Hook Elementary School’s security cameras in Newtown, Connecticut, where a gunman killed more than 20 people in 2012.
Also available to the hackers were 330 security cameras inside the Madison County Jail in Huntsville, Alabama. Verkada offers a feature called “People Analytics,” which lets a customer “search and filter based on many different attributes, including gender traits, clothing colour, and even a person’s face,” according to a Verkada blog post. Images seen by Bloomberg show that the cameras inside the jail, some of which are hidden inside vents, thermostats and defibrillators, track inmates and correctional staff using the facial-recognition technology. The hackers say they could access live feeds and archived video, including audio interviews between police officers and criminal suspects, all in the high-definition resolution known as 4K.
Kottmann said their group could obtain “root” access on the cameras, meaning they could use the cameras to execute their code. That access could, in some instances, allow them to pivot and obtain access to the broader corporate network of Verkada’s customers or hijack the cameras and use them as a platform to launch future hacks. Obtaining this degree of access to the camera didn’t require any additional hacking, as it was a built-in feature, Kottmann said.
The hackers’ methods were unsophisticated: they gained access to Verkada through a “Super Admin” account, allowing them to peer into all of its customers’ cameras. Kottmann says they found a user name and password for an administrator account publicly exposed on the internet. After Bloomberg contacted Verkada, the hackers lost access to the video feeds and archives, Kottmann said.
The hackers say they were able to peer into multiple locations of the luxury gym chain Equinox. At Wadley Regional Medical Center, a hospital in Texarkana, Texas, hackers say they looked through Verkada cameras pointed at nine ICU beds. Hackers also say they watched cameras at Tempe St. Luke’s Hospital in Arizona and were also able to see a detailed record of who used Verkada access control cards to open particular doors and when they did so. A representative of Wadley declined to comment.
The hack “exposes just how broadly we’re being surveilled, and how little care is put into at least securing the platforms used to do so, pursuing nothing but profit,” Kottmann said. “It’s just wild how I can just see the things we always knew are happening, but we never got to see.” Kottman said they gained access to Verkada’s system on Monday morning.
Verkada, founded in 2016, sells security cameras that customers can access and manage through the web. In January 2020, it raised USD 80 million in venture capital funding, valuing the company at USD 1.6 billion. Among the investors was Sequoia Capital, one of Silicon Valley’s oldest firms.
Kottmann calls the hacking collective “Advanced Persistent Threat 69420,” a light-hearted reference to cybersecurity firms’ designations give to state-sponsored hacking groups and criminal cybergangs.
In October 2020, Verkada fired three employees after reports surfaced that workers had used its cameras to take pictures of female colleagues inside the Verkada office and make sexually explicit jokes about them. Verkada CEO Filip Kaliszan said in a statement to Vice at the time that the company “terminated the three individuals who instigated this incident, engaged in egregious behaviour targeting coworkers, or neglected to report the behaviour despite their obligations as managers.”
Jails, Homes, Offices
Kottmann said they could download the entire list of thousands of Verkada customers and the company’s balance sheet, which lists assets and liabilities. As a closely held company, Verkada does not publish its financial statements. Kottman said hackers watched through the Verkada employee’s camera, who had set one of the cameras up inside his home. One of the saved clips from the camera shows the employee completing a puzzle with his family.
“If you are a company who has purchased this network of cameras and you are putting them in sensitive places, you may not be expected that in addition to being watched by your security team that there is some admin at the camera company who is also watching,” said Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation, who was briefed on the breach by Bloomberg.
Inside Arizona’s Graham County detention facility, which has 17 cameras, videos are given titles by the center’s staff and saved to a Verkada account. One video, filmed in the “Commons Area,” is titled “ROUNDHOUSE KICK OOPSIE.” A video filmed inside the “Rear Cell Block” is called “SELLERS SNIFFING/KISSING WILLARD???” Another video filmed inside “Drunk Tank Exterior” is titled “AUTUMN BUMPS HIS HEAD.” Two videos filmed from “Back Cell” are titled “STARE OFF – DONT BLINK!” and “LANCASTER LOSES BLANKET.”
The hackers also obtained Verkada cameras in Cloudflare offices in San Francisco, Austin, London and New York. The cameras at Cloudflare’s headquarters rely on facial recognition, according to images seen by Bloomberg. “While facial recognition is a beta feature that Verkada makes available to its customers, we have never actively used it, nor do we plan to,” Cloudflare said in its statement.
Security cameras and facial-recognition technology are often used inside corporate offices and factories to protect proprietary information and guard against an insider threat, said the EFF’s Galperin.
“There are many legitimate reasons to have surveillance inside of a company,” Galperin added. “The most important part is to have the informed consent of your employees. Usually, this is done inside the employee handbook, which no one reads.”
— With assistance by Allison McCartney, and Chunying Zhang