Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cyber Attacks on IP Cameras Surge Amid Middle East Tensions

Cyber Attacks on IP Cameras Surge Amid Middle East Tensions

Posted on March 5, 2026 By CWS

Recent developments in the Middle East have highlighted a concerning rise in cyber attacks targeting internet-connected IP cameras. These attacks, reportedly linked to Iranian threat actors, have intensified since February 2026, posing a significant risk to regional security.

Escalating Cyber Threats in the Middle East

The cyber campaign began in late February 2026, with a noticeable increase in attempts to compromise IP cameras across several countries, including Israel, the UAE, Qatar, Bahrain, Kuwait, Lebanon, and Cyprus. The attackers utilized commercial VPN services such as Mullvad, ProtonVPN, Surfshark, and NordVPN to obscure their origins, pointing to sophisticated planning and execution.

Check Point Research has been closely monitoring the situation, noting that these cyber activities are strategically timed with major geopolitical events. For instance, a significant spike in exploitation was recorded in January 2026, aligning with Iran’s temporary airspace closure over fears of a potential U.S. military operation.

Targeting High-Value Surveillance Devices

The primary targets of these cyber attacks are IP cameras produced by Hikvision and Dahua, two of the most widely deployed manufacturers in the region. These devices are integral to public surveillance and are found in critical infrastructure and commercial buildings, making them valuable for real-time intelligence gathering.

Exploitation attempts have not targeted cameras from other manufacturers, suggesting a deliberate focus on these particular brands. Such actions highlight the use of camera compromise as a tool in kinetic warfare, as evidenced during the June 2025 conflict between Israel and Iran, where compromised cameras were likely used for battle assessments.

Addressing Known Vulnerabilities

Check Point Research has identified five specific vulnerabilities being exploited in Hikvision and Dahua devices. These include CVE-2017-7921, CVE-2021-36260, CVE-2023-6895, CVE-2025-34067, and CVE-2021-33044, covering issues from improper authentication to remote code execution.

Despite the availability of patches for these vulnerabilities, many devices remain unpatched, exposing them to attacks. Organizations are advised to implement immediate security measures, such as removing cameras from direct internet access, updating firmware, and employing strong authentication practices.

To further mitigate risks, surveillance systems should be isolated on VLANs with restricted outbound communication. Continuous monitoring for suspicious activities is essential to safeguard against these persistent threats.

Stay informed about the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Set CSN as a preferred source for timely updates.

Cyber Security News Tags:cyber espionage, Cybersecurity, Dahua, Hikvision, IP cameras, Iranian threat actors, Middle East conflict, security patches, surveillance systems, Vulnerabilities

Post navigation

Previous Post: Russian Hacker Pleads Guilty Over Phobos Ransomware
Next Post: Enhancing Windows Security: Tackling MFA and Credential Risks

Related Posts

CastleBot Malware-as-a-Service Deploys Range of Payloads Linked to Ransomware Attacks CastleBot Malware-as-a-Service Deploys Range of Payloads Linked to Ransomware Attacks Cyber Security News
LLM Passwords Show Security Risks Due to Predictability LLM Passwords Show Security Risks Due to Predictability Cyber Security News
Microsoft 365 Outage Disrupts North American Admin Access Microsoft 365 Outage Disrupts North American Admin Access Cyber Security News
COLDRIVER APT Group Uses ClickFix To Deliver a New PowerShell-Based Backdoor BAITSWITCH COLDRIVER APT Group Uses ClickFix To Deliver a New PowerShell-Based Backdoor BAITSWITCH Cyber Security News
Critical InputPlumber Vulnerabilities Allows UI Input Injection and Denial-of-Service Critical InputPlumber Vulnerabilities Allows UI Input Injection and Denial-of-Service Cyber Security News
Managing Data Subject Access Requests in Compliance Programs Managing Data Subject Access Requests in Compliance Programs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Preparing for Quantum Security: A Crucial Webinar
  • Reclaim Security Secures $26M for Cybersecurity Innovation
  • Half of 2025’s Zero-Day Exploits Target Businesses: Google
  • Cyber Threats: Key Updates on Malware, Privacy, and Security
  • Drone Strikes Disrupt AWS Services in UAE Region

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Preparing for Quantum Security: A Crucial Webinar
  • Reclaim Security Secures $26M for Cybersecurity Innovation
  • Half of 2025’s Zero-Day Exploits Target Businesses: Google
  • Cyber Threats: Key Updates on Malware, Privacy, and Security
  • Drone Strikes Disrupt AWS Services in UAE Region

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News