top of page

Cyber Espionage: Iran-Backed Hackers Target IP Cameras in Israel and Gulf States

  • Mar 8
  • 2 min read

Key Findings:


  • Iran-linked hackers targeted IP cameras across Israel and several Gulf countries, including the UAE, Qatar, Bahrain, and Kuwait, as well as Lebanon and Cyprus.

  • The goal appears to be reconnaissance and real-time monitoring to support intelligence gathering and potential military targeting.

  • Threat actors targeted vulnerabilities in Hikvision and Dahua IP cameras, such as improper authentication, command injection, and remote code execution flaws.

  • Scanning and exploitation attempts have spiked since late February, often aligning with geopolitical tensions in the region.

  • Similar patterns were observed during the June 2025 Israel-Iran conflict, when compromised cameras were likely used for reconnaissance and battle damage assessment.


Background


Cyber operations are increasingly used to support military activity and battle damage assessment (BDA). During the current Israel-Iran tensions, researchers from Check Point Software Technologies observed a surge in attacks targeting IP cameras across Israel and Gulf countries.


The activity, attributed to Iran-linked actors, relied on VPN and VPS infrastructure to scan devices, mainly Hikvision and Dahua Technology cameras, for known vulnerabilities. Researchers believe the goal was reconnaissance and real-time monitoring to support intelligence gathering and potential military targeting.


Targeted Vulnerabilities


The threat actors targeted the following vulnerabilities in Hikvision and Dahua devices:


  • CVE-2017-7921: Improper authentication vulnerability in Hikvision IP camera firmware

  • CVE-2021-36260: Command injection vulnerability in the Hikvision web server component

  • CVE-2023-6895: OS command injection vulnerability in Hikvision Intercom Broadcasting System

  • CVE-2025-34067: Unauthenticated remote code execution vulnerability in Hikvision Integrated Security Management Platform

  • CVE-2021-33044: Authentication bypass vulnerability in multiple Dahua products


Exploitation Attempts


Researchers analyzed exploitation attempts for CVE-2021-33044 and CVE-2017-7921 linked to infrastructure attributed to Iran. They also noted that proof-of-concept exploit code for the Dahua vulnerabilities has been publicly available since October 2021.


Timing of Attacks


Since early 2026, scanning activity targeting IP cameras has surged across Israel and several Middle East countries, often aligning with geopolitical tensions such as protests in Iran, U.S. military visits to Israel, and fears of potential strikes. Similar patterns appeared during the June 2025 Israel-Iran conflict.


Potential Military Applications


One case involved a camera near Israel's Weizmann Institute being compromised just prior to a missile strike on the facility. Researchers believe the compromised cameras were likely used for reconnaissance and battle damage assessment.


Recommendations for Defenders


  • Reduce public internet access to cameras and place them behind VPN or zero-trust gateways

  • Change default passwords, enforce strong unique credentials, and keep device firmware updated

  • Run cameras on isolated network segments with restricted outbound traffic

  • Monitor for repeated login failures, suspicious remote access, and unusual outbound connections


Sources


  • https://securityaffairs.com/189069/cyber-warfare-2/iran-linked-hackers-target-ip-cameras-across-israel-and-gulf-states-for-military-intelligence.html

  • https://www.wsj.com/livecoverage/iran-israel-us-strikes-2026/card/iran-attempts-to-hack-security-cameras-in-israel-and-gulf-countries-says-cyber-firm-n1QYjX8DxxBjYT1R6ZGq

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page