{"id":1437,"date":"2013-03-19T13:59:23","date_gmt":"2013-03-19T17:59:23","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=1437"},"modified":"2020-02-26T18:56:22","modified_gmt":"2020-02-26T14:56:22","slug":"beware-of-webcams","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/beware-of-webcams\/1437\/","title":{"rendered":"Beware of Webcams!"},"content":{"rendered":"<p>Attackers trying to infect your computer with malware capable of remote access don\u2019t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are private conversations, photos and webcam access, and the most likely victims of such attacks are nice-looking women and teenage girls.<\/p>\n<p>Remote access applications to computers are quite popular and can be widely used for both legal and illegal purposes. Applications like Remote Desktop and TeamViewer are approved by system administrators and tech support staff, as well as by people helping others fix PC issues. But having almost identical functionality is the key part of malware, like with <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/zeus-source-code-leaked-051011\" target=\"_blank\" rel=\"noopener nofollow\">ZeuS<\/a>, which makes your PC a part of botnet and can be controlled by attackers who are maybe oceans away. Typically, attackers exploit a victim\u2019s PC for financial profit: scan disks for valuable data (payment credentials, passwords, etc.), and then use the ransacked computer for sending spam and performing DDoS attacks. However, some attackers utilize remote access just for spying on their victims to satisfy personal desires.<\/p>\n<div class=\"pullquote\">The most popular attacker activities involve searching for nude photos and spying via webcam.<\/div>\n<p>The most popular search subject for this kind of attacker is private pictures. The invader can manually scan available disks and connected mobile devices in search of the owner\u2019s private photos. The owner can also be spied upon directly if the attacker switches on an internal laptop or external USB webcam, and can then have personal photos captured. Depending on the personal habits and principles of the attacker, such photos could then be published \u201cjust for fun\u201d or they could become a <a href=\"https:\/\/me-en.kaspersky.com\/blog\/10-arrests-that-shook-the-cybercrime-underworld\/\" target=\"_blank\" rel=\"noopener\">base for blackmail<\/a>.<\/p>\n<p>In addition to spying on victims, another popular pastime amongst attackers is executing practical jokes. Specialized remote access tools for this kind of cybercriminal typically have the capability to interact with a victim: displaying messages on the screen, opening specified websites, removing taskbars or the Windows start button, opening the CD tray and so on. The panic induced by a victim who is experiencing unpredictable computer behavior can be a source of entertainment for these scoundrels.<\/p>\n<p>Unlike money-oriented attackers that often have good technical skills, amateurs who lack both resources and skill usually perform the abovementioned strikes. That is why they seldom use\u00a0malicious web sites with exploits\u00a0to infect victims and instead usually try socially engineering attacks or spreading malware through P2P file sharing. To avoid such punks, users should take extra precautions: download applications only from trusted sources, use <a href=\"https:\/\/www.kaspersky.com\/products\/home\/internet-security\" target=\"_blank\" rel=\"noopener nofollow\">comprehensive computer protection<\/a>, avoid P2P file sharing and do not click on suspicious links in e-mails and social networks. In addition, users should pay special attention to their webcams. If it is external, you can disconnect it from the USB and plug-in only when necessary, or at least direct the camera towards the wall when not in use.\u00a0 It is not possible to do this for laptops and all-in-ones, but most models are equipped with a signal light that is always on when recording. If the camera light is on when not in use, immediately disconnect the laptop\u2019s Wi-Fi and perform an <a href=\"https:\/\/www.kaspersky.com\/products\/home\/anti-virus\" target=\"_blank\" rel=\"noopener nofollow\">antivirus software<\/a> check.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attackers trying to infect your computer with malware capable of remote access don\u2019t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are<\/p>\n","protected":false},"author":32,"featured_media":1438,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[343,43,342],"class_list":{"0":"post-1437","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-attackers","9":"tag-privacy","10":"tag-webcams"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/beware-of-webcams\/1437\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/beware-of-webcams\/1437\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/beware-of-webcams\/1437\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/beware-of-webcams\/1437\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/beware-of-webcams\/1437\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/beware-of-webcams\/585\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/beware-of-webcams\/1437\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/beware-of-webcams\/1437\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/attackers\/","name":"attackers"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1437"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1437\/revisions"}],"predecessor-version":[{"id":15493,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1437\/revisions\/15493"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1438"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}