With the huge increase of people working from home due to Covid-19, millions of home laptops and desktops are laying around open, and with Zoom calls demanding our cameras to be open, webcam hacking even is a hot commodity for hackers these days. Webcam hacking, or ‘camfecting’ (camera + infecting), is a hacking technique that enables the hacker to remotely take control over another person’s webcam, without that person’s knowledge or permission.
Considering Facebook’s founder Mark Zuckerberg covers his very own computer camera, you should probably protect yours too, especially in light of recent webcam-related program breaches, such as Zoom’s latest security breach.
But it’s not just laptop and desktop cameras that are at risk. Mobile phone camera hacking is also possible, and with newer phones that have cameras in both the front and back, it is even easier to hack and gives more information to the hacker.
Webcam hacking typically occurs when a computer is infected with a specific Trojan virus that’s aimed to grant access to a person’s webcam, usually through an application that the user intended to download. When the user installs the application, the virus installs itself, and the hacker behind it can gain access to the webcam and record pictures and videos from it.
Two common ways to download the application are first through remote administrative tool (RAT), such as email, and second through false remote tech sessions, like those for support.
Because oftentimes the virus can work by not showing you that the camera is on (i.e. the camera light is off), it is hard to tell when you’ve been hacked. An example would be the FBI, who used this tactic to catch a suspect related to several bomb threats in 2013.
As interesting and appealing you may think you are, hackers are less interested in your personal life for entertainment reasons. They could, however, snap sensitive photos of you in order to extort money from you. At the end of the day, they care about financial gain.
Picture the following scenario: You’re in your home and you had just ordered groceries over the phone. You give the store not only your credit card details, but your full name, phone number, and the address to your house. The hacker now has everything they need from you to steal your identity and finances, and may even learn what times you’re not home to try to physically break in.