Intensified Targeting of IP Cameras by Iranian Threat Actors in the Middle East Conflict
During the recent hostilities in the Middle East, Check Point Research has identified increased malicious activity targeting IP cameras from specific manufacturers. This campaign commenced on February 28 and has predominantly focused on Israel, but has also extended to Qatar, Bahrain, Kuwait, the UAE, and Cyprus, with additional targeting in Lebanon observed on March 1. Such activities appear to correlate with heightened geopolitical tensions and military operations in the region.
Attackers are leveraging infrastructure attributed to Iranian threat actors, combining commercial VPNs and virtual private servers for their operations. Notably, the attacks have concentrated on vulnerabilities related to Hikvision and Dahua cameras, seeking to exploit specific weaknesses. The vulnerabilities in question include several CVEs, all related to improper authentication and command injection, underscoring a systematic approach toward security flaws in widely used surveillance equipment.
The detected activity closely aligns with geopolitical events, creating potential indicators of forthcoming kinetic military actions. Historical patterns show that cyber operations, such as camera compromises, likely serve not only tactical purposes but also support battle damage assessments, suggesting a strategic integration of cyber tactics within broader military strategies.
Defensive Context
Organizations employing Hikvision and Dahua IP cameras across the Middle East must consider the implications of this targeting. The identified vulnerabilities represent a tangible risk, especially for entities in geopolitically sensitive regions or those involved in critical infrastructure. Conversely, businesses in areas uninvolved in the conflict may not face immediate risks from this specific threat landscape.
Why This Matters
The targeting of surveillance cameras can provide attackers with valuable reconnaissance capabilities, enabling them to assess the effectiveness of missile strikes and modify operations accordingly. This risk is particularly pronounced for defense contractors, government facilities, and critical infrastructure within directly impacted nations.
Defender Considerations
Entities utilizing these camera types should be vigilant regarding the identified vulnerabilities, including CVE-2017-7921, CVE-2021-36260, CVE-2023-6895, CVE-2025-34067, and CVE-2021-33044, ensuring proper configurations and security practices. While the article does imply a potential monitoring approach through the identification of attacker IP infrastructure, specific mitigation steps beyond structural recommendations listed in the article are not included.
Indicators of Compromise (IOCs)
The article did not provide direct IOCs beyond identifying the associated CVEs and the types of cameras targeted. However, the mentioned targeting infrastructure comprises popular VPN services that attackers may exploit, further indicating reconnaissance efforts rather than established breach patterns.



