Bitsight TRACE has uncovered more than 40,000 security cameras openly accessible on the internet—streaming live footage from homes, offices, factories, and even sensitive datacenter rooms.
This widespread exposure, which Bitsight first flagged in 2023, shows no sign of improvement, leaving millions potentially vulnerable to unwitting surveillance, industrial espionage, and privacy invasion by anyone with a web browser and basic technical know-how.
Bitsight TRACE’s latest research scanned the entire internet for HTTP-based and RTSP-based camera feeds.
HTTP (HyperText Transfer Protocol) is the foundation of data communication for the web, while RTSP (Real-Time Streaming Protocol) is used specifically for streaming media.
Both protocols are commonly supported by surveillance cameras for remote monitoring.
A simplified example of how such scanning is performed (using common command-line tools on Linux):
bash# Example: Scanning for open RTSP cameras using nmap
nmap -p 554 --script rtsp-url-brute <target-range>
# Checking for open HTTP ports on a subnet
curl -v http://<IP_ADDRESS>:<PORT>/index.html
Such scans are typically performed using automated tools like nmap, Shodan, or custom-built crawlers that probe for default paths and ports used by cameras (such as /live.sdp
, /cam/realmonitor
, or port 80/554).
Accessing these cameras requires no sophisticated hacking. In many cases, a simple web browser is all that’s needed.
Bad actors are actively discussing and selling access to exposed feeds on dark web forums. Here’s a sample of what a typical “camera for sale” listing might look like (fictionalized for security):
rtsp://<IP>:554/live.sdp
.Brand | Default Username | Default Password |
---|---|---|
D-Link | admin | (blank) |
Hikvision | admin | 12345 |
TP-Link | admin | admin |
Dahua | admin | admin |
Organizations
Sample Bash Script for Network Camera Audit
This script checks a local subnet for HTTP devices with “camera” in their response, which can help identify exposed cameras on your network.
As surveillance technology becomes more accessible and easier to deploy, the risks of misconfiguration and cyber exposure grow exponentially.
Bitsight TRACE’s findings documented in their report “Big Brother Is Watching (And So Is Everyone Else)” paint a stark picture: security cameras intended to protect us are, in many cases, doing the opposite.
To stay ahead of this threat, camera owners and operators must take proactive steps.
Change default passwords, disable unnecessary remote access, keep firmware updated, and monitor for suspicious activity. For organizations, enforce strict access controls via firewalls and VPNs, and regularly audit your network for vulnerabilities.
With over 40,000 cameras exposed globally and likely many more undetected now is the time to act.
The privacy and security of homes, businesses, and public spaces depend on it. For more detailed findings and actionable intel, visit the Bitsight portal and consult their Open Ports risk vector section.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates
Kali Linux, the preferred distribution for security professionals, has launched its second major release of…
Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced the…
The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help organizations…
A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been patched,…
A newly disclosed spoofing vulnerability (CVE-2025-26685) in Microsoft Defender for Identity (MDI) enables unauthenticated attackers…
A critical vulnerability (CVE-2025-6031) has been identified in Amazon Cloud Cam devices, which reached end-of-life…