fbpx

Need peaceful screen time negotiations?

Get your FREE GKIS Connected Family Screen Agreement

cyberblackmail

Hackers Can Access Your Computer’s Webcam Without Your Knowledge

Imagine finding out that a cybercriminal has been recording you in your bedroom for months and can do anything with that footage. Or what if you turn on your computer to find that you can’t access anything unless you pay a ransom to a hacker. What if a predator could view and speak to your child through a camera in their bedroom? You can help protect your family from becoming victims of cyber-attacks and ensure peace of mind by referring to our Screen Safety Toolkit, a resource guide with our best recommendations, how-to information, and links to our favorite easy-to-use parental control systems. This article will detail the risks and worst-case scenarios of webcam hacking as well as provide tips to help ensure your cybersecurity and safety.

How do cybercriminals hack webcams?

Hacking requires a specialized skillset that is increasingly accessible for the average tech user. In the sub-world of black hat computer hacking (hacking tech with bad intent), accessing private webcams is considered fairly easy. Further, there are several different methods utilized by black hat hackers to gain access to and take control over a computer’s web camera.

Spyware

One of the prominent methods employed by hackers to gain access to private computer webcams is through the use of spy software and remote administration tools (RATs). Webcam spyware is a type of computer application or program that allows the user to remotely take control over another user’s webcam. This enables the hacker to see whatever or whoever is in front of the computer’s web camera.

An alarming feature of this software is that it often allows the user to remotely turn the hacked computer on. Turning a computer off when it’s not being used is not enough to protect users from being spied on.

Spyware can be installed in webcam attachments and hard-wired webcams. The hacker can control audio and microphones, camera angles, zoom features, and focus. They can also record the footage so they can blackmail the victim later. Surprisingly, webcam spyware is freely available for download on the internet and can be installed on most operating systems.[1]

Internet Connection

Another common method of webcam hacking involves the use of web cameras that rely on remote access through WiFi. A common example of this type of web camera includes wireless security devices such as the popular Ring video doorbell.

Unfortunately, while these devices are intended to provide security for the user, they can also provide black hat hackers access to your home. If a camera is connected to a home WiFi router, it is vulnerable to hacking, especially if proper precautions aren’t taken to secure it. To avoid this, it is important to set secure network passwords for home WiFi routers. The default factory setting login information for routers can be accessed by anyone who is willing to look up the manufacturer’s startup support webpage. Failing to change your default router login can leave your wireless security cameras open to malicious hackers.[1]

Trojan Viruses

Perhaps the easiest way for cybercriminals to hack into your computer’s webcam is through the use of a Trojan computer virus. A Trojan virus is a type of malware deliberately designed to cause damage by infecting and subsequently taking control over your device. It is aptly named after the famous ancient Greek war story of the Trojan Horse because it is an attack disguised as a gift.

Trojan viruses are so effective because people mistakenly infect their own devices with them by downloading software that they believe is safe. This typically occurs when visiting a website that invites you to download a seemingly innocent file that actually contains malware instead of Adobe flash reader. The malware then infects the device, allowing the creator of the virus to gain complete control and access to your webcam and private files without your knowledge.[1,2]

Worst-Case Scenarios

Cassidy Wolf, Miss Teen USA

One of the most famous cases detailing the devastation caused by webcam hacking involves former Miss Teen USA, Cassidy Wolf. In 2012, Cassidy Wolf opened an email that she had received from someone whom she did not know. She was horrified to discover an attachment within the email containing several nude photos of her that were taken in the privacy of her bedroom. The photos were taken via the webcam installed on her computer.

The hacker attempted to blackmail Wolf into engaging in sexual acts with him through her webcam. If she refused, he threatened to share the nude photos with her friends and family.

The hacker turned out to be one of Wolf’s former classmates, Jared James Abrahams, who had installed Blackshades malware onto her laptop. The FBI was able to identify Abrahams who had victimized up to 150 women in his sextortion scheme and was subsequently sentenced to 18 months in federal prison.[3]

This event coincided with an FBI crackdown that led to the arrests of over 100 cybercriminals who created and used Blackshades, an inexpensive and easily utilized remote access tool primarily designed to hack webcams to facilitate sextortion crime. Blackshades was available for a mere $40 and sadly, countless people were victimized by the cybercriminals who maliciously employed it. [3,4]

Ring Cameras

In 2019, a mother installed a Ring security camera in the bedroom of her 8-year-old daughter for extra security. In a disturbing exchange caught on video, the 8-year-old girl walked into her room hearing strange music playing from an unknown source. The music abruptly stopped, and a man’s voice was heard saying “hello there.” This strange man had live video access of the young girl and was able to verbally communicate with her, a feature deliberately programmed into the Ring security camera. The man repeatedly used racial slurs when speaking to the girl and over several minutes, tried to get her to do various things. There have been similar Ring camera hacking incidents in recent years.[5]

Steps to Protect Your Privacy and Boost Cybersecurity

Technology is a powerful tool and with the advent of virtual learning and Zoom conferences as a result of the COVID-19 pandemic, web cameras have become an essential part of our academic and professional lives. Cases of webcam hacking are obviously terrifying, but there are simple steps that you can take to protect yourself and your family from attacks by cybercriminals.

Use Software Updates

Keep up with computer and software update alerts. They often contain patches For Weak Spots (points of entry easily exploited by hackers).

Secure Your WiFi with Password Protection

Once you have installed your router, create a new secure password to deter cybercriminals from being able to easily hack your devices.

Avoid Suspicious Downloads

Hackers can access your devices by getting you to unknowingly install malware, like Trojan viruses, through random links and downloads. Never click on links from websites that require you to download a file or program in order to access their site. Also, avoid downloading attachments and opening links sent via email from people you do not know and trust.

Invest in Security Software

While there are free security software services available, investing in subscription software will provide better cybersecurity. Approach your cybersecurity with the same regard as you do for your home security. Good security software will help protect you by blocking malware that would potentially give hackers access to your devices.

Use Legitimate Tech Support

Be careful of who you allow access to your devices. When IT support is needed, only use trusted and reputable services. Avoid using freelance computer technicians. There have been instances where freelance technicians who were hired to fix devices have instead installed malware onto the client’s computers for nefarious purposes.

Install a Physical Webcam Cover

The most surefire way to ensure that cybercriminals are not spying on you through your device’s camera is to install a physical covering over the lens. When most web cameras are on, a light next to the lens turns on signaling that the camera is in use. However, hackers can disable this light, so relying on that alone is not enough to ensure your privacy. There are products available specifically designed as device camera coverings that attach to your devices right over the camera lens. The covering can be slid open when you want to use your camera and closed when you do not. You can also just simply cover your web camera lens with a post-it note or a piece of opaque tape.

GKIS Screen Safety Toolkit

Our Screen Safety Toolkit is an invaluable resource for providing you and your family with enhanced cybersecurity. Researching digital safety tools can be an overwhelming process. But thankfully, we’ve done the work for you! If you have screen-loving kids or teens, sound parenting strategies are not enough for fostering online safety. You also need smart tech tools for filtering, monitoring, and management. The GKIS Screen Safety Toolkit is a family-tested, outcome-based resource guide with our best recommendations, how-to information, and links to our favorite easy-to-use parental control systems.

GKIS Cyber Security Supplement

Our Cybersecurity & Red Flags Supplement is comprised of three helpful tools in one service. You can protect your family from hacking, scamming, malware, and phishing with our cybersecurity and best practices checklist. Our GKIS online safety red flags for kids & teens provides parents with Dr. Bennett’s clinical teaching list that will help parents educate their kids about red flags to be aware of and alert them to the tricks that are often employed by online predators and other cybercriminals. Additionally, our GKIS online safety red flags for parents will provide parents with Dr. Bennett’s clinical expertise, which she’s developed over 25+ years as a clinical psychologist, in identifying behavioral red flags that may signal your child is suffering from digital injury.

Other helpful GKIS resources

You can find more valuable information regarding screen safety in Dr. Bennett’s parenting guide, Screen Time in the Mean Time. Additionally, you can check out this article How Cybercriminals Steal Sensitive Data to learn more about the potential risks to your cybersecurity so that you can be better equipped to protect yourself and your family.

Thanks to CSUCI intern, Mackenzie Morrow for researching the dangers of webcam hacking as well as cybersecurity measures to prevent it and co-authoring this article.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Works Cited

[1] Batt, S. (2020). How easy is it for someone to hack your webcam? Make Use Of. https://www.makeuseof.com/tag/how-easy-is-it-for-someone-to-hack-your-webcam/

[2] Johansen, A. (2020). What is a Trojan? Is it a virus or is it malware? Norton. https://us.norton.com/internetsecurity-malware-what-is-a-trojan.html

[3] Daily Mail. (2014). More than 90 people arrested in ‘creepware’ hacker sting as victim Miss Teen USA describes ‘terror’ at being watched through her webcam for a year. Daily Mail. https://www.dailymail.co.uk/news/article-2638874/More-90-people-nabbed-creepware-hacker-sting-victim-Miss-Teen-USA-describes-terror-watched-webcam-YEAR.html

[4] Cooper, A. (2014). CNN Anderson 360 Cassidy Wolf Miss Teen USA. CNN. https://www.youtube.com/watch?v=sc3nG87OYW8

[5] Chiu, A. (2019). She installed a Ring camera in her children’s room for ‘peace of mind.’ A hacker accessed it and harassed her 8-year-old daughter. The Washington Post. https://www.washingtonpost.com/nation/2019/12/12/she-installed-ring-camera-her-childrens-room-peace-mind-hacker-accessed-it-harassed-her-year-old-daughter/

Photos Credited

Photo by Nikita Belokhonav (https://www.pexels.com/photo/anonymous-hacker-with-on-laptop-in-white-room-5829726/)

Photo by cottonbro (https://www.pexels.com/photo/people-woman-coffee-laptop-6964510/)

Photo by cottonbro (https://www.pexels.com/photo/laptop-with-cyber-security-text-on-the-screen-5483240/)

How Cybercriminals Steal Sensitive Data

In last week’s GKIS article, “How Teens Overshare,” we covered the ways kids intentionally and unintentionally share location information on social media and how to prevent this safety risk. In today’s article, we detail how cybercriminals victimize teens and offer more helpful information on how to get your kids internet safe.

Cyberstalkers

Cyberstalkers are predators who track online information to extort or harass, create cybercrimes like hacking or identity theft, or intercept a victim offline. Cyberstalkers can be complete strangers or people your teen may already be acquainted with.

Hackers

Hackers are predators who steal usernames, passwords, and personal information to gain access to a victim’s screen device. Once they can access, they can still further data, change or destroy information, install malware, and even take over the device’s camera.[1]  Data can then be sold to other criminals on the dark web or be used for identity theft to take out loans and credit cards in your name.

Phishing

Phishing is a cybercrime in which a victim is contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data. Phishing can also occur through websites and social media.[2] Dr. Bennett notes in her book, Screen Time in the Mean Time that the sensitive information obtained by phishing is often used for online login information such as usernames and passwords, bank account and credit card information, and even identity theft.

The most common example of phishing is email phishing. To email phish, the cybercriminal creates a fake domain that looks trustworthy and legitimate, then sends emails to potential victims asking them to click a link, download an attachment, or “update” their passwords.

To prevent your child from falling victim to online phishing, encourage them to only open emails, online messages, and text messages from trusted individuals and advise them to never click on any links or download attachments from an unusual or suspicious-looking email or message.

Identity Theft

According to The United States Department of Justice, “Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.”[5]

Cybercriminals often target younger individuals because children do not have bad credit (which is great for cybercriminals) and it is easy to keep it from being noticed until the child is older. In Dr. Bennett’s book, Screen Time in the Mean Time, she writes about a couple of children who were victims of identity theft.

Here are a few ways to protect your child from identity theft:

  • Install cybersecurity safeguards on phones, laptops, iPads, and any other device that need protection
  • Have family conversations about being wary of posting or sharing personal information online
  • Set up a virtual private network (VPN) to ensure the safety of your device(s)
  • Update passwords at least once a year and be sure that the new password does not include any information that may already be public such as, your teen’s name, age, pet’s name, or anything that could be easily guessed

Social Media Quizzes

Cybercriminals can also phish for information through social media by reviewing posts, asking questions, or offering an online quiz with targeted questions. Quiz questions to avoid include any that ask for your (or your mother’s) maiden name, your favorite color, the street you grew up on, your pets’ names, the first car you owned, or your best friend’s name.

The answers to these questions are often security answers on websites. With security information, personal accounts can be accessed for malicious intent. To prevent cybercrimes, ask your teen to refrain from taking online quizzes or you can encourage them to only take online quizzes from a legitimate source. Teaching your teen to withhold sharing personal information that could pose a security risk is vital to ensure their online safety.

Cyber Blackmail

Once a cybercriminal obtains sensitive information, they may use it to coerce a victim further. According to the BBC, “Cyber-blackmail is the act of threatening to share information about a person to the public, their friends or family unless a demand is met or money is paid.”[3] Cyber blackmail can take many forms and the cybercriminals who commit this crime use different tactics to take advantage of their victims.

Cybercriminals may even say that they have explicit photographs, access to their victim’s phone and computer’s webcam, or even recordings of them from their personal devices. Some of those claims may be true or false, but either way, the cybercriminal uses fear and shame to get what they want.[4]

To help prevent your teen from becoming a victim of cyber-blackmail;

  • advise them to never share sexual images of themselves (the images can end up anywhere)
  • advise them to not accept friend requests from strangers
  • advise them to be wary of things they post, share, or message others online (what they say can very well be used against them in the future)
  • require your teen to have private social media accounts

For more information and safety tips, we highly recommend parents to purchase our Cybersecurity & Red Flags Supplement. Dr. B created this tool because parents in her clinical and coaching practices frequently asked her to teach their kids the red flags that may alert them to the tricks of online predators, hate groups, and cyberbullies.  In this Supplement, she offers her clinical teaching list so you can educate your kids. Knowledge and assertiveness coaching are key elements of child resilience and good judgment online.

Also included in the supplement is Dr. B’s Online Safety Red Flags for Parents. This tool teaches parents what child behaviors to look for that may signal they are at risk – a tool she created from 25+ years of clinical practice. Being able to recognize behavioral red flags in your child may be the difference between stopping risk after one exposure versus not recognizing dangerous relationships and exposures until it’s too late.

Thanks to CSUCI intern, Remi Ali Khan for researching cybercrimes and cybersecurity for this article.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting,

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty

Photo Credits

Photo by Gerd Altmann from Pixabay

Photo by B_A from Pixabay

Photo by Pixabay from Pexles

Photo by Tracy Leblanc

Works Cited

Bennett, T. (2017). Screen Time in the Mean Time: How to Get Kids and Teens Internet Safe.

Brant, E., & Butterly, A. (2013, September 20). Cyber-blackmail: How to keep safe and deal with it. BBC Newsbeat. http://www.bbc.co.uk/newsbeat/article/23724703/cyber-blackmail-how-to-keep-safe-and-deal-with-it.

Cyber Extortion: Ransomware vs Extortionware. Alpine Security. (2020, August 2). https://alpinesecurity.com/blog/cyber-extortion-ransomware-vs-extortionware/.

The Dangers of Hacking and What a Hacker. https://www.webroot.com/us/en/resources/tips-articles/computer-security-threats-hackers.

Identity Theft. The United States Department of Justice. (2017, February 7). https://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud.

KnowBe4. What Is Phishing? Phishing. https://www.phishing.org/what-is-phishing.