Malware in EmpireTech IPC-Color4K-T webplugin.exe

bigredfish

Known around here
Joined
Sep 5, 2016
Messages
17,601
Reaction score
48,968
Location
Floriduh
You seem to be the only one because there are at minimum, hundreds of these installed in the past year without this issue.

What browser are you using, because my AI/IVS works fine with Chrome (shown in thumbs below), Edge, and Edge in IE mode without the plugin. I ignore the warnings on the plugin and do not install it.

I think you have some other setting issue going on or some other conflict or compromised code running

chrome1.jpg chrome3.jpg
 

Peeper

Young grasshopper
Joined
Mar 24, 2024
Messages
44
Reaction score
17
Location
Los Angeles
What browser are you using,
I use Duck Duck Go to configure cameras and devices. But once the parameters are set I close the browser. Thereafter it communicates with Synology Surveillance Station.

Motion detect alerts are working with Surveillance Station. Tripwire is not. I will triple check my tripwire settings later today and report back.

Thanks!
 

wittaj

IPCT Contributor
Joined
Apr 28, 2019
Messages
25,144
Reaction score
49,014
Location
USA
+1 above. As I have said, these cameras show they can be browser dependent. Plain Internet Explorer is the best and is still available. But some have got all the functions to work in other browsers. Try Edge or Chrome and I bet you gain access to the AI.

But regardless, if you are so squirrely about the plug-in, then why are you blindly accepting the firmware to be safe? Anti-virus on your computer isn't scanning the camera firmware, only the plug-in it is asking to download.

You should still do your part to minimize the risk and isolate the cameras from your system.
 

Peeper

Young grasshopper
Joined
Mar 24, 2024
Messages
44
Reaction score
17
Location
Los Angeles
let me give you a little "education"

We are just fortunate to be able to get our hands on these types of cameras ... but we are not their targeted market and they are fine with not having us in their market share ... we will not hear from Dahua regarding the safety of the plug-in.
Quite interesting!
 

tangent

IPCT Contributor
Joined
May 12, 2016
Messages
4,434
Reaction score
3,674
1: See attached pdf file, listing the contents of the extracted plugin. Please advise which file(s) you identify as the actual plugin, and how you would install it.
2: The plugin is apparently required for some of the advanced useful features to function. (post 21)
Sorry I was thinking of plugins on a different OS that are single file 'containers'. What'd I'd try regarding virus total is to basically extract the contents of the plugin installer to a zip file and upload that to virus total. It's been a while since I've had to deal with these plugins.

I'd agree that's an important function. What are the different versions shown for the camera's firmware and what model is your camera?
 
Last edited:

wittaj

IPCT Contributor
Joined
Apr 28, 2019
Messages
25,144
Reaction score
49,014
Location
USA
Part of me wonders if it is the actual .exe file that the programs are throwing exception to as that file is not well known, but then the actual unzipped files test out fine?
 

tangent

IPCT Contributor
Joined
May 12, 2016
Messages
4,434
Reaction score
3,674
Part of me wonders if it is the actual .exe file that the programs are throwing exception to as that file is not well known, but then the actual unzipped files test out fine?
That's been my observation in the past, as there are various compromised copies webplugin.exe out there.
 

pc1

n3wb
Joined
May 7, 2018
Messages
15
Reaction score
5
Sorry I was thinking of plugins on a different OS that are single file 'containers'. What'd I'd try regarding virus total is to basically extract the contents of the plugin installer to a zip file and upload that to virus total. It's been a while since I've had to deal with these plugins.

I'd agree that's an important function. What are the different versions shown for the camera's firmware and what model is your camera?
No worries. However the issue is not whether it's possible to get the plugin to safely enable features, the higher level concern is that the plugin as provided to the general user base includes a high risk component. The camera model is stated in the title of this thread, IPC-Color4K-T. Firmware is irrelevant to the plugin; Empiretech has informed me that the plugin is in embedded ro memory in the camera; changing firmware will have no effect.
 

pc1

n3wb
Joined
May 7, 2018
Messages
15
Reaction score
5
+1 above. As I have said, these cameras show they can be browser dependent. Plain Internet Explorer is the best and is still available. But some have got all the functions to work in other browsers. Try Edge or Chrome and I bet you gain access to the AI.

But regardless, if you are so squirrely about the plug-in, then why are you blindly accepting the firmware to be safe? Anti-virus on your computer isn't scanning the camera firmware, only the plug-in it is asking to download.

You should still do your part to minimize the risk and isolate the cameras from your system.
You're implying awareness that the firmware and plugin are separate, I'm curious as to how you determined that?

A careful and simple step when evaluating a camera is to download the firmware from the vendor support site, and check it. Then, even if the camera claims it has the same version, update the camera firmware.

Cameras and control systems operate in a totally isolated environment. A concern is that within that environment a bad actor can compromise functionality of other devices/systems within that environment. There's always a level of risk acceptance, this product appears to exceed that threshold. Beyond that, the general target user will likely not be as rigorous with isolation as many of us are, hopefully highlighting the threat level here can help them avoid a bad situation.

From your close working relationship with EmpireTech, can you refer any technical contacts that can chime in?
 

tangent

IPCT Contributor
Joined
May 12, 2016
Messages
4,434
Reaction score
3,674
No worries. However the issue is not whether it's possible to get the plugin to safely enable features, the higher level concern is that the plugin as provided to the general user base includes a high risk component. The camera model is stated in the title of this thread, IPC-Color4K-T. Firmware is irrelevant to the plugin; Empiretech has informed me that the plugin is in embedded ro memory in the camera; changing firmware will have no effect.
It may. Different firmware version's typically require different versions of the plugin, the "web" version listed in the camera is indicative of this. The plugin is embedded as a static file served by the camera's webserver.

Before they started encrypting the firmware a few years ago, you could actually extract the plugin directly from the firmware bin file which was quite handy.

You're more likely to find compromised copies of the plugin floating around on the web than you are embedded in a camera's file system. Don't get me wrong it can happen (and has), but mainly when dealing with no-name crap and disreputable vendors.
 
Last edited:

tangent

IPCT Contributor
Joined
May 12, 2016
Messages
4,434
Reaction score
3,674
I didn't notice that you posted the link to the virus total report earlier.

If you dig into it and look at the detections for the individual files installed, you'll notice how low the detection counts are for the individual files:

1712508287837.png

This is fairly typical of false detections.
 
Last edited:

wittaj

IPCT Contributor
Joined
Apr 28, 2019
Messages
25,144
Reaction score
49,014
Location
USA
You're implying awareness that the firmware and plugin are separate, I'm curious as to how you determined that?

A careful and simple step when evaluating a camera is to download the firmware from the vendor support site, and check it. Then, even if the camera claims it has the same version, update the camera firmware.

Cameras and control systems operate in a totally isolated environment. A concern is that within that environment a bad actor can compromise functionality of other devices/systems within that environment. There's always a level of risk acceptance, this product appears to exceed that threshold. Beyond that, the general target user will likely not be as rigorous with isolation as many of us are, hopefully highlighting the threat level here can help them avoid a bad situation.

From your close working relationship with EmpireTech, can you refer any technical contacts that can chime in?

Most of us here are not going to say "thank goodness they got rid of the plug-in and now I can put my cameras on my networks with no worries".

We know the firmware is still compromised and can be hacked. In most cases easily with backdoor exploits.

All I mean is there are tons of articles, experiences here, etc. that shows the camera firmware is not a very secure environment and has backdoor exploits that can allow a bad actor to gain access to your network via a backdoor and do DDoS attacks or sniff your network for bank info, etc.

There is a post here somewhere of someone's Dahua or Hikvision that was constantly trying to ping the outside network, to no avail because it was blocked off, but it wasn't because of the plug-in.

To blindly accept the firmware is ok but then be concerned that the downloaded .exe file throws up caution but when ran the actual files do not doesn't make much sense.

History has shown that these companies do maybe 2 or 3 updates over the life of the camera and many times a firmware update is to fix a vulnerability that was found years ago that they are just now cleaning up.

Unlike Windows that has very frequent updates to close up vulnerabilities and stuff, these cameras simply do not.

It is why we suggest do not give these cameras access to the internet and minimize their connections to your other stuff.

Placing them on their own separate NIC or VLAN is one way to mitigate it. Adding a network sniffing program to look for things like the camera trying to talk to your network is another option.

Does it mean you are immune to an attack of the firmware having code in it to jump subnets and figure out how to bypass VLAN programming - NO - but your risks are mitigated.

We have all tried to get more clarity from Dahua and Andy has as well regarding the plug-ins. All they say is they are safe. Only so much we can do. Like I said we are not their target audience.
 
Last edited:

wittaj

IPCT Contributor
Joined
Apr 28, 2019
Messages
25,144
Reaction score
49,014
Location
USA
While not totally related to this camera, it does show how cameras can be exploited even when there wasn't a plug-in needed.

Hackers don't care about your camera feed. Hackers use a vulnerable device (NVR or camera) that has ZERO protection on it to get into your LAN and either scrape it for bank info or use your ISP as a bot for DDoS attacks. Again, your antivirus software and router firewall do not block this crap.

The P2P/QR code/port forwarding/allowing the camera internet access is how they are gaining access.

There are lots of examples where the security devices (ironic isn't it) are not very secure from the internet and pass information unencrypted before the P2P handshake begins...

Millions of people around the world want the simplicity of Internet of Things (IoTs) to be easy to connect to their system and work. They do not want to deal with security. They wrongfully assume that because they bought it and all they have to do is scan a QR code, that all is good. A manufacturer also doesn't want to deal with endless phone calls from consumers asking how to set something up, so they make it easy.

So these companies create these QR codes/P2P and magically the new device can be seen on the consumers app. Consumer is happy. But, this device has opened up the system to gain easy access to your entire network.

I have a friend that falls under this "I just want to plug it in and scan a code and it works" mindset. Many years ago she bought a Foscam wifi camera to monitor her front door. She plugged it in and pointed it out a 2nd story window and downloaded the Foscam app and scanned the QR code and magically she could see her camera through the magic of P2P. No plug-ins were needed.

A few years later she bought a wifi printer and again, simply downloaded the app from the manufacturer and scanned the QR code and she could start printing.

One time in the middle of the night, she hears her printer printing a page. She thinks maybe she is dreaming or hearing things, so she thinks nothing of it and goes back to sleep. Next morning she gets up and indeed her printer did print something in the middle of the night and the printed page says I SEE YOU and a picture of her from her Foscam camera was below the text.

She changes her wifi password in case it was the peeping perv next door that she has caught looking at her from through her window and he guessed her password, which was password because she liked things simple.:banghead:

Problem still persists. She goes into Foscam app and changes the password to the camera. Problem still persists. She gets a new router and sets up a stronger password for wifi and changed the passwords of all of her devices. Problem still persists. She gets rid of camera and printer.

At some point Foscam issues a security vulnerability and issued a firmware update. Basically the vulnerability was something like when logging into the camera with a web browser over HTTPS, the initial login to the P2P site is done using SSL. But then it establishes a connection to the HTTPS port again (for the media service) and sends all of its commands unencrypted. This means the username and passwords are being sent unencrypted. While this was a security vulnerability found in Foscam, I suspect it is in others as well. I suspect this is how my friend was hacked and someone was sending pictures of her taken from her Foscam camera to her wifi printer that she set up using the QR code.

Many articles on this site and out on the internet show how vulnerable these devices can be. I remember seeing an article of a webpage showing like 75,000 video streams around the world that were hacked into because of these vulnerabilities. I know there is an article someone on this forum where someone posted that many of these cameras do send passwords totally unencrypted and wide open easy to see for anyone knowing what they are doing.

Do not assume that because it is a name brand that they actually have good security on these cameras or any device for that matter. Think about the typical end-user that just wants simplicity to connect. And then think how a company would go about that to provide that simplicity. End result is to provide that simplicity, it comes at a cost and that cost is security vulnerabilities, which is ironic for security cameras. But if it can happen to Amazon/Ring (which is a fairly large company), it can happen to anyone, especially all the no-name brands being sold on Amazon.

For that reason, most of us here prevent our systems from having access to the internet.

And most of us ironically would trust this plugin on an isolated network over a cloud-based camera with frequent firmware updates all day long.
 

Peeper

Young grasshopper
Joined
Mar 24, 2024
Messages
44
Reaction score
17
Location
Los Angeles
if you are so squirrely about the plug-in, then why are you blindly accepting the firmware to be safe? ... You should still do your part to minimize the risk and isolate the cameras from your system.
I am no network expert, but it seems something is missing from your suggested defenses against potential malware. Maybe you can help me understand?

Suppose my brand-new camera is added to my network. I isolate it to its own vlan. And that "camera vlan" has no internet access. I understand that part, and so far, so good.

But now I need to "configure" the camera. When I try to configure it, the plug-in gets involved, seeking permission to install and operate on my PC that is configuring the camera. My impression is that once (or if) I grant access to that plug-in, I have bypassed the protections to isolate the camera and surrendered any effort toward security except blind belief the plug-in is hopefully safe. Once I allow it to operate by clicking "allow", the plug-in obtains access to my PC which does have network access and which does have internet access. And I have no knowledge of what the plug-in does, or does not do, thereafter. So, once the plug-in is enabled, the potential for a security compromise is complete. At least if there is any malware load in the plug-in.

Can you help? What is missing from my knowledge about whether I properly understand what happens after you click "allow" to the plug in? Thanks!
 

wittaj

IPCT Contributor
Joined
Apr 28, 2019
Messages
25,144
Reaction score
49,014
Location
USA
I am no network expert, but it seems something is missing from your suggested defenses against potential malware. Maybe you can help me understand?

Suppose my brand-new camera is added to my network. I isolate it to its own vlan. And that "camera vlan" has no internet access. I understand that part, and so far, so good.

But now I need to "configure" the camera. When I try to configure it, the plug-in gets involved, seeking permission to install and operate on my PC that is configuring the camera. My impression is that once (or if) I grant access to that plug-in, I have bypassed the protections to isolate the camera and surrendered any effort toward security except blind belief the plug-in is hopefully safe. Once I allow it to operate by clicking "allow", the plug-in obtains access to my PC which does have network access and which does have internet access. And I have no knowledge of what the plug-in does, or does not do, thereafter. So, once the plug-in is enabled, the potential for a security compromise is complete. At least if there is any malware load in the plug-in.

Can you help? What is missing from my knowledge about whether I properly understand what happens after you click "allow" to the plug in? Thanks!
Would you blindly accept a USB drive from a stranger and plug it in to your computer? Even though you don't download or install anything from it, just the fact it is plugged in with access to your computer can result in a behind the scenes loading of something bad.

Or what about all those reports of someone plugging their phone into a public charger and unbeknownst to them malware or something else bad is introduced to their phone. Those people were not downloading anything or even logging in to the charger, just the fact it was plugged in to charge their phone was enough to dump malware or viruses or other stuff the system didn't block.

Same with accessing the camera via a computer. Once you have "logged" in to the camera, it could be downloading something bad even without a plug-in. Plus these devices are also notoriously known for having backdoor vulnerabilities. So even without a plug-in, it doesn't mean there are not backdoor exploits.

Let's face it, by logging into a camera via a web browser, you are giving your computer and that device even more access to your computer than simply browsing some random website on the web. And maybe that random website is doing something bad behind the scenes putting crap on your computer. Same with a camera. One would hope anti-virus would stop it, but in some instances it doesn't. Like people going to porno sites or some other website simply looking up information and their browser will automatically download malicious files without them needing to take an action.

Once you access the camera via a computer that has internet access, even without a plugin, if the firmware is designed to try to ping the outside regardless of what you set up in the camera, it is going to try. Or if it has an attack vector that has exploited a vulnerability of a web-browser, it will.

As I mentioned, someone here thru sniffing showed that their camera, even though they had it on a different subnet and had the gateway and DNS servers point back to the camera, the camera was still trying to access a 192.168.1.xx subnet (default camera subnet) and had his home LAN been on 192.168.1.xx then it would be accessing the internet without his knowledge. It probably wasn't for nefarious actions and probably just some sloppy coding, or it could have been an intentional backdoor to allow the manufacturer access to the camera in the event someone screwed it up. Who really knows.

So it is a good extra step to not have the home LAN on the same subnet as the default IP addresses of the camera in the event an intentional backdoor or just sloppy coding allows the camera to still try accessing the default IP subnet, which for many cameras is the 192.168.1.xx subnet.

Like everything in life, it comes down to risk, mitigating risk, and accepting some level of risk.

Many people port forward or use P2P and never have a problem (or they don't know it), but that doesn't mean most of us here will employ those options.

Many people use cloud based cameras and are never hacked, but that doesn't mean most of us here will employ those types of cameras.

Many people use these types of cameras connected to their router and download all the required plug-ins and never have a problem, but that doesn't mean most of us here will employ those types of cameras.

So we try to mitigate that risk as much as possible, but recognizing that there is still a risk, even if remote or small.

So in my case, my cameras are all on a completely separate system - I do not use a VLAN for my cameras as we have seen those have been hacked too or someone figured out how to VLAN hop on a VLAN router and now the cameras are accessing the internet.

I have an old laptop that doesn't even have built-in wifi and never touches the internet or even my own internal network and that is the computer I use to set the cameras up by plugging the camera into a POE injector and plugging that camera into the laptop and making all the changes. If I download the plug-in, it only impacts that computer. But I am quirky and after I am done, I reset the computer LOL. Again, this computer never touches my network and doesn't have internet access.

I run Blue Iris as my VMS system, so I run it as a dual NIC - one card for internet and one card for the cameras. The computer is only pulling the video and ONVIF feeds from the camera NIC.

Is it 100% foolproof? No - no VMS system is unless it is completely physically cut off from anything else.

Could a bad actor figure out how to NIC hop like they have been able to figure out how to VLAN hop? Sure. Is it likely?

Could my computer have a motherboard with a backdoor vulnerability or some other peripheral with a backdoor that completely defeats my entire attempt to mitigate problems - sure.

But was is the option at that point - no computer or mobile device?

So you have to decide what level of risk you are willing to accept.
 

CCTVCam

Known around here
Joined
Sep 25, 2017
Messages
2,676
Reaction score
3,508
I used the plugin as I couldn't see the cameras in the web browser. Had no issues although I uninstalled the installer plugin immediately after installation. I scan malware & virus free over multiple apps so I wouldn't worry too much provided you get it from the official source. The most likely possibility, if any, is an official plugin such as this might report back usage activity or errors activity rather than anything nefarious. That said, simple answer is to scan with big name Apps such as Malwarebytes, Spybot, or similar plus an AV app for your own peace of mind. If you get a positive, it's probably false but most large vendors offer an analysis service where you can submit the file for confrimation. So far as I can tell, my official copy was. That doesn't mean I'm going to leave it on or unchecked though.
 

Arjun

Known around here
Joined
Feb 26, 2017
Messages
9,123
Reaction score
11,179
Location
USA
"I installed the plugin just for chuckles, got the warning message, I didn't seem to care, a new tab opened up in Google Chrome shortly after, and got a message prompting me to acknowledge that I was 18 years or Older I clicked yes, and to my surprise got a lifetime access to an amazing database full of wonder" :rofl:
Note: THIS IS A JOKE
 
Top