How could someone take over your webcam?

nchristine

I see anecdotal stories about some creep taking over the webcam of some poor unsuspecting virtuous individual, and then viewing the hapless and unaware victim in what they think is a private setting. I’ve never heard of it happening to anyone I know, so I assume it is a rare occurrence. How could someone actually gain control over your webcam? Is it something to be concerned about?

Topic: Security
Answer this Question

Answers

5 total
jimlynch
Vote Up (20)

Here's an article that covers some of the topic.

Meet the men who spy on women through their webcams
http://arstechnica.com/tech-policy/2013/03/rat-breeders-meet-the-men-who...

"RAT tools aren't new; the hacker group Cult of the Dead Cow famously released an early one called BackOrifice at the Defcon hacker convention in 1998. The lead author, who went by the alias Sir Dystic, called BackOrifice a tool designed for "remote tech support aid and employee monitoring and administering [of a Windows network]." But the Cult of the Dead Cow press release made clear that BackOrifice was meant to expose "Microsoft's Swiss cheese approach to security." Compared to today's tools, BackOrifice was primitive. It could handle the basics, though: logging keystrokes, restarting the target machine, transferring files between computers, and snapping screenshots of the target computer.

Today, a cottage industry exists to build sophisticated RAT tools with names like DarkComet and BlackShades and to install and administer them on dozens or even hundreds of remote computers. When anti-malware vendors began to detect and clean these programs from infected computers, the RAT community built "crypters" to disguise the target code further. Today, serious ratters seek software that is currently "FUD"—fully undetectable."

jimlynch
Vote Up (20)

Here's an article that covers some of the topic.

Meet the men who spy on women through their webcams
http://arstechnica.com/tech-policy/2013/03/rat-breeders-meet-the-men-who...

"RAT tools aren't new; the hacker group Cult of the Dead Cow famously released an early one called BackOrifice at the Defcon hacker convention in 1998. The lead author, who went by the alias Sir Dystic, called BackOrifice a tool designed for "remote tech support aid and employee monitoring and administering [of a Windows network]." But the Cult of the Dead Cow press release made clear that BackOrifice was meant to expose "Microsoft's Swiss cheese approach to security." Compared to today's tools, BackOrifice was primitive. It could handle the basics, though: logging keystrokes, restarting the target machine, transferring files between computers, and snapping screenshots of the target computer.

Today, a cottage industry exists to build sophisticated RAT tools with names like DarkComet and BlackShades and to install and administer them on dozens or even hundreds of remote computers. When anti-malware vendors began to detect and clean these programs from infected computers, the RAT community built "crypters" to disguise the target code further. Today, serious ratters seek software that is currently "FUD"—fully undetectable."

MateATech_YahZIWH4S
Vote Up (17)

answer to your question is YES.

it is possible for someone to hack into your system and control your webcam. Most recent example that i've heard of is with FBI Ransomwares. There are several variants of it and some of them have been reported to be able to hibernate in poor unsuspecting virtuous individuals computer  and control webcam too. 

note : what i am not sure about is if they can control a small LED bulb like thing that you might have seen right next to your webcam that lights up when webcam is in use.

cuetip
Vote Up (15)

Maybe worried is too strong of a word, but it can happen, and you should be aware of it. The same security measures you take to prevent any trojan from being installed should go a long way towards keeping your webcam in your control. You can always use a piece of tape to cover it if you are really concerned. 

cuetip
Vote Up (14)

Also, here's a BBC article on hijacking webcams that you might like. 

Ask a question

Join Now or Sign In to ask a question.
A type of body scanner in wide use across U.S. airports through last year fails to spot well-concealed weapons including guns and knives, computer security researchers contend.
A modified version of Android uses a system of modularized plugins to help make sure the latest security tools make it into the hands of end users as quickly as possible.
The UPS Store said Wednesday that malicious software was found on the systems of 51 of its franchises in 24 U.S. states, although no fraud has been detected yet.
Start-up SentinelOne is offering security software for behavior-based malware detection intended to augment, not replace, the type of full anti-virus endpoint protection suites that typically also have signature-based defense, a firewall and other features.
A type of malware called Reveton, which falsely warns users they've broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast.
An analysis by security researchers of 48,000 extensions for Google's Chrome browser uncovered many that are used for fraud and data theft, actions that are mostly undetectable to regular users.
University and vendor researchers are congregating in San Diego this week at USENIX Security '14 to share the latest findings in security and privacy, and here are 5 that jumped out to me as being particularly interesting.
Nearly all of Facebook's outbound notification emails are now encrypted while traveling the Internet, a collaborative feat that comes from the technology industry's push to thwart the NSA's spying programs.
Many former employees retain alarming levels of access to critical business applications after they've stopped working for a company, a survey for cloud services firm Intermedia has claimed.
Symantec will consolidate its cluttered Norton line of security software, folding nine products into one online service that can be used across desktop computers and mobile devices.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness