Jump to content

Dahua Technology

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Lopifalko (talk | contribs) at 09:41, 3 June 2019 (Remove a warning). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Dahua Technology Co., Ltd.
Company typePublic
SZSE: 002236
IndustryVideo surveillance Solutions
Founded2001
HeadquartersHangzhou, China
Area served
Worldwide
ProductsSecurity Cameras, Network Cameras, HDCVI analog-to-HD Solutions, NVR/DVR, PTZ Cameras, Fisheye Cameras
RevenueIncrease $2.1 billion (2016)[1]
Number of employees
11,000
Subsidiaries35
Websitewww.dahuasecurity.com

Dahua Technology Co., Ltd. is a provider of video surveillance products and services.

Subsidiaries

Dahua Technology has around 13,000 employees[2] all over the world. Dahua solutions, products, and services are used in over 180 countries and regions. It has 35 subsidiaries globally covering Asia, the Americas, Europe, Middle East, Oceania, Africa, etc.[3]

Controversies

In September 2016, the largest DDoS attack to date, on KrebsOnSecurity.com, was traced back to a botnet. According to Internet provider Level 3 Communications, the most commonly infected devices in this botnet were Dahua and Dahua OEM cameras and DVRs.[4][5][6] Nearly one million Dahua devices were infected with the BASHLITE malware.[4][7][8] A vulnerability in most of Dahua's cameras allowed "anyone to take full control of the devices' underlying Linux operating system just by typing a random username with too many characters."[4] This was exploited and malware installed on devices that allowed them to be used in "both DDoS attacks as well as for extortion campaigns using ransomware."[4]

In March 2017 a backdoor into many Dahua cameras and DVRs was discovered.[9] Using a web browser, the vulnerability allowed unauthorised people to remotely download a device's database of usernames and passwords and subsequently gain access to it.[10][11] Dahua issued a firmware update to fix the vulnerability in 11 of its products.[12]

See also

References

  1. ^ "Revenue".
  2. ^ "Introduction - Dahua Technology". de.dahuasecurity.com. Archived from the original on 2018-02-24. Retrieved 2018-02-25. {{cite web}}: Unknown parameter |dead-url= ignored (|url-status= suggested) (help)
  3. ^ "Dahua, GKUVISION, SLR Magic LTD, & DZO" (PDF). olympus-global.com. February 22, 2018. [dead link]
  4. ^ a b c d Franceschi-Bicchierai, Lorenzo (29 September 2016). "How 1.5 Million Connected Cameras Were Hijacked to Make an Unprecedented Botnet". Vice. Retrieved 2019-06-03.
  5. ^ Goodin, Dan. "Brace yourselves—source code powering potent IoT DDoSes just went public". ARS Technica. ARS Technica. Retrieved 2 October 2016.
  6. ^ "Attack of Things!". Level 3 Blog. Level 3 Communications. Retrieved 3 October 2016.
  7. ^ "BASHLITE malware turning millions of Linux Based IoT Devices into DDoS botnet". HackRead. Retrieved 3 October 2016.
  8. ^ "BASHLITE Botnets Ensnare 1 Million IoT Devices". www.securityweek.com. Retrieved 2019-06-03.
  9. ^ ipvideomarket (6 March 2017). "Dahua Backdoor Uncovered". IPVM. Retrieved 2019-06-03.
  10. ^ "Dahua backdoor". Krebs on Security. Retrieved 2019-06-03.
  11. ^ at 02:58, Richard Chirgwin 8 Mar 2017. "Dahua video kit left user credentials in plain sight". The Register. Retrieved 2019-06-03.{{cite web}}: CS1 maint: numeric names: authors list (link)
  12. ^ "Dahua security camera owners urged to update firmware after vulnerability found". The State of Security. 8 March 2017. Retrieved 2019-06-03.