The 'webcams' are used daily to connect their users with other people both professionally and personally. They are present in everyday equipment such as mobile phones, laptops and tablets. However, the software company specializing in cybersecurity ESET points out in its latest report that they can also pose a great danger.
The cyber attacker can manage to 'hack' a 'webcam' through remote access Trojans, which are a type of 'malware' that allows remote control of the victim's device. Thus, he can turn on his 'webcam' without activating the light, make recordings and send the video files.
These RATs can infect a device like any other 'malware' through malicious links or attachments, in 'phishing' emails or in messaging and social networking applications, as well as other malicious mobile 'apps' that spoof the appearance of the officer.
ESET underlines that "webcam hacking is a real threat", and therefore points out some signs to which the user should pay special attention to know if their camera has been compromised, for example, in case the light of this component lights up when it is not being used by the user.
Another aspect to take into account is the "strange" files saved on the computer, since if an attacker has 'hacked' the 'webcam', it is likely that there are saved files of this activity on the computer, especially those located in 'Documents ' or in the video folders on the hard drive.
In the event that someone contacts the user to inform him that he has 'hacked' the camera, one should not fall into what could be a trap from the start.
However, to prevent someone from accessing the 'webcam', it is advisable to always have the device software updated and protected by an 'antimalware' program. Also confirm that it is protected by a strong and unique password, in addition to a two-factor authentication system (2FA) if possible.