Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Flaws in Linux-based Lenovo webcams can be exploited remotely due to BADUSB attacks

Researchers reveal GPT-5 jailbreak and zero-click AI agents to attack cloud and IoT systems exposure

Cyberark and HashiCorp flaws allow remote vault takeover without credentials

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Flaws in Linux-based Lenovo webcams can be exploited remotely due to BADUSB attacks
Identity

Flaws in Linux-based Lenovo webcams can be exploited remotely due to BADUSB attacks

userBy userAugust 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 9, 2025Ravi LakshmananVulnerability/Hardware Security

Defects in Linux-based Lenovo Webcams

Cybersecurity researchers have revealed vulnerabilities in Lenovo’s selected model webcams and can turn them into BADUSB attack devices.

“This allows remote attackers to secretly inject keystrokes and launch attacks independently of the host operating system,” Eclipsium researchers Paul Assadrian, Mickey Schkatov and Jesse Michael said in a report they shared with Hacker News.

The vulnerability is called the codename badcam by the firmware security company. The findings were presented at today’s DEF Con 33 Security Conference.

This development may have been marked when it was first demonstrated that threat actors controlling Linux-based USB peripherals already connected to a computer can be weaponized for malicious intent.

In a hypothetical attack scenario, the enemy can exploit the vulnerability to send a background webcam to the victim, or attach it to the computer if physical access is available, and remotely issue commands that compromise the computer to perform post-inspection activities.

Cybersecurity

First demonstrated over a decade ago by security researchers Karsten Nohl and Jakob Lell at the 2014 Black Hat Conference, Badsb is an attack that exploits a unique vulnerability in USB firmware, essentially reprogramming commands carefully and running malicious programs on victim computers.

“Unlike traditional malware that resides in file systems and can often be detected with antivirus tools, Badsb lives in the firmware layer,” Ivanti said in a description of the threat released last month. “Once you’ve connected to your computer, your BADUSB device is: emulate your keyboard and enter malicious commands, install a backdoor or keylogger, redirect internet traffic, [and] Remove sensitive data. ”

In recent years, Google-owned Mandiant and the US Federal Bureau of Investigation (FBI) have warned that FIN7 was tracked to mail malicious USB devices from the US-based organization BADUSB to deliver malware called Diceloader, causing financially motivated threat groups to be tracked.

The latest discoveries from Eclypsium show that USB-based peripherals, such as webcams running Linux, were not intended to be malicious at first, but become a vector of Badsub attacks, marking a serious escalation. Specifically, we know that such devices can be hijacked remotely and converted to BADUSB devices without physically pulling away or replacing them.

“Attackers who gain remote code execution on a system can reflash the attached Linux-powered webcam firmware, reusing it to act as a malicious HID, or emulating additional USB devices,” the researchers explained.

“When it comes to weapons, a seemingly harmless webcam can inject keystrokes, provide malicious payloads, and act as a deeper, persistent scaffold.

Additionally, threat actors with the ability to change the webcam firmware can achieve a greater level of persistence, allowing them to reinfect the victim’s computer with malware even after it has been wiped off and the operating system has been reinstalled.

Identity Security Risk Assessment

The vulnerabilities revealed in the Lenovo 510 FHD and Lenovo Performance FHD WebCams are related to how devices do not validate firmware.

Following its responsible disclosure with Lenovo in April 2025, PC manufacturers released a firmware update (version 4.8.0) to mitigate the vulnerability and released a tool to work with Chinese company Sigmastar to plug in the issue.

“This first-time attack highlights a subtle but deeply problematic vector. Companies and consumer computers often trust internal and external peripherals.

“In the context of a Linux webcam, unsigned or unprotected firmware allows an attacker to destroy not only the host, but the camera can connect, transmit infection, and future hosts that circumvent traditional control.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleResearchers reveal GPT-5 jailbreak and zero-click AI agents to attack cloud and IoT systems exposure
user
  • Website

Related Posts

Researchers reveal GPT-5 jailbreak and zero-click AI agents to attack cloud and IoT systems exposure

August 9, 2025

Cyberark and HashiCorp flaws allow remote vault takeover without credentials

August 9, 2025

AI Tools Fuel Brazilian Phishing Scam, Efimer Trojan steals codes from 5,000 victims

August 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Flaws in Linux-based Lenovo webcams can be exploited remotely due to BADUSB attacks

Researchers reveal GPT-5 jailbreak and zero-click AI agents to attack cloud and IoT systems exposure

Cyberark and HashiCorp flaws allow remote vault takeover without credentials

Sam Altman tackles the “lumpy” GPT-5 rollout, regaining his 4o and “chart crime”

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Google’s Genie 3: The Dawn of General AI?

FySelf, PODs, TwinH: Revolutionizing Digital Identity & Government Data Control

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.