LABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内。首先,我需要通读文章,抓住主要信息。 文章主要讲的是两位研究人员Marc Rogers和Silas Cutler在LABScon 25上的演讲,他们探讨了超便宜的中国智能家庭设备的供应链问题。特别是视频门铃和安全摄像头,这些设备在主流电商平台以不同的品牌销售。 他们发现这些设备使用相同的硬件平台,由Allwinner半导体驱动,这家公司得到了中国政府的大量补贴。固件分析显示有硬编码的root密码,安全补丁其实只是注释掉易受攻击的服务,并没有真正移除它们。 此外,这些设备虽然看起来使用本地云服务,但数据经常被路由到香港和中国的服务器。研究人员还追踪到一系列空壳公司和虚构的人格,这些实体通过非响应的注册代理和PO箱来逃避法律服务,保护实际制造商不受监管。 硬件版本快速迭代且缺乏长期支持,这与恶意软件分发模式相似。虽然没有直接归咎于恶意行为,但研究人员认为这些设备形成了一个巨大的、易受攻击的物联网表面,可以通过海外配置控制。消费者被低价吸引,却不知道他们的数据最终受外国控制。 总结时要抓住关键点:供应链问题、安全漏洞、数据流向、空壳公司、快速迭代以及消费者风险。控制在100字以内,用简洁的语言表达出来。 </think> 两位研究人员揭示了中国超低价智能家庭设备(如视频门铃和摄像头)背后的复杂供应链问题。这些设备共享相同硬件平台,存在严重安全漏洞(如硬编码密码),数据常流向中国服务器。制造商通过空壳公司和虚构身份规避监管。快速迭代硬件版本与恶意软件分发模式相似。消费者因低价吸引而忽视数据安全风险。 2026-4-22 22:0:15 Author: www.sentinelone.com(查看原文) 阅读量:18 收藏

In this LABScon 25 presentation, Marc Rogers and Silas Cutler explore the complex, “shadow” supply chain of ultra-cheap Chinese smart home devices, specifically focusing on video doorbells and security cameras widely sold on mainstream online shopping platforms under various rotating brand names like Eken and Tuck.

Marc, who assisted the FCC Enforcement Bureau in its investigations, and Silas reveal how these devices often share identical hardware platforms powered by Allwinner semiconductors, a company heavily subsidized by the Chinese government.

Firmware analysis uncovered hardcoded root passwords and supposed security fixes that amounted to little more than commenting out vulnerable services from startup scripts rather than removing them. Despite appearing to use local cloud services, metadata and video content are frequently routed through servers in Hong Kong and China.

Rogers and Cutler trace a network of shell companies and fictional personas entirely absent from tax and voter records. These entities use non-responsive registered agents and PO boxes specifically set up to refuse legal service, effectively shielding the actual manufacturers from regulatory oversight and making enforcement nearly impossible.

The rapid iteration of hardware versions with no long-term support mirrors distribution patterns more commonly associated with malware campaigns.

While the investigation stops short of attributing direct malice, Rogers and Cutler argue that these devices collectively form a massive, vulnerable IoT surface that can be controlled through simple configuration pushes from overseas. Consumers are drawn in by low prices and subscription features, unaware that their data ultimately resides under foreign control.

About the Authors

Marc Rogers is Co-Founder and Chief Technology Officer for the AI observability startup nbhd.ai. Marc has served as VP of Cybersecurity Strategy for Okta, Head of Security for Cloudflare and Principal Security researcher for Lookout. In his role as technical advisor on USA’s “Mr. Robot” and the BBC’s “The Real Hustle”, he helped create on-screen hacks for both shows.

Silas Cutler is a Principal Security Researcher at Censys. With over a decade of experience tracking threat actors and developing methods for pursuit.  Before Censys, he worked as Resident Hacker for Stairwell, Reverse Engineering Lead for Google Chronicle, and as a Senior Security Researcher on CrowdStrike’s Intelligence team.

LABScon 2026 | Call For Papers

Submission Deadline: June 19, 2026

LABScon is a unique venue for original research to be shared among peers. The benefit of an invite-only audience of researchers is that there’s no need for long preambles or introductions – speakers are encouraged to dive right into their technical findings.

  • Original content only.
  • Talks are 20 minutes long + 5 minutes for Q&A.
  • Workshops are 90 minutes long.
  • LABScon is primarily a threat intelligence and vulnerability research conference but we keep an open-mind.

About LABScon

This presentation was featured live at LABScon 2025, an immersive 3-day conference bringing together the world’s top cybersecurity minds, hosted by SentinelOne’s research arm, SentinelLABS.

Keep up with all the latest on LABScon here.


文章来源: https://www.sentinelone.com/labs/labscon25-replay-are-your-chinese-cameras-spying-for-you-or-on-you/
如有侵权请联系:admin#unsafe.sh