Verkada Camera Breach

Last updated: April 1, 2025

Target Audience

Keywords

Introduction

Overview

The Verkada breach, which occurred in March 2021, involved the exposure of live video feeds and security camera footage from thousands of devices used by customers globally. Hackers gained unauthorized access to Verkada's cloud based network, which provides video surveillance and IoT devices to various businesses, schools, and hospitals. The breach led to the compromise of data from over 150,000 security cameras, including those installed in sensitive locations such as factories, prisons, and hospitals. Verkada's employees' internal cameras were also accessed, revealing serious vulnerabilities in the company's network.

Vulnerability Details

The attackers first exploited a vulnerability in Verkada’s Customer Support server. Once inside, the attackers were able to use administrator accounts to bypass security controls and gain access to the stored camera footage. The breach highlighted the critical need for stronger security protocols for IoT devices, including secure default credentials, encryption, and network segmentation. Additionally, the attack raised concerns about the privacy risks associated with cloud-connected IoT devices, particularly in sensitive sectors like healthcare and law enforcement facilities.

Learning Objectives

  • Understand IoT Security Challenges
  • Analyze the privacy risks associated with deploying IoT
  • Understand the importance of user awareness in IoT deployments

Download

Remote Terminal

Terminal Description

Module Questions

What type of company is Verkada?
What allowed attackers to gain access to Verkada's systems?
What sensitive footage was exposed during the Verkada breach?
What was one of the criticisms hackers made about Verkada’s security practices?
What regulatory action did the FTC require Verkada to undertake after the breach?