Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    A deep dive into Apple’s AI strategy reset, as it prepares to announce a Gemini-powered personalized Siri next month and a reimagined chatbot-like Siri at WWDC (Mark Gurman/Bloomberg)

    January 25, 2026

    European Space Agency’s cybersecurity in freefall as yet another breach exposes spacecraft and mission data

    January 25, 2026

    The human brain may work more like AI than anyone expected

    January 25, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
    IT/ Cybersecurity

    Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks

    big tee tech hubBy big tee tech hubAugust 10, 2025024 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Aug 09, 2025Ravie LakshmananVulnerability / Hardware Security

    Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks

    Cybersecurity researchers have disclosed vulnerabilities in select model webcams from Lenovo that could turn them into BadUSB attack devices.

    “This allows remote attackers to inject keystrokes covertly and launch attacks independent of the host operating system,” Eclypsium researchers Paul Asadoorian, Mickey Shkatov, and Jesse Michael said in a report shared with The Hacker News.

    The vulnerabilities have been codenamed BadCam by the firmware security company. The findings were presented at the DEF CON 33 security conference today.

    The development likely marks the first time it has been demonstrated that threat actors who gain control of a Linux-based USB peripheral that’s already attached to a computer can be weaponized for malicious intent.

    In a hypothetical attack scenario, an adversary can take advantage of the vulnerability to send a victim a backdoored webcam, or attach it to a computer if they are able to secure physical access, and remotely issue commands to compromise a computer in order to carry out post-exploitation activity.

    Cybersecurity

    BadUSB, first demonstrated over a decade ago by security researchers Karsten Nohl and Jakob Lell at the 2014 Black Hat conference, is an attack that exploits an inherent vulnerability in USB firmware, essentially reprogramming it to discreetly execute commands or run malicious programs on the victim’s computer.

    “Unlike traditional malware, which lives in the file system and can often be detected by antivirus tools, BadUSB lives in the firmware layer,” Ivanti notes in an explanation of the threat published late last month. “Once connected to a computer, a BadUSB device can: Emulate a keyboard to type malicious commands, install back doors or keyloggers, redirect internet traffic, [and] exfiltrate sensitive data.”

    In recent years, Google-owned Mandiant and the U.S. Federal Bureau of Investigation (FBI) have warned that the financially motivated threat group tracked as FIN7 has resorted to mailing U.S.-based organizations “BadUSB” malicious USB devices to deliver a malware called DICELOADER.

    cams

    The latest discovery from Eclypsium shows that a USB-based peripheral, such as webcams running Linux, that was not initially intended to be malicious, can be a vector for a BadUSB attack, marking a significant escalation. Specifically, it has been found that such devices can be remotely hijacked and transformed into BadUSB devices without ever being physically unplugged or replaced.

    “An attacker who gains remote code execution on a system can reflash the firmware of an attached Linux-powered webcam, repurposing it to behave as a malicious HID or to emulate additional USB devices,” the researchers explained.

    “Once weaponized, the seemingly innocuous webcam can inject keystrokes, deliver malicious payloads, or serve as a foothold for deeper persistence, all while maintaining the outward appearance and core functionality of a standard camera.”

    Furthermore, threat actors with the ability to modify the firmware of the webcam can achieve a greater level of persistence, allowing them to re-infect the victim computer with malware even after it has been wiped and the operating system is reinstalled.

    Identity Security Risk Assessment

    The vulnerabilities uncovered in Lenovo 510 FHD and Lenovo Performance FHD webcams relate to how the devices do not validate firmware, as a result of which they are susceptible to a complete compromise of the camera software via BadUSB-style attacks, given that they run Linux with USB Gadget support.

    Following responsible disclosure with Lenovo in April 2025, the PC manufacturer has released firmware updates (version 4.8.0) to mitigate the vulnerabilities and has worked with the Chinese company SigmaStar to release a tool that plugs the issue.

    “This first-of-its-kind attack highlights a subtle but deeply problematic vector: enterprise and consumer computers often trust their internal and external peripherals, even when those peripherals are capable of running their own operating systems and accepting remote instructions,” Eclypsium said.

    “In the context of Linux webcams, unsigned or poorly protected firmware allows an attacker to subvert not just the host but also any future hosts the camera connects to, propagating the infection and sidestepping traditional controls.”



    Source link

    Attacks BadUSB exploited Flaw Lenovo LinuxBased Remotely Webcams
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    European Space Agency’s cybersecurity in freefall as yet another breach exposes spacecraft and mission data

    January 25, 2026

    Konni hackers target blockchain engineers with AI-built malware

    January 24, 2026

    CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

    January 24, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    A deep dive into Apple’s AI strategy reset, as it prepares to announce a Gemini-powered personalized Siri next month and a reimagined chatbot-like Siri at WWDC (Mark Gurman/Bloomberg)

    January 25, 2026

    European Space Agency’s cybersecurity in freefall as yet another breach exposes spacecraft and mission data

    January 25, 2026

    The human brain may work more like AI than anyone expected

    January 25, 2026

    Non-Abelian anyons: anything but easy

    January 25, 2026
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    A deep dive into Apple’s AI strategy reset, as it prepares to announce a Gemini-powered personalized Siri next month and a reimagined chatbot-like Siri at WWDC (Mark Gurman/Bloomberg)

    January 25, 2026

    European Space Agency’s cybersecurity in freefall as yet another breach exposes spacecraft and mission data

    January 25, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.