Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Designing With AI, Not Around It: Practical Advanced Techniques For Product Design Use Cases

      August 11, 2025

      Why Companies Are Investing in AI-Powered React.js Development Services in 2025

      August 11, 2025

      The coming AI smartphone: Redefining personal tech

      August 11, 2025

      Modern React animation libraries: Real examples for engaging UIs

      August 11, 2025

      Accelerating Video Quality Control at Netflix with Pixel Error Detection

      August 11, 2025

      Securing the supply chain at scale: Starting with 71 important open source projects

      August 11, 2025

      Auf Wiedersehen, GitHub ♥️

      August 11, 2025

      Getting Creative With Quotes

      August 11, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Next.js PWA offline capability with Service Worker, no extra package

      August 10, 2025
      Recent

      Next.js PWA offline capability with Service Worker, no extra package

      August 10, 2025

      spatie/laravel-flare

      August 9, 2025

      Establishing Consistent Data Foundations with Laravel’s Database Population System

      August 8, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft sued over killing support for Windows 10

      August 11, 2025
      Recent

      Microsoft sued over killing support for Windows 10

      August 11, 2025

      Grok 4 rolled out for free-tier users worldwide, with some limits

      August 11, 2025

      Firefox AI slammed for hogging CPU and draining battery

      August 11, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»BadCam Attack Turns Trusted Linux Webcams into Stealthy USB Weapons

    BadCam Attack Turns Trusted Linux Webcams into Stealthy USB Weapons

    August 11, 2025

    BadCam

    A new class of USB-based attacks has come to light. These attacks are not just targeting removable devices, but existing, trusted peripherals already connected to systems: Linux webcams. Attackers can now exploit vulnerabilities in commonly used USB webcams running embedded Linux, transforming them into BadUSB devices capable of injecting keystrokes and executing covert operations independently of the host operating system.

    This threat, now referred to as “BadCam”, builds upon the original concept of BadUSB attacks, first introduced by Karsten Nohl and Jakob Lell at Black Hat 2014. At the core of the issue lies a fundamental flaw in the USB specification, which lacks mandatory enforcement of firmware signature validation. This oversight allows USB devices, like flash drives, keyboards, and now webcams, to be reprogrammed to impersonate trusted Human Interface Devices (HIDs), silently executing commands once plugged into a host.

    What sets BadCam apart is its method of exploitation. Unlike traditional BadUSB attacks that rely on unsuspecting users inserting malicious USB sticks, BadCam enables attackers to remotely hijack Linux-powered webcams already attached to a system, making them stealthy and persistent attack vectors without any need for physical access.

    This BadCam threat was revealed by cybersecurity researchers Jesse Michael and Mickey Shkatov from Eclypsium.

    The BadCam Targets: Lenovo Webcams with Linux Firmware 

    The research focused on two specific models: 

    • Lenovo 510 FHD Webcam (GXC1D66063, FRU: 5C21E09202) 
    • Lenovo Performance FHD Webcam (4XC1D66055, FRU: 5C21D66059) 

    Both cameras are built on SigmaStar SSC9351D SoCs, dual-core ARM Cortex-A7 processors running embedded Linux with USB Gadget support. This hardware configuration enables these webcams to masquerade as other USB peripherals, such as keyboards or network adapters.

    Eclypsium discovered that the firmware on these devices lacks signature validation. As a result, attackers who gain remote access to a system can reflash the webcam’s firmware to install malicious code. Once compromised, the webcam can simulate keyboard input (i.e., emulate a Rubber Ducky or Bash Bunny) and launch stealthy attacks.

    Attack Vectors: Physical and Remote 

    Two primary attack scenarios were outlined: 

    • Supply Chain or Physical Access: An attacker can deliver a compromised webcam (or physically access a machine) and plug in the weaponized device. 
    • Remote Firmware Injection: More critically, an attacker with remote access to a computer can identify an attached Linux webcam and push a malicious firmware update to it, converting it into a BadUSB attack platform without user interaction. 

    In both cases, the weaponized webcam retains its camera functionality, making detection extremely difficult. Moreover, because the malware resides in the peripheral’s firmware and not the host OS, even reformatting the computer won’t remove the threat. The infected camera can re-infect the host repeatedly. 

    The Implications for USB Security 

    While this research highlights two Lenovo webcams, the implications extend far beyond them. Many USB peripherals running Linux, from cameras to IoT devices, may lack proper firmware validation.

    Any device that supports the Linux USB Gadget subsystem could theoretically be exploited in similar ways. As Eclypsium warns, this is not just about webcams, but a growing class of embedded USB devices that now represent viable targets for BadUSB attacks.

    The Linux USB Gadget framework allows devices to present themselves as any USB class (mass storage, HID, serial, etc.). This capability, combined with insufficient firmware protections, creates a potent cocktail for attackers aiming to create stealthy, persistent, and modular BadUSB devices. 

    Proof-of-Concept 

    The researchers demonstrated how a malicious firmware update could be delivered using simple commands over USB. A short sequence, such as probing the SPI flash, erasing memory, and writing a new binary, completely replaces the original firmware. They cited the specific build: 

    objectivec 

    CopyEdit 

    FW VERSION: CMK-HD510-OT1917-FW-4.6.2
    Linux 4.9.84 armv7l GNU/Linux

    This update process essentially enables full control over the camera, turning it into a hidden attacker tool. 

    Real-World Risks and Persistent Threats 

    What sets this attack apart is the level of persistence it offers. Once compromised, the webcam becomes a persistent backdoor. Even a wiped and rebuilt host system remains vulnerable if the compromised webcam is plugged back in. 

    The stealthy nature of these attacks means that traditional endpoint detection tools are ineffective. Since the malicious logic operates at the firmware level, it’s invisible to antivirus software or OS-level monitoring tools. 

    Timeline and Vendor Response 

    The vulnerability was responsibly disclosed by Eclypsium to Lenovo starting in March 2025. A series of communications and fixes followed: 

    • July 29, 2025: Lenovo confirms a firmware fix and schedules advisory publication. 
    • August 8, 2025: Findings presented, and Lenovo publishes firmware update tools. 

    Lenovo has since released updated firmware tools addressing the signature validation issues in the affected webcam models. Users can visit Lenovo’s support site to download version 4.8.0 of the firmware. 

    Conclusion 

    The weaponization of Linux webcams represents a profound shift in USB attack surfaces. These devices, once thought of as passive input peripherals, are now proven capable of being transformed into active attack components through remote firmware compromise. Organizations must urgently adopt stricter device verification, enforce firmware signature validation, and rethink trust assumptions around USB peripherals, especially those powered by Linux. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-8355 & CVE-2025-8356: Xerox Issues Urgent Fixes for SSRF and RCE Bugs
    Next Article WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately

    Related Posts

    Development

    WinRAR Zero-Day Under Active Exploitation – Update to Latest Version Immediately

    August 11, 2025
    Development

    CVE-2025-8355 & CVE-2025-8356: Xerox Issues Urgent Fixes for SSRF and RCE Bugs

    August 11, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Apache Tomcat Patches 4 Flaws: DoS, Privilege Bypass, & Installer Risks Addressed

    Security

    Alibaba’s Qwen 3 family of hybrid reasoning AI models is a potential threat rivals

    Operating Systems

    Law Enforcement Takes Down Botnet Made Up of Thousands of End-Of-Life Routers

    Development

    Microsoft’s move to unbundle Teams from Office may help it avoid hefty EU fine

    Operating Systems

    Highlights

    Microsoft Spent Up to $50M on Individual Game Pass Deals, Ex-Manager Reveals

    July 13, 2025

    Game Pass subscribers get hundreds of titles at their fingertips, but adding those games to…

    CVE-2025-3457 – WordPress Ocean Extra Stored Cross-Site Scripting Vulnerability

    April 22, 2025

    Perplexity’s Comet AI browser is hurtling toward Chrome – how to try it

    July 10, 2025

    CVE-2025-7092 – Belkin F9K1122 Web WPS Enrolee Pin Stack Buffer Overflow

    July 7, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.