Hikvision Hacked by Faxociety - Your CCTV is Vulnerable

An active attack is currently being carried out on 1000s of Hikvision DVRs, NVRs and cameras which use old firmware and weak passwords.  

The hack is believed to insert text using the on screen display (OSD) settings and displays the following message: 

"Your CCTV is vulnerable and can be exposed, fix it pls - DIY or Telegram me - faxociety."

Hikvision_Hack



To Resolve the issue:

1. Update the DVR, NVR or Camera firmware to the latest version. To obtain the firmware search your model number on web browser and find the product page on Hikvision.com, the firmware link is below the spec table.

2. Reset the unit to Factory Default (IMPORTANT - for NVRS make sure you have verified the camera password before defaulting the NVR or you will lose connection to the cameras). If you don't factory default the unit the message will remain as the hacker has set the OSD text. You can delete but we strongly recommend you default and set up again to ensure all settings are correct.

3. Make sure you choose a new strong password with at least 8 characters, mixture of characters and numbers, capitals and lower case. For old DVRs which default to 12345 password, Go to  Menu / Configuration / User and edit the admin user to change the password.

For support contact your distributor