Nation-State Threats

Iran Targets IP Cameras Amid Middle East Conflict

Forget standalone cyber ops. Iran's hitting IP cameras right before missiles fly, turning backyard cams into battle damage scouts. This tight cyber-kinetic link rewrites hybrid warfare rules.

Heatmap of Middle East countries with spikes in Iranian IP camera targeting overlaid on missile trajectories

Key Takeaways

  • Iranian actors scan Hikvision/Dahua cameras hours/days before missile strikes, enabling BDA and targeting.
  • Activity uses commercial VPNs like Mullvad, ProtonVPN; tied to specific CVEs, all patchable.
  • Track camera probes as early indicators of kinetic attacks in hybrid warfare.

Everyone figured cyber would tag along in this Middle East flare-up — a distraction, maybe some DDoS noise. But Check Point Research just dropped data showing Iranian threat actors ramping up IP camera scans in lockstep with missile launches. It’s not coincidence. It’s doctrine.

Iran closed airspace January 14, spooked by U.S.-Israel chatter. Same day? Scans spike on cameras in Israel and Qatar. February 28, hostilities kick off — boom, intensified targeting across Israel, UAE, Qatar, Bahrain, Kuwait, even Cyprus and Lebanon spots. These aren’t random pings. They’re probing Hikvision and Dahua gear, the cheap staples in so many security setups.

Taken together, these findings are consistent with the assessment that Iran, as part of its doctrine, use camera compromise for operational support and ongoing battle damage assessment (BDA) for missile operations, potentially in some cases prior to missile launches.

That’s Check Point’s mic-drop line. And it’s gold — because it flips the script. Cyber isn’t support anymore. It’s the forward scout.

When Do Iranian Camera Scans Spike?

Look at the timeline. January 14-15: Anti-regime protests rage inside Iran; they blame Uncle Sam and Israel, shutter skies. CPR spots waves against Israeli cams, Qatar too, even Iraqi Kurdistan. January 24: CENTCOM boss lands in Israel for pow-wows. More scans. Early February: IRGC whispers of U.S. strikes, regional war fears. Guess what follows?

Gulf states light up February 28. Qatar waves. Bahrain pulses. Kuwait joins. All tied to infrastructure Check Point pins on Iran-nexus crews — Mullvad VPNs, Proton, Surfshark, Nord, mixed with VPS nodes. No other vendors hit. Just Hikvision, Dahua.

It’s surgical. And scary precise.

Which Vulnerabilities Are Iranian Hackers Exploiting?

Here’s the tech meat — and why orgs in the crosshairs need to patch yesterday.

CVE-2017-7921: Hikvision auth slip-up.

CVE-2021-36260: Command injection in the web server.

CVE-2023-6895: OS command injection in intercom gear.

CVE-2025-34067: Unauth RCE in security platform.

CVE-2021-33044: Dahua auth bypass across products.

Patches exist for all. But let’s be real — how many exposed cams in Bahrain boardrooms or UAE malls are still running ancient firmware? Check Point deep-dived two: that Dahua bypass and old Hikvision auth hole. Exploitation bids from Iran infra since New Year’s. Waves match geo-heat.

And — here’s my unique angle, absent from the report — this mirrors WWII photo recon flights. Pilots snapped bridges, factories pre-bombing runs. Adjust for 2026: Bots pwn cams for live BDA, target tweaks mid-salvo. Iran’s not inventing; they’re digitizing old-school intel fusion. Bold call? Every intel shop will soon dashboard camera scan surges as missile precursor alerts. Mark it.

Short version: Hybrid war’s here. Cyber primes the guns.

Why Gulf States — And Cyprus? — In the Crosshairs

Israel? Obvious. But Qatar hosts U.S. bases. Bahrain’s Fifth Fleet home. Kuwait, UAE — all U.S. allies stacking arms against Iran. Cyprus? Turkish ties, Israeli intel outposts. Lebanon? Hezbollah turf, Iran’s proxy playground.

Missiles flew there too. Scans preceded. It’s recon blanket before kinetic punch.

But here’s the skepticism: Iran-nexus attribution holds — shared VPN/VPS fingerprints — yet no post-exploit chatter leaked. Are they in? Or just mapping? Either way, it spooked enough to spike alerts.

Data-driven truth: Spikes aren’t hype. They’re correlated to the hour with headlines. CENTCOM visits, airspace shutdowns, missile salvos. Correlation this tight screams causation in threat hunting.

Battle Damage Assessment via Backyard Cams

Remember June 2025’s 12-day Israel-Iran dust-up? Cameras compromised for BDA, likely mid-fight corrections. Now it’s playbook standard. Compromise cams — get eyes on impacts, adjust fire.

Pre-launch too? January scans say yes. Expect U.S., Israel, GCC now scraping IoT logs for Iranian IOCs. Mullvad egress? Red flag. Dahua probes? Evacuate drills.

Critique time: Check Point’s sharp, but they undersell the vendor blame. Hikvision, Dahua — Chinese giants — still ship vulns yearly. Patches? Sure. But why the persistence? Geopolitics — Iran loves it, customers lag patching. Corporate spin says ‘we fixed it.’ Reality: Millions exposed.

So. Patch. Segment. Air-gap critical cams if you can’t. Or become Iran’s free feed.

This intel shifts defenses. Track scans, not just launches.


🧬 Related Insights

Frequently Asked Questions

What vulnerabilities are Iranian hackers targeting in IP cameras?

Hikvision’s CVE-2017-7921 (auth flaw), CVE-2021-36260 (command injection), CVE-2023-6895 (OS injection), CVE-2025-34067 (RCE); Dahua’s CVE-2021-33044 (auth bypass). All patched — update now.

How is Iran using hacked IP cameras in Middle East conflicts?

For battle damage assessment (BDA), operational support, possibly pre-missile targeting. Scans spike before launches in Israel, Gulf states.

Which countries saw Iranian IP camera targeting?

Israel, UAE, Qatar, Bahrain, Kuwait, Lebanon, Cyprus — all missile hot zones.

Sarah Chen
Written by

AI research editor covering LLMs, benchmarks, and the race between frontier labs. Previously at MIT CSAIL.

Frequently asked questions

What vulnerabilities are Iranian hackers targeting in IP cameras?
Hikvision's CVE-2017-7921 (auth flaw), CVE-2021-36260 (command injection), CVE-2023-6895 (OS injection), CVE-2025-34067 (RCE); Dahua's CVE-2021-33044 (auth bypass). All patched — update now.
How is Iran using hacked IP cameras in Middle East conflicts?
For battle damage assessment (BDA), operational support, possibly pre-missile targeting. Scans spike before launches in Israel, Gulf states.
Which countries saw Iranian IP camera targeting?
Israel, UAE, Qatar, Bahrain, Kuwait, Lebanon, Cyprus — all missile hot zones.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Check Point Research

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.