|

Lenovo’s Linux Webcams Can Be Remotely Turned Into BadUSB Attack Tools — Here’s What to Do Now

Imagine your webcam—still working, still streaming—quietly transforming into a hacker’s keyboard. No malicious file on disk. No pop-up alerts. Just silent keystrokes injected behind the scenes, across Windows, macOS, or Linux. That’s the unsettling reality security researchers have revealed with new flaws in select Lenovo webcams.

At DEF CON 33, firmware security experts at Eclypsium unveiled “BadCam,” a first-of-its-kind technique showing how attackers can remotely hijack certain Linux-powered webcams and reprogram them as BadUSB devices. Even more troubling: this can be done without ever unplugging or swapping the camera.

If you own a Lenovo 510 FHD or Lenovo Performance FHD webcam—or you manage fleets of peripherals in an enterprise—this is your heads-up and your how-to guide. Let’s unpack what’s happening, why it matters, and the steps you should take today.

  • Quick context:
  • Affected: Lenovo 510 FHD and Lenovo Performance FHD webcams
  • Issue: Firmware not validated, enabling full compromise of the device
  • Impact: Remote keystroke injection, payload delivery, and firmware-level persistence
  • Fix: Update to firmware version 4.8.0 from Lenovo
  • Who needs to act: Both home users and enterprises—ASAP

For background reading: Eclypsium’s research is summarized by The Hacker News, with the original team presenting at DEF CON. The attack builds on a long-known class of threats called “BadUSB,” popularized at Black Hat USA 2014.

What Is BadUSB? A Quick, Clear Primer

BadUSB is not a single piece of malware. It’s a class of attacks that exploit the fact that many USB devices run firmware—the low-level code that tells the device how to behave. If an attacker can reprogram that firmware, they can make the device act like something else, often a Human Interface Device (HID) such as a keyboard.

Why that’s dangerous: – Keyboards are trusted. Operating systems happily accept keystrokes. – No file needs to hit disk. Traditional antivirus may never see it. – The device can keep working normally while performing hidden actions.

Security teams have tracked real-world use of BadUSB-like techniques. For example, Mandiant and the FBI have warned about FIN7 mailing “BadUSB” devices to U.S. organizations to deliver malware. And vendors such as Ivanti have explained how firmware-level manipulation evades standard defenses.

What’s New About “BadCam”?

Here’s the twist: Eclypsium found that certain Lenovo webcams run Linux with USB Gadget support and do not validate firmware updates. That means an attacker who already has remote code execution on your computer can reflash the webcam’s firmware while it’s connected—no physical swap required.

Once reflashed, the camera can: – Emulate a keyboard and inject covert keystrokes – Emulate additional USB devices to bypass policy controls – Deliver payloads for post-exploitation – Persist across operating system reinstalls by living in the camera’s firmware

That last point is worth repeating. Because the malicious code lives in the webcam’s firmware—not your OS—even a full wipe and reinstall won’t remove it. The camera can simply re-infect the host or any future host it’s plugged into.

Eclypsium codenamed this technique “BadCam,” highlighting that a benign peripheral can be turned into a BadUSB platform without leaving obvious traces on the computer.

Affected Models: Check Your Webcam

Eclypsium’s research and Lenovo’s response reference: – Lenovo 510 FHD webcam – Lenovo Performance FHD webcam

These models run Linux-based firmware and are specifically affected by the lack of firmware validation, making BadUSB-style abuse possible.

Lenovo has released updates (firmware version 4.8.0) and a vendor-provided tool to fix the issue. If you own these webcams, you should assume you’re affected until you verify and update.

Where to go: – Get firmware and tools from Lenovo Support – Look up your exact model by product name or serial – Follow Lenovo’s instructions for updating to version 4.8.0

Note: Lenovo worked with SigmaStar (the SoC vendor) on a tool to address the flaw. Check Lenovo’s support notes for reference to the SigmaStar fix.

Why This Matters (Even If You’re Not “High Value”)

Let me explain why this hits a nerve with defenders: – It breaks trust assumptions. We tend to trust our peripherals. This shows that trust can be misplaced. – It’s OS-agnostic. Keystroke injection works on Windows, macOS, and Linux. – It hides well. There’s no malicious file on disk. The device looks like a normal camera. – It persists. The malicious code can sit in the webcam and outlive a system rebuild.

Here’s why that matters in practice: – Password pop-ups can be hijacked via injected keystrokes. – Endpoint protection can be bypassed through OS-native actions. – A cleaned system can be re-compromised when the same camera is plugged back in.

In short: It’s stealthy, durable, and effective.

How the Attack Chain Could Unfold (High Level)

Without getting into operational details, here’s the big picture: 1. An attacker gains remote code execution on a computer (phishing, exploit, or insider). 2. They identify a vulnerable Linux-based webcam that’s attached. 3. They reflash the webcam’s firmware remotely, leveraging the lack of validation. 4. The webcam now impersonates a keyboard (or other USB device) while still acting like a camera. 5. The attacker injects commands, installs persistence, or steals data—beyond the reach of many traditional controls. 6. Even if the OS is rebuilt, the compromised camera can re-introduce the threat.

This is especially dangerous in enterprises, where the same webcam might move between machines, or where standardized hardware is deployed at scale.

What You Should Do Right Now

If you own or manage Lenovo 510 FHD or Lenovo Performance FHD webcams, act today.

Immediate steps: – Update the firmware to version 4.8.0 via Lenovo Support – Use Lenovo’s (SigmaStar) tool if required by the advisory – Verify the firmware version after updating – Reboot the host system and re-connect the camera – Document the update in your asset inventory

If you can’t update immediately: – Unplug and quarantine the camera until you can apply the fix – Avoid connecting it to other hosts

If you suspect compromise: – Replace or reflash the camera using official tools – Change passwords and rotate credentials used on the host – Review logs for unusual HID events or command execution – In enterprises, triage similar cameras fleet-wide

Hardening Tips for Enterprises

Peripherals are now part of your attack surface. Treat them that way.

Policy and inventory: – Maintain an inventory of all USB peripherals, including make, model, and firmware version. – Standardize on approved models and enforce purchase controls. – Require signed firmware and vendor validation for all device updates.

Technical controls: – Enforce USB device control policies: – Linux: Use USBGuard to allow only known device classes and IDs. – Windows: Apply Device Installation Restrictions and HID filtering via Group Policy or MDM. – macOS: Use Endpoint Security frameworks and MDM profiles to limit new HID devices. – Disable or restrict USB HID where possible in high-risk environments. – Require admin approval for new USB devices and enforce just-in-time authorization. – Monitor for sudden appearance of new HID interfaces from known non-HID devices (e.g., a camera showing up as a keyboard). – Use EDR to flag suspicious sequences of keystrokes or command-line activity following USB events.

Detection and monitoring: – Alert on changes to USB descriptors and device class codes. – Correlate USB connection events with process starts, credential prompts, or privilege escalations. – Watch for repeated RCE-to-firmware-update patterns on endpoints.

Process and vendor management: – Ask vendors for SBOMs (software bill of materials) and secure firmware development practices. – Require signed firmware and secure boot mechanisms in peripherals. – Include USB peripheral security in procurement and vendor risk assessments.

Frameworks and guidance: – Map controls to standards like NIST SP 800-53. – Follow general recommendations from agencies like CISA for device hygiene and supply chain risk.

Signs Your Webcam Might Be Misbehaving

Because firmware-level threats hide well, detection can be tricky. Still, keep an eye out for:

Behavioral hints: – The camera functions normally, but your system “detects” a new keyboard when it’s plugged in. – You see unexplained keystrokes, pop-ups, or command windows flickering open and closed. – EDR correlates USB connect events with suspicious command execution.

Technical hints: – USB device descriptor changes when the camera is reconnected. – Windows Event Viewer logs show new HID-class devices tied to the camera’s connection time. – On Linux, dmesg or journal entries reveal unexpected interface classes on the camera’s USB device.

If you see any of the above, assume compromise until proven otherwise. Unplug the webcam and switch to a known-good device, then investigate.

What This Means for the Future of Peripheral Security

BadCam underscores a simple truth: peripherals are computers. Many run Linux or RTOS, have writable storage, accept remote instructions, and can present multiple USB personalities. That means: – Firmware signing and validation are table stakes for vendors. – Zero Trust must extend to peripherals, not just users and networks. – Enterprise controls should treat USB endpoints as untrusted until verified.

Expect to see more scrutiny of webcams, docks, KVMs, headsets, and even keyboards themselves. Defenders will need better device attestation, improved policy enforcement, and vendor commitments to secure firmware lifecycles.

Practical Steps for Home Users

You don’t need a SOC to reduce your risk.

Do this now: – Check your model. If it’s a Lenovo 510 FHD or Performance FHD, update to 4.8.0 via Lenovo Support. – Only buy webcams from reputable sellers. Avoid free or unknown-brand devices. – Don’t plug in “found” USB gear—ever. – Consider a simple USB data blocker when charging unknown devices (note: this won’t block HID, but it’s good general hygiene for chargers).

If something feels off: – Unplug the camera and try a different one. – Run a scan with your security software and change key passwords. – Keep your OS and apps up to date.

For Security Teams: A Short Incident Response Playbook

If you suspect a BadUSB-style peripheral compromise:

1) Isolate – Disconnect the webcam. If it must stay connected for forensics, isolate the host from the network.

2) Preserve – Capture system logs around USB events. – Record USB descriptors before and after reconnection in a controlled environment.

3) Remediate – Reflash the webcam using Lenovo’s official tool and update to 4.8.0. – If reflashing isn’t possible, replace the webcam.

4) Clean – Reimage the host if signs of deeper compromise exist. – Rotate credentials, particularly for accounts used on the host.

5) Prevent – Roll out USB control policies (USBGuard/MDM). – Update enterprise hardening baselines. – Track firmware versions of all similar peripherals.

Credible Sources and Further Reading

FAQs: Lenovo Webcam Vulnerabilities, BadUSB, and Your Risk

Q: Which Lenovo webcams are affected? A: The Lenovo 510 FHD and Lenovo Performance FHD webcams are impacted. They run Linux-based firmware and, prior to Lenovo’s update, did not validate firmware properly.

Q: What exactly is the risk? A: An attacker who already has remote code execution on your computer could reflash the webcam’s firmware and make it behave like a keyboard (or other USB device) to inject commands. The camera can keep working while enabling covert attacks. Because the malicious code lives in the camera’s firmware, it can persist even after you reinstall your operating system.

Q: Does this work against Windows, macOS, or Linux? A: Yes. Keystroke injection is OS-agnostic because all major operating systems trust keyboards and process HID input by design.

Q: Can antivirus or EDR detect this? A: Traditional antivirus may miss it because there’s no malicious file on disk. Some EDR tools can flag suspicious behavior, such as new HID devices appearing, unexpected command execution, or unusual keystroke patterns. Still, prevention (firmware updates and USB policy) is critical.

Q: How do I fix it? A: Update your webcam to firmware version 4.8.0 via Lenovo Support. Follow Lenovo’s instructions, use the vendor-provided tool if required, and verify the update afterward.

Q: How do I check my webcam’s firmware version? A: Lenovo’s update utility or support instructions typically display the current firmware version during the update process. Check your specific model page on Lenovo Support for steps.

Q: What if I can’t update right now? A: Unplug the camera and quarantine it until you can update. Avoid moving it between hosts. In high-risk environments, replace it with an updated or known-good model.

Q: Are other brands affected? A: Eclypsium’s research focused on specific Lenovo models. However, the broader class of risk applies to any USB device with updatable firmware and poor validation. Ask vendors about signed firmware, secure boot, and their firmware update process.

Q: Could a clean OS reinstall remove the threat? A: Not if the webcam itself is compromised. The malicious code sits in the device firmware. You must reflash or replace the camera to fully remove the risk.

Q: Should my company disable all USB devices? A: Not necessarily. A more practical approach is device control and policy: allow only approved devices, block unexpected HID, and inventory firmware versions. Tools like USBGuard (Linux) and MDM/GPO policies (Windows/macOS) can help.

Q: How did this come to light? A: Eclypsium researchers presented the findings at DEF CON 33. Lenovo released firmware updates (v4.8.0) following coordinated disclosure in April 2025. See DEF CON and The Hacker News for coverage.

The Bottom Line

Peripherals are no longer “dumb” accessories. They’re small computers with their own firmware—and that makes them part of your security perimeter. With BadCam, researchers showed how a common webcam can be silently repurposed into a BadUSB device and used as a stealthy foothold.

If you own a Lenovo 510 FHD or Lenovo Performance FHD webcam, update to firmware 4.8.0 now via Lenovo Support. If you run IT for an organization, expand your threat model to include USB peripherals, enforce device policies, and demand signed firmware from vendors.

Want more practical security breakdowns like this? Subscribe to stay ahead of the next wave of hardware and firmware threats—and turn today’s lessons into tomorrow’s resilience.

Discover more at InnoVirtuoso.com

I would love some feedback on my writing so if you have any, please don’t hesitate to leave a comment around here or in any platforms that is convenient for you.

For more on tech and other topics, explore InnoVirtuoso.com anytime. Subscribe to my newsletter and join our growing community—we’ll create something magical together. I promise, it’ll never be boring! 

Stay updated with the latest news—subscribe to our newsletter today!

Thank you all—wishing you an amazing day ahead!

Read more related Articles at InnoVirtuoso

Browse InnoVirtuoso for more!