{"id":31642,"date":"2019-11-05T21:13:00","date_gmt":"2019-11-05T21:13:00","guid":{"rendered":"http:\/\/fcffbff7-4602-4d9e-ac4b-ecde11278ca8"},"modified":"2019-11-05T21:13:00","modified_gmt":"2019-11-05T21:13:00","slug":"kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/","title":{"rendered":"Kamerka OSINT tool shows your country&#8217;s internet-connected critical infrastructure"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2019\/11\/05\/56e7e4bb-93ba-4fe3-ae4e-d5c6fe480b99\/f38386007555a677dfc47a846c9ff1e5\/kamerka-1.jpg\" class alt=\"Kamerka tool\"><\/span><span class=\"credit\">Image: Wojciech<\/span><\/p>\n<p>A Polish security researcher has created an open-source intelligence (OSINT) gathering tool that indexes information about sensitive internet-connected devices and plots their approximate location on a map.<\/p>\n<p>The researcher says he created the tool as a way to allow organizations to scan their networks and identify vulnerable equipment, but the tool also has its dark side, as it can be used by attackers to target organizations with less effort than ever before.<\/p>\n<h3>Kamerka<\/h3>\n<p>Named <strong>Kamerka<\/strong> (&#8220;camera&#8221; in Polish), the tool was released last year. The tool works on user-provided search queries. Kamerka takes these queries and uses search engines like Shodan and BinaryEdge to search for common brands of a particular device, and plot results on a Google Map.<\/p>\n<p>While in its initial version Kamerka scanned <a href=\"https:\/\/medium.com\/@woj_ciech\/%EA%93%98amerka-build-interactive-map-of-cameras-from-shodan-a0267849ec0a\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">only for security cameras<\/a> &#8212; hence the Kamerka name &#8212; the tool has received several updates in the past year. Current versions can scan and identify:<\/p>\n<ul>\n<li>Internet-connected security cameras<\/li>\n<li>Internet-connected printers<\/li>\n<li>Internet-connected <a href=\"https:\/\/www.kuppingercole.com\/blog\/williamson\/ot-ics-scada-whats-the-difference\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">ICS\/SCADA<\/a> industrial equipment<\/li>\n<li>Systems and sensors that work on top of the MQTT protocol<\/li>\n<li>Devices that broadcast an RTSP-based live video stream<\/li>\n<li>Tweets, Instagram posts, and Flicker images that contain geolocation details<\/li>\n<\/ul>\n<p>Kamerka gathers this information, collects it in an Elasticsearch database, and then plots it on a Google Map. For each device plotted on the map, users can click and see a tooltip with exposed ports and various other metadata.<\/p>\n<p>Until this week, you could only run Kamerka searches via a shoddy Python command-line script that was hard to use.<\/p>\n<p>But the tool&#8217;s creator, a researcher going by the name of <a href=\"https:\/\/twitter.com\/the_wojciech\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Wojciech<\/a>, told <em>ZDNet<\/em> that the tool will receive a fully-functional web-based dashboard. The new web dashboard, scheduled for release later this week, will make installing and searching for devices with Kamerka a lot easier.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/\" class=\"lazy\" alt=\"kamerka-2.jpg\" data-original=\" https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2019\/11\/05\/ef0ddfc3-9b02-4fe8-8bbf-1fa39980c4f4\/11418675a502cb74c20ffbaed32770cd\/kamerka-2.jpg\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2019\/11\/05\/ef0ddfc3-9b02-4fe8-8bbf-1fa39980c4f4\/11418675a502cb74c20ffbaed32770cd\/kamerka-2.jpg\" class alt=\"kamerka-2.jpg\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Wojciech<\/span><\/p>\n<h3>Focusing on industrial equipment<\/h3>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>This new version will focus specifically on improving the detection of industrial control systems, an area where Wojciech has invested heavily over the past year.<\/p>\n<p>Previous Kamerka versions could detect ICS\/SCADA systems like Modbus, Siemens S7, Tridium, General Electric, BACnet, HART IP, Omron, Mitsubishi Electric, DNP3, EtherNet\/IP, PCWorx, Red Lion, Codesys, IEC 60870-5-104, and ProConOS.<\/p>\n<p>The new version will also be capable of detecting Pl@ntVisor, Iologik, Moxa devices, SpiderControl, IQ3, VTScada, Z-World, Nordex, and various fuel tanks.<\/p>\n<p>&#8220;It will be a new intelligence platform to gather info on exposed devices in a particular territory based on your coordinates or a scan of a whole country,&#8221; Wojciech told <em>ZDNet<\/em>.<\/p>\n<p>If that sounds scary, it&#8217;s because it is scary. Kamerka effectively lets a user see what a hacker sees when searching or studying a target.<\/p>\n<p>It can be used by companies as a reconnaissance tool to self-diagnose their own networks, but it&#8217;s also one of those dual-use tools that hackers will also love and will most likely abuse to plan future hacks.<\/p>\n<p>Over the past months, Wojciech showcased Kamerka&#8217;s scary capabilities in two blog posts in which he used to tool to identify internet-connected industrial equipment in <a href=\"https:\/\/medium.com\/@woj_ciech\/state-of-industrial-control-systems-in-poland-and-switzerland-656e2e363fe3\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Poland, Switzerland<\/a>, and <a href=\"https:\/\/www.icscybersecurityconference.com\/intelligence-gathering-on-u-s-critical-infrastructure\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">the US<\/a>.<\/p>\n<p>Starting from a simple search query (like for Niagara Fox devices located in the US), Wojciech showed how an attacker could use Kamerka to track down the equipment in an area they want to hack.<\/p>\n<p>Some Kamerka locations may not be identical to their real-world locations, but the metadata provided by Kamerka can help attackers pinpoint a target&#8217;s real location with a few Google searches.<\/p>\n<p>For example, an attacker can click on device icons, get metadata info about a device, and then search for various terms like factory names or street names to locate a target&#8217;s real-world location, complete with Google Maps driving instructions, and even Street View imagery.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/\" class=\"lazy\" alt=\"kamerka-3.jpg\" data-original=\" https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2019\/11\/05\/f330a9fc-bbb9-47dd-b99c-39c552aed6e3\/255a01b54323faeeeaed156879bc1572\/kamerka-3.jpg\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2019\/11\/05\/f330a9fc-bbb9-47dd-b99c-39c552aed6e3\/255a01b54323faeeeaed156879bc1572\/kamerka-3.jpg\" class alt=\"kamerka-3.jpg\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Wojciech<\/span> <span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/\" class=\"lazy\" alt=\"kamerka-4.jpg\" data-original=\" https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2019\/11\/05\/bac15e4c-2fc5-48b5-bce2-7539031dfa93\/65ea78d01dfbca697e3567c2bb1f1a40\/kamerka-4.jpg\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2019\/11\/05\/bac15e4c-2fc5-48b5-bce2-7539031dfa93\/65ea78d01dfbca697e3567c2bb1f1a40\/kamerka-4.jpg\" class alt=\"kamerka-4.jpg\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Wojciech<\/span> <span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/\" class=\"lazy\" alt=\"kamerka-5.jpg\" data-original=\" https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2019\/11\/05\/ff7846e5-c271-471b-8b22-671955c9531e\/b82974c8e744873aeead8e0d2f3d2847\/kamerka-5.jpg\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2019\/11\/05\/ff7846e5-c271-471b-8b22-671955c9531e\/b82974c8e744873aeead8e0d2f3d2847\/kamerka-5.jpg\" class alt=\"kamerka-5.jpg\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Wojciech<\/span><\/p>\n<p>The reason why Kamerka is so effective is because many system administrators often have to manage large fleets of devices. Instead of using numerical values to identify equipment, they often use building names or full addresses to provide descriptions as accurate as possible.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/\" class=\"lazy\" alt=\"kamerka-6.jpg\" data-original=\" https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/11\/05\/d39398d0-b624-4248-bc3d-6e10770bbd8c\/3acfcf4cd1f15ddced9d55bd480dae9c\/kamerka-6.jpg\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/11\/05\/d39398d0-b624-4248-bc3d-6e10770bbd8c\/3acfcf4cd1f15ddced9d55bd480dae9c\/kamerka-6.jpg\" class alt=\"kamerka-6.jpg\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: Wojciech<\/span><\/p>\n<p>Such information was also previously available on Shodan or BinaryEdge, but you&#8217;d only find it when searching for a very specific IP address. With Kamerka, all of this info is available on a map.<\/p>\n<p>In the past few years, factories, power plants, and <a href=\"https:\/\/www.icscybersecurityconference.com\/intelligence-gathering-on-u-s-critical-infrastructure\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">other critical infrastructure entities<\/a> have been exposing an ever-increasing attack surface online.<\/p>\n<p>Attackers have compromised nuclear plants, power grids, dams, hospitals, government agencies, and military targets, only to name a few of their targets.<\/p>\n<p>In many cases, attacks took days or weeks to plan. With a tool like Kamerka, planning an attack would only take a few minutes. With a few searches, an attacker could find a target in a specific area, identify unpatched equipment (Shodan lists exposed ports and unpatched vulnerabilities), and launch attacks to take over the vulnerable device.<\/p>\n<p>Such tactics aren&#8217;t theoretical anymore. Back in August, Microsoft warned that Russian state-sponsored hackers have been seen using smart devices such as printers and video surveillance recorders <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-russian-state-hackers-are-using-iot-devices-to-breach-enterprise-networks\/\" target=\"_blank\" rel=\"noopener noreferrer\">as entry points into organizations<\/a>.<\/p>\n<p>But nation-state hacking groups shouldn&#8217;t be the only thing organizations fear. Wojciech warns that ransomware gangs may also start targeting smart devices exposed on the internet in a similar way &#8212; using them as an entry points inside critical targets.<\/p>\n<p>With Kamerka, their job has surely been made a hell lot easier.<\/p>\n<p>&#8220;I realize it&#8217;s not a simple task to take over whole power plant, but it can start from small misconfiguration like exposing devices to the Internet, using default credentials or running other vulnerable software,&#8221; Wojciech says.<\/p>\n<p>Kamerka is <a href=\"https:\/\/github.com\/woj-ciech\/kamerka\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">available on GitHub<\/a>.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kamerka lets you see what a hacker sees. It plots maps with SCADA equipment, webcams, and printers that have been left exposed on the internet inside any given country.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":31643,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-31642","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kamerka OSINT tool shows your country&#039;s internet-connected critical infrastructure 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kamerka OSINT tool shows your country&#039;s internet-connected critical infrastructure 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-05T21:13:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"920\" \/>\n\t<meta property=\"og:image:height\" content=\"505\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Kamerka OSINT tool shows your country&#8217;s internet-connected critical infrastructure\",\"datePublished\":\"2019-11-05T21:13:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/\"},\"wordCount\":949,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/\",\"name\":\"Kamerka OSINT tool shows your country's internet-connected critical infrastructure 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure.jpg\",\"datePublished\":\"2019-11-05T21:13:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure.jpg\",\"width\":920,\"height\":505},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kamerka OSINT tool shows your country&#8217;s internet-connected critical infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kamerka OSINT tool shows your country's internet-connected critical infrastructure 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Kamerka OSINT tool shows your country's internet-connected critical infrastructure 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-11-05T21:13:00+00:00","og_image":[{"width":920,"height":505,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Kamerka OSINT tool shows your country&#8217;s internet-connected critical infrastructure","datePublished":"2019-11-05T21:13:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/"},"wordCount":949,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/","url":"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/","name":"Kamerka OSINT tool shows your country's internet-connected critical infrastructure 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure.jpg","datePublished":"2019-11-05T21:13:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/11\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure.jpg","width":920,"height":505},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/kamerka-osint-tool-shows-your-countrys-internet-connected-critical-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Kamerka OSINT tool shows your country&#8217;s internet-connected critical infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/31642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=31642"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/31642\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/31643"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=31642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=31642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=31642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}