Jump to content

Dahua Technology: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
add shareholders section
Shareholders: Re-ad information, I trust thats what you intended to do when you created this section.
Line 33: Line 33:
==Shareholders==
==Shareholders==
Dahua Technology is majority owned and controlled by Fu Liquan and his wife Chen Ailing.<ref>{{cite news|url=http://companies.caixin.com/2017-05-12/101089798.html|script-title=zh:大华股份:遭实控人减持7375万股|date=12 May 2017|access-date=24 May 2020|website=caixin|language=zh-cn}}</ref> {{As of|31 December 2019}}, Fu owned 35.97% shares as the largest shareholder, while Chen owned 2.37%.<ref>{{cite report|url=http://www.szse.cn/disclosure/listed/bulletinDetail/index.html?41435ae8-8fae-427e-b7a9-fd1afb47f24d|title=2019 Annual Report|date=2020|accessdate=24 May 2020|publisher=Dahua Technology|via=SZSE}}</ref>
Dahua Technology is majority owned and controlled by Fu Liquan and his wife Chen Ailing.<ref>{{cite news|url=http://companies.caixin.com/2017-05-12/101089798.html|script-title=zh:大华股份:遭实控人减持7375万股|date=12 May 2017|access-date=24 May 2020|website=caixin|language=zh-cn}}</ref> {{As of|31 December 2019}}, Fu owned 35.97% shares as the largest shareholder, while Chen owned 2.37%.<ref>{{cite report|url=http://www.szse.cn/disclosure/listed/bulletinDetail/index.html?41435ae8-8fae-427e-b7a9-fd1afb47f24d|title=2019 Annual Report|date=2020|accessdate=24 May 2020|publisher=Dahua Technology|via=SZSE}}</ref>

The company is partially state-owned by [[Central Huijin Investment]], a subsidiary of sovereign wealth fund [[China Investment Corporation]] that is overseen by the [[State Council of the People's Republic of China]].<ref>{{Cite web|url=https://www.dahuatech.com/upload/2019/04/30/1556590642554i8zji.pdf|title=2019 Q1 Report|last=|first=|date=April 2019|website=Dahua Technology|page=5|url-status=live|archive-url=https://web.archive.org/web/20190905151916/https://www.dahuatech.com/upload/2019/04/30/1556590642554i8zji.pdf|archive-date=September 5, 2019|access-date=September 5, 2019}}</ref>

==See also==
==See also==
* [[Lorex]]
* [[Lorex]]

Revision as of 18:21, 24 May 2020

Zhejiang Dahua Technology Co., Ltd.
Company typePublic company
SZSE: 002236
IndustryVideo surveillance Solutions
Founded2001
HeadquartersHangzhou, China
Area served
Worldwide
ProductsSecurity Cameras, Network Cameras, HDCVI analog-to-HD Solutions, NVR/DVR, PTZ Cameras, Fisheye Cameras
RevenueIncrease $2.1 billion (2016)[1]
Number of employees
+16,000 (2019)
Subsidiaries35
Websitewww.dahuasecurity.com

Zhejiang Dahua Technology Co., Ltd. is a provider of video surveillance products and services.

Subsidiaries

Dahua Technology has around 13,000 employees[2] all over the world. Dahua solutions, products, and services are used in over 180 countries and regions. It has 35 subsidiaries globally covering Asia, the Americas, Europe, Middle East, Oceania, Africa, etc.[3]

Controversies

In September 2016, the largest DDoS attack to date, on KrebsOnSecurity.com, was traced back to a botnet. According to internet provider Level 3 Communications, the most commonly infected devices in this botnet were Dahua and Dahua OEM cameras and DVRs.[4][5][6] Nearly one million Dahua devices were infected with the BASHLITE malware.[4][7][8] A vulnerability in most of Dahua's cameras allowed "anyone to take full control of the devices' underlying Linux operating system just by typing a random username with too many characters."[4] This was exploited, and malware installed on devices that allowed them to be used in "both DDoS attacks as well as for extortion campaigns using ransomware."[4]

In March 2017 a backdoor into many Dahua cameras and DVRs was discovered by security researchers working for a Fortune 500 company.[9] The vulnerability had been activated on cameras within the Fortune 500 company's network, and the data trafficked to China through the company's firewall.[10] Using a web browser, the vulnerability allowed unauthorised people to remotely download a device's database of usernames and passwords and subsequently gain access to it.[11][12] Dahua issued a firmware update to fix the vulnerability in 11 of its products.[13] Security researchers discovered that the updated firmware contained the same vulnerability but that the vulnerability had been relocated to a different part of the code. This was characterized by the security researchers as deliberate deception.[10]

Dahua has played a key role in the mass surveillance of Uyghurs by the Chinese State.[14][15] In October 2019, Dahua was sanctioned by the U.S. Government for its role in surveillance of Uyghurs in Xinjiang and of other ethnic and religious minorities in China.[16]

Shareholders

Dahua Technology is majority owned and controlled by Fu Liquan and his wife Chen Ailing.[17] As of 31 December 2019, Fu owned 35.97% shares as the largest shareholder, while Chen owned 2.37%.[18]

The company is partially state-owned by Central Huijin Investment, a subsidiary of sovereign wealth fund China Investment Corporation that is overseen by the State Council of the People's Republic of China.[19]

See also

References

  1. ^ "Revenue". Reuters. 2014-07-28. Archived from the original on 2015-09-24. Retrieved 2017-06-30.
  2. ^ "Introduction - Dahua Technology". de.dahuasecurity.com. Archived from the original on 2018-02-24. Retrieved 2018-02-25.
  3. ^ "Dahua, GKUVISION, SLR Magic LTD, & DZO" (PDF). olympus-global.com. February 22, 2018. [dead link]
  4. ^ a b c d Franceschi-Bicchierai, Lorenzo (29 September 2016). "How 1.5 Million Connected Cameras Were Hijacked to Make an Unprecedented Botnet". Vice. Archived from the original on 3 June 2019. Retrieved 2019-06-03.
  5. ^ Goodin, Dan. "Brace yourselves—source code powering potent IoT DDoSes just went public". ARS Technica. ARS Technica. Archived from the original on 3 October 2016. Retrieved 2 October 2016.
  6. ^ "Attack of Things!". Level 3 Blog. Level 3 Communications. Archived from the original on 3 October 2016. Retrieved 3 October 2016.
  7. ^ "BASHLITE malware turning millions of Linux Based IoT Devices into DDoS botnet". HackRead. 2016-09-02. Archived from the original on 3 October 2016. Retrieved 3 October 2016.
  8. ^ "BASHLITE Botnets Ensnare 1 Million IoT Devices". www.securityweek.com. Archived from the original on 2019-06-03. Retrieved 2019-06-03.
  9. ^ ipvideomarket (6 March 2017). "Dahua Backdoor Uncovered". IPVM. Archived from the original on 3 June 2019. Retrieved 2019-06-03.
  10. ^ a b J. FREEDBERG JR., SYDNEY. "Hacker Heaven: Huawei's Hidden Back Doors Found". breakingdefense.com. Breaking Defense. Archived from the original on 7 July 2019. Retrieved 7 July 2019.
  11. ^ "Dahua backdoor". Krebs on Security. Archived from the original on 2019-06-03. Retrieved 2019-06-03.
  12. ^ at 02:58, Richard Chirgwin 8 Mar 2017. "Dahua video kit left user credentials in plain sight". The Register. Archived from the original on 3 June 2019. Retrieved 2019-06-03.{{cite web}}: CS1 maint: numeric names: authors list (link)
  13. ^ "Dahua security camera owners urged to update firmware after vulnerability found". The State of Security. 8 March 2017. Archived from the original on 3 June 2019. Retrieved 2019-06-03.
  14. ^ Jennifer Chang, I-wei (2019-12-04). "Taiwan's "Warm Power": Sharing Lessons on Digital Governance". globaltaiwan.org. Global Taiwan Institute. Archived from the original on 14 December 2019. Retrieved 14 December 2019.
  15. ^ "Amazon buys heat-sensing cameras from blacklisted Chinese firm". The Guardian. Reuters. 2020-04-29. ISSN 0261-3077. Archived from the original on 2020-05-02. Retrieved 2020-05-03.
  16. ^ Shepardson, David (2019-10-07). "U.S. puts Hikvision, Chinese security bureaus on economic blacklist". Reuters. Archived from the original on 2019-10-07. Retrieved 2019-10-07.
  17. ^ 大华股份:遭实控人减持7375万股. caixin (in Chinese (China)). 12 May 2017. Retrieved 24 May 2020.
  18. ^ 2019 Annual Report (Report). Dahua Technology. 2020. Retrieved 24 May 2020 – via SZSE.
  19. ^ "2019 Q1 Report" (PDF). Dahua Technology. April 2019. p. 5. Archived (PDF) from the original on September 5, 2019. Retrieved September 5, 2019.