
This is called camfecting, a silent cyberattack method capable of invading users’ privacy without leaving visible traces and stealing images and videos captured in real time.
The word “camfecting” comes from the merger of “camera” and “infecting”.. This term describes the method by which a cybercriminal takes control of the webcam of a device – be it a computer, phone, tablet or other device with optics – without the owner’s knowledge or permission.
Through this illegal access, the attacker can activate the camera, record videos, take photos, Capture screens and even broadcast live without arousing suspicion.

According to cybersecurity firm McAfee, “This hacking technique allows criminals to take control of a webcam (record videos and take photos) without the user’s knowledge or consent. We are therefore talking about a serious breach of privacy that can have devastating consequences for the people affected.”
The consequences for the victim can be The spectrum ranges from espionage and taking confidential images to blackmail and extortionas several international cases have already shown.
Camfecting has gone from a curiosity in the hacker world to a real threat. Attackers often use malware such as Trojans or viruses hidden in seemingly legitimate applicationsthat are distributed via fraudulent websites or through phishing techniques. So when the user installs an unknown program that they think is safe, it grants them – without knowing it – full remote access to their device’s camera.
No special training is required to carry out these attacks, as automated kits are sold on illegal forums that simplify the entire process. Some attackers even manage to bypass the LED light that is supposed to warn the user about active use of the camera.which increases the danger of the modality.

The malware responsible for camfecting doesn’t just manipulate the camera. The control granted also allows access to other sensitive areas of the devicesuch as photo gallery, private messages and browsing history.
Camfecting is particularly dangerous because it produces no obvious signs; It can take place while studying, working or sleeping in front of the computer. However, there are certain signs that may raise suspicion:
- He Camera LED Activation occurs without opening a video program or a video call.
- The operating system shows Error messages This indicates that the camera is already being used by another application.
- Abnormal resource consumption E.g. processor or bandwidth, without clear explanation.
- Phone battery Drains faster or runs slowly for no apparent reason.
- Appearance of unknown apps or files and records that the user does not remember creating.
If any of these signs occur, it is advisable to turn off the Wi-Fi connection, physically cover the camera, and check application access permissions until the specific cause is identified.

Preventing camfecting requires a combination of digital security practices and common sense. Recommended actions include:
- Constantly update devices Integrate the latest security patches from manufacturers. Outdated systems have gaps that attackers can easily exploit.
- Distrust links and programs of dubious origin, only install applications from official sources and avoid clicking on links in unverified messages or emails.
- Use a quality antivirus program Can detect malware that specializes in remote access to peripheral devices.
- Review and restrict permissions which have applications on the camera and other sensitive components.
- Protect access to cameras Using strong passwords, especially for IP cameras and smart home devices.
- Decide on a specific software For example, anti-camfecting programs developed in Spain that not only block unauthorized access, but also immediately inform the user of any break-in attempt.