A family in DeSoto County, Mississippi, bought a Ring security camera so they could keep an eye on their three young girls in their bedroom. Four days later, they learned that a hacker had broken into the camera and subjected their children to continuous bedroom surveillance, taunting the children through the camera's built-in speaker.
Ring blamed the break-in on the failure of the family to turn on two-factor authentication, using a weak password, and failing to change passwords (these are all good ideas, except for frequently changing passwords, which just leads to weaker password quality -- but they're also things that almost no one does).
Motherboard identified several crime-forums where hackers were trading automated tools to break into Ring cameras, using credential-stuffing attacks (previously), which involve trying a succession of leaked username/password combos until you find one that has been recycled on the service you're trying to break into. These tools sell for as little as $6.
Other Ring camera owners have faced similar privacy invasions, including a family in Florida that was subjected to a string of racial abuse through their cameras' speakers.
Using good passwords and 2FA is good advice, but better advice is to never put networked cameras or microphones in your home, ever.
In a video obtained by WMC5 courtesy of the family, you can see what the hacker would have seen: A viewpoint that looms over the entire room from where the camera is installed in a far corner, looking down on their beds and dressers while they play. The hacker is heard playing the song "Tiptoe Through the Tulips" through the device's speakers, and when one of the daughters, who is eight years old, stops and asks who's there, the hacker says, "It's Santa. It's your best friend."
How Hackers Are Breaking Into Ring Cameras [Joseph Cox and Samantha Cole/Motherboard]
At Reddit, mtietje posted this remarkable photo of their lockdown project: an iPad stand made using an old Macintosh SE/30. The display size is perfect for the 9.7″ iPad, and now that iPadOS can use mice they work much better as “normal” computers. Se/30 shells turn up on eBay now and again. One’s there now […]
A $350 USB device claiming to block 5G radio signals is just a cheap unbranded thumbdrive, report security researchers. The makers of the “5GBioShield” claim their USB stick can block electrical waves through a “proprietary holographic nano-layer catalyst” technology. It purportedly does this by “balancing” all the existing radiations around you to create a protective […]
COOPH put together a video featuring DIY smartphone video rigs put together with stuff lying around the house. Want to make your smartphone footage more creative than ever? In our latest video the COOPH photographers share some of their best hacks on how to create stunning images and videos with your smartphone and everyday tools, […]
Twitter rants and various online ugliness aside, social media has actually grown up a bit over the past 15 years. In general, users are warier of their interactions on platforms like Facebook or Instagram — and marketers have taken note. In fact, if you felt retailers you saw on social media were only looking to […]
Virus quarantines and shuttered restaurants sent millions of Americans back to their homes, only to rediscover the joys of firing up an oven and cooking something special for themselves. Whether by desire, necessity, or both, many of us have certainly been spending more time in the kitchen these last few months. And we haven’t just […]
Now that the world is starting to re-emerge from its self-imposed COVID-19 quarantine, we’re all going to have to start making some adjustments to both short-term and long-term changes. And the questions… Should customers be hounded out of a store if they aren’t wearing a face mask? Are crocheted face masks safe or not? And […]