Headline
Flaws in Enabot Ebo Air Home Security Robot Allowed Attackers to Spy on Users
By Deeba Ahmed If exploited, the flaw could have allowed an attacker to hijack the device’s camera and microphone to spy… This is a post from HackRead.com Read the original post: Flaws in Enabot Ebo Air Home Security Robot Allowed Attackers to Spy on Users
****If exploited, the flaw could have allowed an attacker to hijack the device’s camera and microphone to spy on the homeowners.****
Security lab Modux researchers identified a flaw in Enabot’s Ebo Air smart robot, a device designed to entertain your entire family and pets. As per Modux researchers’ findings, attackers could easily hack the smart robot by exploiting the flaw and spying on the occupants/users.
The attacker can record videos, compromise the camera, and communicate with the users via the device’s built-in microphone. All this can happen while the device owners remain unaware of hacking, and the attacker can discreetly monitor the indoor activities.
Image captured by researchers (Image: Modux Labs
What is the Flaw?
While testing the Ebo Air smart robot, Modux discovered it was pre-configured with a default admin password. Therefore, an attacker could use the password to connect to the device through the Secure Shell/SSH network communication protocol, which computers use to enable communication.
Once this is done, the attacker can access and exploit almost all functions of the device, from accessing/capturing audio video to conducting surveillance. It is worth noting that the hack could be successful only if the attacker hacks your home Wi-Fi network, which isn’t too difficult considering the poor security mechanisms in routers.
Risks Associated with the Flaw
When attackers gain remote control over the device, they can fully control it remotely (from anywhere) anytime. Furthermore, any Ebo Air robot could be exploited with the flaw, whether on sale or in use by homeowners, because the default password was the same.
Another issue is that the device didn’t get wiped entirely after a factory reset, so the users’ passwords would still be accessible even if the device is sold. In that case, the new owner could easily access your home Wi-Fi network and identify your location.
Current Status of the Flaw
According to Modux Labs’ blog post, they promptly informed Enabot about the flaw, and the company responded positively. The company fixed the flaw and mitigated the threat by terminating the SSH service and eliminating the chance of an attacker controlling the device.
Moreover, Enabot fixed the incomplete factory data reset issue. However, Ebo Air users can still be at risk unless they update the app and device to install the latest security fixes.
Lesson Learned
In conclusion, it is evident that IoT devices are at major risk due to their default credentials. One must be sure to change these credentials after setting up the device. Additionally, it is important to keep an eye on the latest security patches issued by the manufacturer. By doing so, we can help mitigate the risk of our IoT devices being compromised.
More IoT Security News
- ThroughTek Flaw Exposed Millions of IoT Cameras to Spying
- New malware found targeting IoT devices, Android TV globally
- Millions of IoT devices, baby monitors open to audio, video snooping
- High severity Intel chip flaw left cars, medical and IoT devices vulnerable
- Feds Dismantle Russian Rsocks Botnet Powered by Millions of IoT Devices