Technology

Amazon's security network camera was hacked and the landlord spit out


Security

Amazon's security network camera was hacked and the landlord spit out

by Rishabh Varshney

By connecting to the Internet, a network camera can check the images that the camera displays anywhere and anytime over the network, as well as the images taken in the past. Among such network cameras, one that is particularly popular isAcquired by AmazonSmart home equipment manufacturerRing". Such Ring's network camera is often installed at home as a home security system, but someone hacked this camera and caused an alarm or repeated racist remarks .

Stranger spews racial slurs over family's hacked ring camera-NBC2 News
https://www.nbc-2.com/story/41428183/stranger-spews-racial-slurs-over-familys-hacked-ring-camera

Ring Camera Hacker Uses Home Security System to Spew Racial Slurs at Florida Family
https://www.newsweek.com/florida-cape-coral-amazon-ring-home-security-system-hacked-racial-slurs-1476430

An incident happened at Cape Coral in Florida, USA where an Amazon Ring camera was hacked. The person who hacked the camera first sounded an alarm with a loud sound and then repeated racist remarks toward the landlord.

A video of a ring camera hacked by a hackerNBC2 NewsYou can check from the following movie how the hacker sounds an alarm and rants to the landlord. In addition, hackers vomit rants such as "Is your child a monkey or a baboon?"

Victim Josephine Brown said, “I was scared anyway … I was scared. I did n’t know who it was, how much the hacker was watching us, and it ’s still scary because there ’s no answer. “It's clear that hackers have been peeking at our private lives, otherwise we can't know that I have a son,” he says.

Brown told NBC2 News, "Ring's security team has confirmed that one email address and password of an external account has been exposed to data breaches." I was told ”

However, NBC2 News reports do not provide details such as whether the Ring camera was hacked via a home Wi-Fi network or whether the Ring camera itself was hacked directly in some way.

Mr. Brown said he was asked to reset his account information, and Ring is not clear except that he seems to think that “ the data infringing email address and password were used in some way for hacking '' Hmm.

Ring to strengthen account authentication2-step verificationIs supported. When 2-step verification is enabled, users must enter a passcode sent to their phone number in addition to their email address and password when logging into their account. Therefore, even if your e-mail address and password are leaked, if you use 2-step authentication, you can safely protect your account without worrying about being logged in to your account.

Matt Warmsley, director of cyber security company Vectra, said, “Hackers can use Ring Camera's two-way chat function remotely from an infringed account, and all Ring terminals linked to the account. You can access the username / password combination that the hacker leakedDark webIt ’s relatively easy to try to log in to multiple online services in the hope that other services will use the same combination of account information. ”

by Bernard Hermant

Possibility of stolen Wi-Fi password via Ring terminalIn addition, there are cases where Google Nest, the same smart home product, has been hacked, and network cameras and smart home products to enhance home security often cause a crisis Waking up

In addition,NewsweekAsked for comments from Ring, “Customer trust is important to us and we are working hard on device security. We are currently investigating this issue and will protect the device based on the investigation. “We ’re taking appropriate steps to do this, but the events we ’ve identified at this point have nothing to do with Ring ’s security breach.”

In addition, “Many of our customers use multiple accounts where they often use the same username and password. So, malicious hackers stole from certain services or Often, leaked credentials are reused in another service, and Ring recommends two-step verification, adding shared users, using strong passwords, and changing passwords regularly. We encourage you not to talk or use passwords.

Copy the title and URL of this article

Source link

Show More

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
Close
Close