Researchers from Dojo/Bullguard investigated the security model of the Ring smart doorbell — made by Amazon — and discovered that the video was sent “in the clear” (without encryption) meaning that people on the same network as the doorbell, or on the same network as one of its owners, can easily tap into its feeds.
Additionally, the researchers found that it would be easy to alter the feed coming from the doorbell (for example, you could insert a feed of an empty porch while you were breaking down the door).
The security risks arose because Ring’s designers chose not to encrypt their Realtime Protocol (RTP) packets. This means that an attacker who joins a network that is carrying the video feed (for example, the wifi at a conference center or coffee shop that Ring owner is using to monitor the feed from their home) can view or hijack the video streams.
The latest version of the Ring app (version 3.4.7) corrects this error, but the release notes do not mention this fact, so some users may not have upgraded.
This report is part of a growing pattern of serious security problems with Ring’s products, which is particularly troubling, given that they are intended as security measures themselves.
The main takeaway from this research is that security is only as strong as its weakest link. Encrypting the upstream RTP traffic will not make forgery any harder if the downstream traffic is not secure, and encrypting the downstream SIP transmission does not thwart stream interception. When dealing with such sensitive data like a doorbell, secure transmission is not a feature but a must, as the average user will not be aware of potential tampering.
One Ring to rule them all, and in darkness bind them [Dojo/Bullguard]
(Image: Cryteria, CC-BY)
Last October, Bloomberg published a blockbuster story claiming that some of the largest tech companies in the world, as well as sensitive US government and military systems, had been attacked through minute hardware implants that had been inserted at a subcontractor facility during the manufacture of servers from the world’s leading server company, Supermicro.
Many companies use private APIs to manage their A/B tests of experimental products and approaches; by grabbing the calls that mobile apps make to these APIs, Jon Luca was able to figure out all kinds of sensitive information about companies’ future plans, from the way Lyft steers customers towards credit cards that are cheaper to […]
SEDC is an Atlanta-based company that provides back-ends for utility companies; a security researcher discovered that the company stored his password in the clear. The company’s products have more than 15,000,000 users, whose logins and passwords are potentially also stored in plaintext. When the researcher alerted the company about this, the company ignored them, then […]
If you love to travel, you love reminiscing about the places you’ve been. Aside from the photos, you might turn maps into keepsakes, putting pins or stickers onto each country you’ve visited. World Travel Tracker Scratch Off Maps® take that pastime and ramp up the fun, making it easy to keep tabs on your adventures […]
If you gave up on playing the piano as a kid, don’t despair. Things have come a long way since those drills that had you playing “Chopsticks” endlessly. Take Pianoforall, for instance. This innovative new system lets students play keys right away, learning the structure of the music by playing rhythm-style hits. The 10-hour course […]
As big companies wrangle an ever-increasing amount of data, the applications for deep learning grow – and so do the job opportunities. If you’ve got a working knowledge of Python, all you need are the tools to start making data work for you. Get up to speed on the science and code behind the field […]