Home > Cyber News > Hack a Vulnerable Wi-Fi Vibrator Equipped with Camera: Done
CYBER NEWS

Hack a Vulnerable Wi-Fi Vibrator Equipped with Camera: Done

Nowadays, all your devices can be hacked, your IoT sex toys included. Security researchers from Pen Test Partners have made the troublesome discovery that an Internet-connected vibrator equipped with a camera can be hacked without a hitch. As a result, the video streamed live can be compromised without the knowledge of the user.

The vulnerable pleasure device is Svakom Siime Eye, a vibrator endoscope. Yes, you read it correctly. The device costs about $250.

Related: Teledildonics 101: We-Vibe 4 Plus Adult Toy Hacked for Your Privacy

What’s the trouble with Svakom Siime Eye?

Apparently, a person who is in the Wi-Fi range of the toy can easily guess the password. If the default password is unchanged, hacking becomes even less challenging as the intruder can watch the video undisrupted. If the hacker is more knowledgeable, they can take full control of the firmware and establish a remote connection. In addition, the attacker can live stream the video without the victim finding out. This hack effortlessly takes the vulnerability of our private lives to a completely next level!

In this case, overexposure of system services means we could write a rogue application, compel a user to connect our app to the device using the default credentials, and then use the already-inbuilt functionality to perform unsolicited actions on the device,” the researchers explain.

If the attackers could get the potential victim to connect their device to their home Wi-Fi, they could siphon all video data, Wi-Fi passwords, and a list of local networks off it and send it to an unknown remote location. Even if this step is skipped, the attackers that are in the range of the vulnerable dildo could crack into the Wi-Fi AP via a weak or default password. This could result in a root shell and a video stream.

If you’re a user, change the Wi-Fi password to something complex and long, the researchers advise. Further technical details of the hack are available.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree