Photo Credit: Pixabay / geralt

If you’re using a baby monitor, webcam, “smart” doorbell or any other common “smart” device, the following information is important news.

Israeli cyber researchers at Ben-Gurion University of the Negev (BGU) are warning that many off-the-shelf smart devices like baby monitors, home security and web cameras, doorbells, and thermostats have been found to be easy to hack.


As part of their ongoing research into detecting vulnerabilities of devices and networks expanding in the smart home and Internet of Things (IoT), the researchers disassembled and reverse engineered many common devices, and quickly uncovered serious security issues.

“It is truly frightening how easily a criminal, voyeur or pedophile can take over these devices,” says Dr. Yossi Oren, a senior lecturer in BGU’s Department of Software and Information Systems Engineering.

Oren, who also heads the Implementation Security and Side-Channel Attacks Lab at Cyber@BGU, said, “Using these devices in our lab, we were able to play loud music through a baby monitor, turn off a thermostat and turn on a camera remotely, much to the concern of our researchers who themselves use these products.”

PhD student and lab member Omer Shwartz added, “It only took 30 minutes to find passwords for most of the devices and some of them were found merely through a Google search of the brand. Once hackers can access an IoT device, like a camera, they can create an entire network of these camera models controlled remotely.”

The BGU researchers uncovered several different ways hackers can take advantage of poorly secured devices. They discovered that similar products under different brands share the same common default passwords.

Consumers and businesses rarely change device passwords after purchasing so the devices could be operating while infected with malicious code — for years.

They were also able to log on to entire Wi-Fi networks simply by retrieving the password stored in a device to gain network access.

Oren urges manufacturers to stop using easy, hard-coded passwords, to disable remote access capabilities, and to make it harder to get information from shared ports, like an audio jack which was proven vulnerable in other studies by Cyber@BGU researchers.

“It seems getting IoT products to market at an attractive price is often more important than securing them properly,” he said.

Tips for IoT Product Security
With the goal of making consumers smarter about smart home device protection, BGU researchers offered a number of tips to keep IoT devices, families and businesses more secure:

  • Buy IoT devices only from reputable manufacturers and vendors.
  • Avoid used IoT devices. They could already have malware installed.
  • Research each device online to determine if it has a default password and if so change it before installing.
  • Use strong passwords with a minimum of 16 letters. These are hard to crack.
  • Multiple devices shouldn’t share the same passwords.
  • Update software regularly which you will only get from reputable manufacturers.
  • Carefully consider the risks and benefits of connecting a device to the internet.

“The increase in IoT technology popularity holds many benefits, but this surge of new, innovative and cheap devices reveals complex security and privacy challenges,” says Yael Mathov, a Masters student who also participated in the research. “We hope our findings will hold manufacturers more accountable and help alert both manufacturers and consumers to the dangers inherent in the widespread use of unsecured IoT devices.”

The BGU research collaboration also includes Michael Bohadana, a researcher at Deutsche Telekom Innovation Labs@BGU and Prof. Yuval Elovici, director of Cyber@BGU, director of Deutsche Telekom Innovation Labs@BGU and a member of the BGU Department of Software and Information Systems Engineering.