Connect with us

Hi, what are you looking for?

HEADLINES

Smart toy vulnerabilities could let cybercriminals video-chat with kids

The risks associated with the robot system’s application extend to dangers that sensitive details such as users’ names, genders, ages and even their locations may be compromised.

Vulnerabilities in a popular smart toy robot could make children potential targets for cybercriminals, Kaspersky researchers have discovered. The weaknesses could enable hackers to take control of the toy’s system and misuse it to secretly communicate with kids through video chat without parental consent. The risks associated with the robot system’s application extend to dangers that sensitive details such as users’ names, genders, ages and even their locations may be compromised.

An Android-based robot designed for kids is equipped with a built-in video camera and microphone. It harnesses artificial intelligence to recognize and interact with children by name and to adjust its responses based on the child’s mood, gradually getting acquainted with them over time. To unlock the full potential of the toy, parents are required to download the application to their mobile device. Through this app, parents can track the child’s progress with their learning activities and even initiate a video call with the child via the robot.

During initial setup, parents are instructed to connect the toy to a Wi-Fi network, link it to their mobile device, then provide the child’s name and age. During this phase, Kaspersky experts have uncovered a concerning security issue: the responsible API (Application Programming Interface) for requesting this information lacks authentication enforcement, a step that confirms who can access your network resources. This potentially allows cybercriminals to intercept and access various types of data – including the child’s name, age, gender, country of residence, and even their IP address – by intercepting and analyzing the network traffic. 

What’s more, this flaw enables cybercriminals to exploit the robot’s camera and microphone, initiating direct calls to e users, bypassing the required authorization from the guardians’ account. If a child accepts this call, an attacker can communicate covertly, without parents’ consent. In such cases, the attacker could manipulate the user, potentially luring them out of the safety of their home or influencing them into engaging in risky behaviors.

Advertisement. Scroll to continue reading.

Furthermore, security issues of the parent’s mobile application may enable an attacker to remotely take control over the robot and gain unauthorized access to the network. Using brute-force methods to recover the six-digit one time-password (OTP), and with no enforced limit on failed attempts, an attacker could remotely link the robot to his own account, effectively taking the device out of its owner’s control. 

“When purchasing smart toys, it becomes imperative to prioritize not only their entertainment and educational value but also their safety and security features. Despite the common belief that a higher price tag implies enhanced security, it is essential to understand that even the most expensive smart toys may not be immune to vulnerabilities that attackers can exploit. Hence, parents must carefully examine toy reviews, remain vigilant about updating smart device software, and closely supervise their child’s activities during playtime,” comments Nikolay Frolov, senior security researcher at Kaspersky’s ICS CERT.

The findings from the team’s thorough research were presented during the panel session titled “Empowering the Vulnerable in the Digital Environment” at Mobile World Congress (MWC) 2024.

The Kaspersky team reported all the vulnerabilities they discovered to the vendor, who promptly patched them. Learn more on Securelist.com.

To keep all smart devices, secure and protected, Kaspersky experts compiled the following tips:

Advertisement. Scroll to continue reading.
  • Keep your devices updated: Regularly update the firmware and software of all your connected devices, including smart toys. These updates often contain crucial security patches that address known vulnerabilities.
  • Research before purchase: Before buying a smart toy or any connected device, research the manufacturer’s reputation for security and privacy. Choose devices from reputable brands that prioritize security and provide regular updates.
  • Be cautious with app permissions: Review and limit the permissions granted to mobile apps associated with your smart device. Only provide necessary access to features and data, and avoid granting excessive privileges.
  • Power it off when not used: Switch off the smart toy when not in use to prevent data collection. If the device has a microphone, store it in a hard-to-reach place when not active, and cover or redirect any cameras when not in use.
  • Use reliable security solutions: Employ a dependable security solution to help secure and protect your entire smart home ecosystem. 

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

When compared to 2023, Sophos saw a 51% increase in abusing “Living off the Land” binaries or LOLbins; since 2021, it’s increased by 83%.

HEADLINES

Someone illegally acquires or uses personal information such as bank account or credit card numbers of another person to obtain money, goods or services....

HEADLINES

To stay ahead of these challenges, organizations need to invest in AI-driven defenses, transition to quantum-safe encryption, and adopt a Zero Trust approach to...

HEADLINES

There was a 121% Year-on-Year (YoY) increase in identity fraud in 2024 across the region, with significant surges recorded in Singapore (207%), Thailand (206%)...

HEADLINES

As part of RCBC’s 2024 Cybersecurity literacy program, the webinar aims to help Filipinos level up their online banking safety by providing them with...

White Papers

The survey found that CXO’s feel less prepared than their global peers. Less than half or 48% in APAC said they felt completely prepared...

HEADLINES

On average, a single organization in the Philippines experiences 4,003 attacks per week, significantly higher than the APAC average of 2,870 attacks per week.

White Papers

Exploiting this vulnerability, cybercriminals craft deceptively authentic phishing emails that align with current trends, exploiting human emotions to invoke urgency and trick recipients into...

Advertisement