Incident: Smart Security Cameras and Baby Monitors Vulnerable to Hacking

Published Date: 2020-03-02

Postmortem Analysis
Timeline 1. The software failure incident of baby monitors and smart security cameras being hacked by cyber criminals, as reported in Article 97186, happened in December 2019.
System 1. Baby monitors and smart security cameras [97186]
Responsible Organization 1. Cyber criminals [97186]
Impacted Organization 1. Families using baby monitors and smart security cameras in their homes were impacted by the software failure incident [97186].
Software Causes 1. Weak passwords allowing online attackers to control wireless cameras and spy on families [97186]
Non-software Causes 1. Weak passwords used by consumers, making the devices vulnerable to cyber attacks [97186] 2. Lack of proper security measures in smart cameras and baby monitors, allowing hackers to exploit the devices [97186]
Impacts 1. The software failure incident led to the risk of cyber criminals hacking into baby monitors and smart security cameras used in homes, potentially allowing them to spy on families and control the devices [97186]. 2. The incident caused concerns about privacy as attackers could take control of the cameras and potentially view minors in the home [97186]. 3. The failure resulted in the need for consumers to take steps to secure their devices, such as using stronger passwords, updating security software, and disabling remote access features when not in use [97186]. 4. The incident prompted the National Cyber Security Centre to issue warnings and guidance to consumers on securing smart devices to prevent future vulnerabilities and attacks [97186].
Preventions 1. Using stronger passwords and changing default passwords to secure ones could have prevented the software failure incident [97186]. 2. Regularly updating security software could have helped prevent the vulnerability exploited by cyber attackers [97186]. 3. Disabling remote access features when not in use could have mitigated the risk of unauthorized access to the cameras and baby monitors [97186].
Fixes 1. Use stronger passwords to prevent hacking attempts [97186]. 2. Regularly update security software to patch any vulnerabilities [97186]. 3. Disable remote access features when not in use to minimize the risk of unauthorized access [97186].
References 1. National Cyber Security Centre (NCSC) [97186] 2. Consumer group Which? [97186]

Software Taxonomy of Faults

Category Option Rationale
Recurring multiple_organization (a) The software failure incident related to security vulnerabilities in smart cameras and baby monitors being hacked has not specifically been mentioned to have happened again within the same organization or with its products and services. The focus of the article is on the general warning and advice given by security chiefs regarding the vulnerabilities of these devices to cyber attacks. (b) The article does mention that the National Cyber Security Centre (NCSC) has issued a warning about the security flaws in devices like wireless cameras and toys, indicating that similar incidents may have occurred with products from multiple organizations. The NCSC's technical director highlighted the vulnerability of smart technology to cyber attackers, suggesting that this issue is not limited to a single organization but is a broader concern across various manufacturers and products [97186].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article where it mentions serious security flaws in devices like wireless cameras and toys due to weak passwords, making them vulnerable to cyber attackers [97186]. This vulnerability introduced during the system development or design phase can lead to hackers gaining control of the devices and potentially spying on families in their homes. (b) The software failure incident related to the operation phase is highlighted in the article through the example of a hacker talking to a child through a smart camera's intercom feature in Mississippi, U.S. This incident occurred due to the misuse or operation of the system, where cyber criminals exploited the remote access feature of the cameras to intrude into homes and invade privacy [97186].
Boundary (Internal/External) within_system (a) within_system: The software failure incident reported in the article is primarily within the system. The vulnerability and risk of being hacked by cyber criminals are attributed to weak passwords and security flaws within the smart security cameras and baby monitors themselves. The National Cyber Security Centre warns about the potential for attackers to control these devices and spy on families due to these internal vulnerabilities [97186].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: The article reports on the risk of baby monitors and smart security cameras being hacked by cyber criminals due to weak passwords, making them vulnerable to attack. The National Cyber Security Centre warns that these devices can be controlled by online attackers, allowing them to spy on families in their homes. The incident involving an eight-year-old girl being startled by a hacker's voice through a smart camera's intercom feature exemplifies how non-human actions, such as hacking, can lead to software failure incidents [97186]. (b) The software failure incident occurring due to human actions: The article mentions that advice to consumers to keep their devices safe includes using stronger passwords, indicating that human actions, such as setting weak passwords, can contribute to software failure incidents. Additionally, the National Cyber Security Centre emphasizes the importance of changing default passwords to secure ones and regularly updating security software as steps that individuals can take to prevent such incidents, highlighting the role of human actions in mitigating software vulnerabilities [97186].
Dimension (Hardware/Software) hardware, software (a) The software failure incident related to hardware: - The article mentions that baby monitors and smart security cameras used in homes are at risk of being hacked by cyber criminals due to weak passwords, allowing online attackers to control wireless cameras and spy on families in their homes [97186]. - Smart CCTV cameras in homes use wi-fi to connect to the internet so they can be operated remotely, making them vulnerable to cyber criminals who could hack into the cameras and look around the home [97186]. (b) The software failure incident related to software: - The article highlights that the software failure incident is primarily due to weak passwords and security flaws in devices like wireless cameras and baby monitors, making them vulnerable to cyber attackers [97186]. - The National Cyber Security Centre advises consumers to take steps such as changing default passwords to secure ones, updating security software regularly, and disabling remote access features to prevent software failures caused by cyber attacks [97186].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident reported in the article is malicious in nature. It involves the risk of baby monitors and smart security cameras being hacked by cyber criminals with the intent to spy on families in their homes [97186]. The article highlights how weak passwords can allow online attackers to control wireless cameras and potentially invade the privacy of individuals, including minors. The incident where a hacker's voice was heard through a smart camera's intercom feature in a child's bedroom exemplifies the malicious intent behind such attacks. The National Cyber Security Centre issued a warning about the vulnerabilities of these devices and advised consumers to take steps to secure their devices against potential cyber attacks.
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident related to poor_decisions is evident in the article. The National Cyber Security Centre warned that smart security cameras and baby monitors linked to the internet are vulnerable to cyber attacks due to weak passwords, which can allow online attackers to control the devices and spy on families in their homes. The warning highlighted the risk associated with bringing such devices into homes without adequate security measures, emphasizing the importance of using stronger passwords and implementing good housekeeping practices to mitigate these vulnerabilities [97186].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The articles do not specifically mention a software failure incident occurring due to development incompetence. However, the warning issued by the National Cyber Security Centre highlights the vulnerability of smart security cameras and baby monitors to cyber attacks due to weak passwords and lack of proper security measures. This vulnerability could potentially be attributed to development incompetence if the devices were not adequately designed and tested for security flaws [97186]. (b) The software failure incident of smart security cameras and baby monitors being hacked by cyber criminals can be considered as a failure due to contributing factors introduced accidentally. The articles mention that these devices are vulnerable to attack due to weak passwords, lack of proper security measures, and the ability for cyber criminals to exploit these vulnerabilities. This incident was not intentional but rather a consequence of the devices being susceptible to hacking [97186].
Duration unknown The articles do not mention any specific software failure incident duration as permanent or temporary.
Behaviour omission, other (a) crash: The articles do not specifically mention a software failure incident related to a crash where the system loses state and does not perform any of its intended functions. (b) omission: The articles mention a software failure incident related to omission where the system omits to perform its intended functions at an instance(s). For example, the incident where a hacker was able to talk to an eight-year-old girl through a smart camera's intercom feature, indicating a failure in the system's intended function to provide security and privacy [97186]. (c) timing: The articles do not mention a software failure incident related to timing, where the system performs its intended functions correctly but too late or too early. (d) value: The articles do not mention a software failure incident related to a failure in the system performing its intended functions incorrectly. (e) byzantine: The articles do not mention a software failure incident related to a byzantine failure where the system behaves erroneously with inconsistent responses and interactions. (f) other: The other behavior mentioned in the articles is related to the vulnerability of smart devices like cameras and baby monitors to cyber attacks due to weak passwords, leading to potential unauthorized access and privacy breaches [97186].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence no_consequence (a) death: People lost their lives due to the software failure - There is no mention of any deaths resulting from the software failure incident reported in the articles [97186].
Domain information (a) The software failure incident reported in the articles is related to the industry of information, specifically concerning the production and distribution of information. The incident involves the vulnerability of smart security cameras and baby monitors linked to the internet, which can be hacked by cyber criminals, potentially allowing them to spy on families in their homes [97186]. The National Cyber Security Centre issued warnings about the security flaws in these devices, emphasizing the importance of using stronger passwords and updating security software to prevent unauthorized access [97186]. (b) The incident does not directly relate to the transportation industry. (c) The incident does not directly relate to the natural resources industry. (d) The incident does not directly relate to the sales industry. (e) The incident does not directly relate to the construction industry. (f) The incident does not directly relate to the manufacturing industry. (g) The incident does not directly relate to the utilities industry. (h) The incident does not directly relate to the finance industry. (i) The incident does not directly relate to the knowledge industry. (j) The incident does not directly relate to the health industry. (k) The incident does not directly relate to the entertainment industry. (l) The incident does not directly relate to the government industry. (m) The software failure incident is not related to an industry outside of the options provided.

Sources

Back to List