Notebookcheck

Several Ring home cameras breached, recycled passwords likely to blame

Image via Ring
Image via Ring
Multiple families have reported their Ring cameras have been accessed by unknown third parties. The bad actors were able to access the video feeds and speakers of the cameras to frighten members of the affected households, including children. Ring has stated that the malicious parties probably accessed the cameras by using the victims' usernames and passwords, which were likely leaked in an unrelated data breach and recycled for the Ring cameras.
Sam Medley, 🇷🇺

Multiple reports have surfaced this month from Ring home camera users stating that unknown parties have been able to access the devices. Four families in Mississippi, Connecticut, Florida, and Georgia have all said that hackers turned on their Ring cameras or used the built-in speakers to make contact with members of their households. 

Many families use Ring’s internet-connected cameras to monitor rooms in their houses, particularly children’s rooms, for an added sense of security. However, it seems that malicious parties or pranksters were able to access those same cameras to spy on and terrorize members of the households, including children. 

Ring investigated the claims but found “no evidence of an unauthorized intrusion or compromise of Ring’s systems or network.” Rather, the company blames an external leak of user data that breached non-Ring services. Those breaches likely leaked usernames and passwords that had also been used for the families’ Ring cameras. 

Herein lies one of the key weaknesses of the Internet of Things (IoT) and connected devices. If users recycle usernames and passwords, it’s more likely that their credentials can fall into the hands of bad actors through the myriad of data breaches that occur each year. That gives malicious parties easy access to connected devices that rely on the same authentication. IoT devices are typically much more personal than most online accounts as they operate within the users’ homes and often interact directly with people and members of the household.

If you have an IoT device like a Ring camera, smart speaker, or other smarthome device, it’s paramount that you use separate usernames and passwords for each. This will help to prevent unknown parties from gaining easy access to the device. Keep in mind that no system is 100% secure, so full caution should be taken before setting up an IoT device in your home.

static version load dynamic
Loading Comments
Comment on this article
Please share our article, every link counts!
> Notebook / Laptop Reviews and News > News > News Archive > Newsarchive 2019 12 > Several Ring home cameras breached, recycled passwords likely to blame
Sam Medley, 2019-12-16 (Update: 2019-12-16)
Sam Medley
Sam Medley - Review Editor - @samuel_medley
I've been a "tech-head" my entire life. After graduating college with a degree in Mathematics, I worked in finance and banking a few years before taking a job as a Systems Analyst for my local school district. I started working with Notebookcheck in October of 2016 and have enjoyed writing news articles and notebook reviews. My areas of interest include the business side of technology, retro gaming, Linux, and innovative gadgets. When I'm not hunched over an electronic device or writing code for a new database, I'm either outside with my family, playing a decade-old video game, or sitting behind a drum set.