Subscribe
About
  • Home
  • /
  • IOT
  • /
  • LG's SmartThinQ vulnerability exposes millions

LG's SmartThinQ vulnerability exposes millions

Staff Writer
By Staff Writer, ITWeb
Johannesburg, 30 Oct 2017

Israeli-based cyber firm Check Point Software Technologies has discovered HomeHack - a vulnerability that exposed millions of users of LG SmartThinQ smart home devices to the of unauthorised remote control of their SmartThinkQ home appliances.

The vulnerabilities in the LG SmartThinkQ mobile app and cloud application enabled the Check Point research team to remotely login to SmartThinQ cloud application, take over the user's legitimate LG account, and gain control of the vacuum cleaner and its integral video camera.

Once in control of a specific user's LG account, any LG device or appliance associated with that account could be controlled by the attacker - including the robot vacuum cleaner, refrigerators, ovens, dishwashers, washing machines and dryers, and air-conditioners.

The HomeHack vulnerability gave attackers the potential to spy on users' home activities via the Hom-Bot robot vacuum cleaner video camera, which sends live video to the associated LG SmartThinQ app as part of its HomeGuard Security feature. Depending on the LG appliances in the owner's home, Check Point says attackers could also switch dishwashers or washing machines on or off.

"As more and more smart devices are being used in the home, hackers will shift their focus from targeting individual devices, to hacking the apps that control networks of devices," says Oded Vanunu, head of products vulnerability research at Check Point.

"This provides cyber criminals with even more opportunities to exploit software flaws, cause disruption in users' homes and access their sensitive data. Users need to be aware of the security and privacy when using their IOT [Internet of things] devices and it's essential that IOT manufacturers focus on protecting smart devices against attacks by implementing robust security during the design of software and devices."

The vulnerabilities in the SmartThinQ mobile app enabled Check Point's researchers to create a fake LG account, and then use this to take over a user's legitimate LG account, and in turn gain remote control of the user's smart LG appliances.

Check Point disclosed the vulnerability to LG on 31 July, following responsible disclosure guidelines. LG responded by fixing the reported issues in the SmartThinQ application at the end of September.

"Thankfully, LG responsibly provided a quality fix to stop possible exploitation of the issues in its SmartThinQ app and devices," says Vanunu.

"As part of LG Electronics' mission to enhance the lives of consumers worldwide, we are expanding our next-generation smart home appliance line-up, while also prioritising the development of safe and reliable software programs," says Koonseok Lee, manager of the smart development team at LG Electronics.

"In August, LG Electronics teamed with Check Point Software Technologies to run an advanced rooting process designed to detect security issues and immediately began updating patch programs. Effective 29 September, the security system has been running the updated 1.9.20 version smoothly and issue-free. LG Electronics plans to continue strengthening its software security systems as well as work with cyber security solution providers like Check Point to provide safer and more convenient appliances."

To protect their devices, users of the LG SmartThinQ mobile app and appliances should ensure they are updated to the latest software versions from the LG Web site.

LG's SmartThinQ range of smart appliances and safety solutions enable users to monitor and maintain their homes from a smartphone. Sales of the Hom-Bot robotic vacuum cleaner alone exceeded 400 000 in the first half of 2016. In 2016, 80 million smart home devices were shipped worldwide, a 64% increase from 2015.

A video of how the attack could be done can be viewed here.

Share