選單
中文 (繁體)

Convenient but treacherous: Why baby monitors are so dangerous

Baby monitors can look quite innocent: they resemble teddy bears, toy puppies, plush giraffes, and flowers on long, easily bendable stems. They should not scare the baby while doing an essentially scary thing: stare at the child non-stop and track his or her every movement and sound, be it a cry or a snore. They relay video to the parents in real time and can alert them if something is amiss, such as if the baby’s nose and mouth are covered or if the baby ventures out of the crib — the designated “smart zone”.

The nannies of tomorrow

Monitors can’t replace a babysitter, but they can help parents keep an eye on their little ones wherever they are: in the next room or, in the case of Wi-Fi-enabled monitors, in another city. Some cameras can pan 360 degrees on their own and zoom in on the baby. If a baby’s having a tantrum, the monitor will sooth it with a lullaby that can be turned on remotely in the mobile app. And if this doesn’t help, parents can talk to the baby and hear it cooing and giggling (or crying) thanks to the two-way communication feature.

But baby monitors’ innocent appearance can be deceptive. Like any other modern tech, they are vulnerable to breaches. And once they fall prey to hackers, they can bring the entire smart home system down with them. A compromised baby monitor can serve as a gateway to the local home network and to any other device connected to that network: a smart voice assistant, smart speakers, smart plugs, smart bulbs, a smart vacuum cleaner — you name it.

Baby monitors are easily hackable devices on par with other modern tech
Photo: Manik Roy/Unsplash

What’s more: while criminals who may be looking for a backdoor to a smart home are bad enough already, there are also sexual predators lurking around, who may leave the baby’s psyche scarred.

Lackluster security and extreme vulnerability to attacks are what baby monitors with internet connection became notorious for. But that did not curb their popularity. The global baby monitor market is valued at more than $1 billion, and it continues to grow. While there are also digital and analog monitors, they lack one major perk which busy parents seek in baby smart tech: an unlimited range. Even the best digital monitors cover up to 1,000 — 1,200 feet (300 meters) max.

So, unless new parents are ready to lose remote access to the monitor, they have to accept the risks that go with it and try to minimize them. But in order to do the latter, one needs to know just exactly how bad actors hijack baby monitors.

It takes several clicks to hack a baby monitor

In this article, we will focus on Internet-connected baby monitors: they are rich in features and therefore often become the default choice of new parents. It helps that they are quite easy to set up: the only thing you should do is to pair your smartphone to the monitor.

Once the baby monitor is connected to the internet, it becomes a low-hanging fruit for hackers. Most attacks are not targeted, but rather begin with an internet scan to discover devices with vulnerabilities that can be exploited. To pin them down, bad actors use publicly available search engines, such as Shodan and Censys. These engines scan Internet of Things (IoT) or smart interconnected devices for vulnerabilities. Shodan, for instance, indexes all publicly exposed IoT devices, including baby monitors, webcams, and routers at least once a week.

Using one of these mapping tools, security researchers and hackers alike can look up a specific device type with an unfixed vulnerability or with firmware that lacks updates. Hackers may also look for a specific port, the latter being a network protocol that receives or transmits communication for a specific service. From that, they can narrow down a search by a country, an internet service provider and an IP range.

Once a hacker zeroes in on one specific device, they will try to access it with default credentials, which many parents leave in place after setting up the device, thus leaving a door to their smart homes virtually open. The credentials can be retrieved through a simple google search, be stated in the product manual, be the easily guessable pair of “admin” and “admin,” or some other equally ingenious word combination.

Once they’ve hijacked the camera, hackers can simply spectate, but also move the camera, change where the images and videos are saved to and do all other nasty things.

Home router, smart fridge — anything can be an entry point

It often does not start with the baby monitor, but with an unsecured router or any other unsecured internet-connected device on your home network.

A bad actor can break into your smart home through an unsecured router or other internet-connected device
Photo: Sigmund/ Unsplash

Take the router as an example. Your router stores the settings for your home network to which the smart devices are connected. If you want to change the settings, you need to log in your router’s firmware (its software) through a browser. To gain access to the router, an intruder needs to know its IP address, as well as your remote access password and login credentials. Routers are among internet-connected devices routinely scanned and monitored by Shodan and similar tools on the lookout for vulnerabilities. For most of the routers, the default username and password are ‘admin.’ And if it’s not, you can easily find default router credentials by googling a router’s name and model... Using one of the search engines we mentioned above, hackers can hack your router and hijack your home network, gaining access to all the devices connected to it.

It might not be a hacked router, but a hacked smart fridge or even your own PC that will serve as an entry point for attackers. From there, they can break into and interfere with your other devices, including baby monitors.

Bug-infested firmware

The most sensible thing to do is to change default credentials of both the router and the baby monitor as soon as you set them up. While this will no doubt protect you from less sophisticated attacks, it does not necessarily mean you’re out of the woods yet.

An issue that lies outside a user’s direct control is that a baby monitor’s software can be infested with bugs and the manufacturer may not release timely updates, paving the way for attackers to exploit vulnerabilities.

A vulnerability in a popular Wi-Fi-enabled video baby monitor discovered by the researchers from Bitdefender and PCMag allowed malefactors to access live footage, take screenshots, play music and learn the device ID. The vulnerability stemmed from misconfigured cloud storage permits, due to which everyone with access to one baby monitor could gain access to all the videos and photos stored by all other baby monitors of the same make and type. The issue was not fixed until after the researchers went public with their findings, nine months later after the vulnerability was first discovered.

In the case of another popular baby monitor with 50,000-100,000 installs on the Google Play, it took the vendor a year and a half to patch the vulnerability that could allow attackers to access audio-video feed and execute a malicious code on the device.

As we mentioned earlier, guessing the baby monitor password is not rocket science. But a bug that once crept into the software of a webcam used in baby monitors spared hackers even that trouble: a security hole allowed attackers to access the web interface of the camera simply by pressing the "OK" button when prompted for username and password.

Vulnerabilities like these are what attackers look for when they set out to break into a device. And while it sometimes takes months for manufacturers to come up with a fix, hackers are scanning for vulnerabilities non-stop. According to latest research, hackers start scanning for vulnerabilities within 15 minutes after a vendor publishes a disclosure report known as Common Vulnerabilities and Exposures (CVE) document. You can browse sites like CVE Details to check your devices for any publicly known vulnerabilities.

What can happen if your baby monitor is hacked?

Given that baby monitors are such easy prey, anyone from a bored teenager to a child predator to a potential burglar, could be behind an attack. Accounts of hacked monitors are numerous, so are the motives behind them.

In one case, a hacker reportedly spouted sexual expletives to a baby via the camera and threatened to kidnap the child. In another case, a man who hacked into a baby monitor told the 3-year-old girl that he “loved” her.

Hackers may hijack your baby monitor as a prank or to gather information in preparation for a burglary
Photo: Azamat E/Unsplash

Creeps that hack into baby monitors are known to have made attempts to “befriend” children. A mother claimed that a stranger tried to “shush” her 2-year-old back to sleep through the monitor. Some attackers chose to focus on the parents instead. A woman claimed that she woke up only to find her wireless puppy-faced baby monitor staring at her. She also saw the monitor moving by itself towards the place where she usually breastfed.

And while Wi-Fi monitors are more likely to fall victim to such attacks, digital and analogue monitors are not immune either. However, hacking a digital monitor is quite a chore: an attacker will have to find and follow the device’s signal, be physically close to the monitor and have a special listening tool.

Malefactors may not interfere with your daily life, and instead just silently watch you for reconnaissance purposes, as a preparation for a burglary. They may save videos to blackmail you in the future. Or they may use a baby monitor to break into other smart devices on the same network. The possibilities are endless, and are solely dependent on how wicked and skilled the hacker is.

Tips: how to secure a baby monitor

A baby monitor is a great way to keep tabs on a child. On the other hand, baby monitors, especially those connected to the internet, pose a danger not only to the little one, but also to the entire household. And if you don’t want to invite strangers to the nursery, you need to make sure that your device is as secure as it can be.

There are levels to security, and Wi-Fi monitors are, as a rule, more susceptible to breaches than those without Wi-Fi. So, if you need a monitor that would work only within your home, opt for a non-Wi-Fi monitor. It would relay data through non-static channels that are way harder to hack. However, if you want to view your bub from afar, then these are the rules to follow:

  • Change your baby monitor’s default login and password provided by the manufacturer. Make sure you create a strong password that is not reused across your other devices. Change your password from time to time and do not forget to remove inactive invited users.
  • Opt for a baby monitor model from a trusted manufacturer that comes with embedded security features, such as two-factor authentication, strong encryption, a button to turn Wi-Fi connectivity on or off and permission-based family access.
  • Keep your baby monitor’s software updated. If possible, register your device with the manufacturer — this way you’ll get notices on security vulnerabilities and recall as soon as they are out.
  • Update your router’s firmware and change your router’s username and password from factory values.
  • Use a firewall that would serve as a buffer between your local home network and the world wide web. It filters harmful traffic and stops intrusion attempts from the outside.
  • Break down your Wi-Fi network — create a separate Wi-Fi and password for your kid’s baby monitor and other smart home devices.
喜歡這篇文章嗎?
19,180 19180 使用者評論
極好的!

AdGuard for Windows

Windows 版 AdGuard 不只是廣告封鎖程式,它是集成所有讓您享受最佳網路體驗的主要功能的多用途工具。其可封鎖廣告和危險網站,加速網頁載入速度,並且保護兒童的線上安全。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard for Mac

Mac 版 AdGuard 是一款獨一無二的專為 MacOS 設計的廣告封鎖程式。除了保護使用者免受瀏覽器和應用程式裡惱人廣告的侵擾外,應用程式還能保護使用者免受追蹤、網路釣魚和詐騙。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard for Android

Android 版的 AdGuard 是一個用於安卓裝置的完美解決方案。與其他大多數廣告封鎖器不同,AdGuard 不需要 Root 權限,提供廣泛的應用程式管理選項。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard for iOS

用於 iPhone 和 iPad 的最佳 iOS 廣告封鎖程式。AdGuard 可以清除 Safari 中的各種廣告,保護個人隱私,並加快頁面載入速度。iOS 版 AdGuard 廣告封鎖技術確保最高質量的過濾,並讓使用者同時使用多個過濾器。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard 內容阻擋器

AdGuard 內容阻擋器將消除在支援內容阻擋器技術之行動瀏覽器中的各種各類廣告 — 即 Samsung 網際網路和 Yandex.Browser。雖然比 AdGuard for Android 更受限制,但它是免費的,易於安裝並仍提供高廣告封鎖品質。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard 瀏覽器擴充功能

AdGuard 是有效地封鎖於全部網頁上的所有類型廣告之最快的和最輕量的廣告封鎖擴充功能!為您使用的瀏覽器選擇 AdGuard,然後取得無廣告的、快速的和安全的瀏覽。
19,180 19180 使用者評論
極好的!

AdGuard 助理

AdGuard 桌面應用程式的配套瀏覽器擴充功能。它為瀏覽器提供了自訂的元件阻止的功能,將網站列入允許清單或傳送報告等功能。
19,180 19180 使用者評論
極好的!

AdGuard DNS

AdGuard DNS 是一種不需要安裝任何的應用程式而封鎖網際網路廣告之極簡單的方式。它易於使用,完全地免費,被輕易地於任何的裝置上設置,並向您提供封鎖廣告、計數器、惡意網站和成人內容之最少必要的功能。
19,180 19180 使用者評論
極好的!

AdGuard Home

AdGuard Home 是一款用於封鎖廣告 & 追蹤之全網路範圍的軟體。在您設置它之後,它將涵蓋所有您的家用裝置,且為那您不需要任何的用戶端軟體。由於物聯網和連網裝置的興起,能夠控制您的整個網路變得越來越重要。
19,180 19180 使用者評論
極好的!

AdGuard Pro iOS 版

除了在 Safari 中之優秀的 iOS 廣告封鎖對普通版的用戶為已知的外,AdGuard Pro 提供很多功能。透過提供對自訂的 DNS 設定之存取,該應用程式允許您封鎖廣告、保護您的孩子免於線上成人內容並保護您個人的資料免於盜竊。
透過下載該程式,您接受授權協定的條款
閱讀更多
19,180 19180 使用者評論
極好的!

AdGuard for Safari

自 Apple 開始強迫每位人使用該新的軟體開發套件(SDK)以來,用於 Safari 的廣告封鎖延伸功能處境艱難。AdGuard 延伸功能可以將高優質的廣告封鎖帶回 Safari。
19,180 19180 使用者評論
極好的!

AdGuard Temp Mail

免費的臨時電子郵件地址產生器,保持匿名性並保護個人隱私。您的主收件匣中沒有垃圾郵件!
19,180 19180 使用者評論
極好的!

AdGuard Android TV 版

Android TV 版 AdGuard 是唯一一款能封鎖廣告、保護隱私並充當智慧電視防火墻的應用程式。取得網路威脅警告,使用安全 DNS,並受益於加密流量。有了安全性和零廣告的使用體驗,使用者就可以盡情享受最喜愛的節目了!
已開始下載 AdGuard 點擊箭頭所指示的檔案開始安裝 AdGuard。 選擇"開啟"並點擊"確定",然後等待該檔案被下載。在被打開的視窗中,拖曳 AdGuard 圖像到"應用程式"檔案夾中。感謝您選擇 AdGuard! 選擇"開啟"並點擊"確定",然後等待該檔案被下載。在被打開的視窗中,點擊"安裝"。感謝您選擇 AdGuard!
在行動裝置上安裝 AdGuard