ring doorbell camera

Hackers Have Developed Software To Break Into Ring Security Camera Accounts, And It’s Working

A Mississippi family had their Ring account hacked, allowing a man to speak to their eight-year-old daughter through the speaker.

After a Mississippi family reported that a hacker was able to gain access to their Ring security camera, VICE News discovered that hackers have already created “dedicated software” for breaking into the devices.

Ashley LeMay, a parent living near Memphis, Tenn., told local news outlet WMC5 that she installed a Ring camera in a bedroom to keep an eye on their three young daughters. She and her husband could use Ring’s mobile app to see what was happening with their kids and use a speaker to talk through the camera.

But within four days, a hacker was able to break into their camera and view the children in their room. LeMay’s eight-year-old daughter noticed loud music blaring from their room and went to check it out. Video captured by the camera and shared with WMC5 shows the child asking “Who is that?” as shears banging coming from the Ring speaker.

 

 

A man’s voice replies: “I’m your best friend! I’m Santa Claus!” As the girl calls for her mom, the voice asks the girl: “Don’t you want to be my best friend?”

The hacker encouraged LeMay’s daughter to engage in “destructive behavior,” the news outlet said, before the girl’s father came into the room.

LeMay said that she had not implemented two-factor authentication for her Ring account, which would have added another layer of security protection. The family has also changed their WiFi settings so that their router is no longer visible to the public. She has since disconnected the camera and is working with Ring, which is owned by Amazon, to investigate what happened.

In the news report, LeMay also said she suspected that the hacker was someone who knew the family or someone who was close by and able to access their WiFi network.

The chilling video prompted VICE’s Motherboard to search crime forums for posts related to hacking Ring accounts. One thread on a hacking forum provided software, called a config file, to help other hackers quickly search through usernames, email addresses and passwords and attempt to use them to log into accounts.

Other threads offered to sell the software for low prices, noting a higher demand for the config since it might allow criminals to break into homes when families are not home or spy on the people inside.

The Motherboard report also notes that Ring does not currently require users to set up two-factor authentication, making it easier for hackers to find and take over accounts that have less protection.

A Ring spokesperson said in a statement that they are taking the issue of device security seriously.

“While we are still investigating this issue and are taking appropriate steps to protect our devices based on our investigation, we are able to confirm this incident is in no way related to a breach or compromise of Ring’s security,” the spokesperson said.

The statement added: “As a precaution, we highly and openly encourage all Ring users to enable two-factor authentication on their Ring account, add Shared Users (instead of sharing login credentials), use strong passwords, and regularly change their passwords.”

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Survey Shows Election Anxiety Crosses Party Lines

    New reports of election worker intimidation are raising concerns about election interference. A majority of Americans (71%) are worried about voter intimidation or safety at the polls, and 75% want security cameras at their voting place, according to a new national survey. Read Now

  • 66 Percent of Cybersecurity Pros Say Job Stress is Growing

    Sixty-six percent of cybersecurity professionals say their role is more stressful now than it was five years ago, according to the newly released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3