Smart Home Devices: Concerns, Vulnerabilities, and How to Address Them

Articles
Published:
September 26, 2023

The idea of a “smart home,” a home filled with connected devices that conveniently streamline entertainment, security, lighting, and other functions, has grown in popularity in recent years evidenced by the growing number of connected devices in American households.US households have approximately 22 connected devices on average, according to Deloitte’s 2022 Connectivity and Mobile Trends Survey, and with each new device comes the potential for a vulnerability.While connected devices bring with them various benefits, the families and homeowners utilizing them may not be fully aware of associated privacy and security risks.

  • Many Americans already have concerns regarding smart home devices; the Deloitte survey found that 52 percent of Americans expressed worry over smart home device vulnerabilities.

A major concern regarding smart home devices is whether the data collected from them will be used in ways users are comfortable with.End users rarely read user agreements and privacy policies; however, they may be surprised to learn what they are implicitly agreeing to by using certain devices.For example, Furbo's “Dog Camera with Dog Nanny'' device contains a privacy policy that allows Furbo to “collect audio, video, or pictures'' from users and “collect and audit information of individuals when they pass in front of the camera,” according to a 2021 report by the Mozilla Foundation.https://youtu.be/I40AYHvnAcM?feature=sharedHome devices and apps needed for smart home device functionality, such as the Ring Doorbell App, may also send data to third-parties and/or contain third-party trackers.

  • Privacy considerations may also relate to devices assembled in China and made by Chinese companies. For example, Hikvision, a Chinese company that makes Internet of Things (IoT) devices and video security systems, has had restrictions placed on its products over national security concerns.

Threat actors targeting smart home devices generally do so opportunistically, i.e., they search for vulnerable devices to target rather than specific individuals to target.In rare instances, bad actors may be local, but those targeting IoT devices generally do so from afar as devices connected to the internet are largely discoverable through remote scans of IP addresses.The Shodan search engine, for example, allows bad actors to discover vulnerable devices by broadly scanning the internet for connected devices.This information is then used nefariously. For example, a Russian website contains live footage of oftentimes private IP-based camera feeds by targeting cameras that still use known default login credentials.Smart home devices can have a myriad of exploitable vulnerabilities that can lead to bad actors hijacking, disabling, or using them to collect sensitive data and/or infect other devices.Smart home devices come from a variety of manufacturers and are often rushed out without proper security measures and run on relatively simple hardware and software incapable of detecting complex attacks. Some of these devices may also be incapable of being updated to patch vulnerabilities.Most smart home device compromises come from attackers gaining device and/or account credentials via phishing emails, prior data breaches, or from existing knowledge of default usernames and passwords.

Devices using default usernames and passwords are particularly vulnerable and nearly 65 percent of consumers do not change default passwords or usernames on them, according to a 2021 survey by NordVPN.

This is particularly noteworthy for routers, arguably the most important home network device. A router compromise makes it relatively easy for a bad actor to connect to a WiFi network and carryout attacks.Fortunately, there are steps individuals and families can take to secure their smart home devices. The following are general best practices for those wishing to do so:

  • Put smart home devices on a separate WiFi network like a guest network;
  • Routinely install software updates that include security patches on home devices, and purchase devices with automatic update installation options;
  • Always change device and router passwords from their default, out-of-the box credentials such as “admin” or “password”;
  • Enable multi-factor authentication on smart home devices; and
  • Limit the types of smart home devices and ecosystems used to reduce the number of attack vectors available to bad actors.

In addition to the above recommendations, individuals and families may benefit from professional assistance and a complete audit of their home network, which spans beyond smart home devices. Cybersecurity is holistic and an audit with this approach in mind may identify overlapping concerns, such as compromised credentials on the dark web or specific issues with devices on a home network. Some may wholly oppose “smart home” tech due to security and privacy concerns as is their prerogative, but with the right precautions and safety measures, users of this tech can enjoy its benefits more comfortably.

Garrett Bell (Analyst, Security Consulting)

Subscribe for Cutting-Edge Security Insights!

Get the latest news, expert insights, and exclusive updates right in your inbox.

By clicking Sign Up you're confirming that you agree with our Terms and Conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Related Posts

Cyber Security

Evolution of Crypto & Geopolitical Risk

What are some of the geopolitical implications of the rise of crypto and blockchain technologies?
March 29, 2023

Rising Physical Security Threats to Cryptocurrency Leaders

Physical security threats to cryptocurrency leaders are on the rise, learn the best practices to protect assets.
March 2, 2023

Hamas' Use of Social Media & How to Protect Your Family

‍The recent use of social media by Hamas presents an increased risk of exposure to harmful content to social media users, including families.
October 12, 2023

Let's discuss your security.

Partner with Red5 for unmatched intelligence and analysis expertise tailored to your needs.