logoalt Hacker News

MyFirst Kids Watch Hacked. Access to Camera and Microphone

96 pointsby jidokatoday at 1:04 PM26 commentsview on HN

Comments

perching_aixtoday at 7:00 PM

I keep reading about how IoT / wearables / smart home devices are routinely both vulnerable and exploited, if not even come with malware preinstalled, so I was curious to finally go through a primary source like this.

After skimming through the attacks performed in this research, and checking every mention of the word "internet", all I got was a section with a hypothetical scenario where the watch has a publicly reachable IPv4 address. Suffice to say, that is really quite unlikely, certainly in my experience at least.

It did also talk about bundled malware, so I guess that's bad enough, but is all IoT research like this? Always sounded to me like you kinda need to already have a foot in the door for these, and this paper didn't dispel that notion for me at all.

show 6 replies
jidokatoday at 1:04 PM

Title: KTH student hacked a popular children’s smartwatch, found 17 vulnerabilities and full remote access

A former student at KTH Royal Institute of Technology has demonstrated how a popular children’s smartwatch can be fully compromised over the internet. In his thesis, “Ethical Hacking of a Smartwatch for Kids: A Hacker’s Playground,” Gustaf Blomqvist conducted an ethical security assessment of a widely sold kids’ smartwatch and found what he describes as severe security flaws.

The device, identified in Swedish media as the MyFirst Fone R1s by MyFirst, exposed an insecure network service directly to the internet. By scanning for devices, an attacker could identify watches and take complete control of them remotely.

According to the findings, an attacker could access the camera and microphone, eavesdrop on surroundings, read and manipulate text messages, send arbitrary messages, and potentially use the device in denial-of-service attacks. In total, 17 vulnerabilities were discovered.

Blomqvist also found preinstalled malicious code on the watch. The device reportedly connected periodically to a remote server and transmitted detailed information about its contents. The update mechanism for that code was itself vulnerable, making it possible to install additional malicious software.

Children’s smartwatches are marketed primarily as safety devices so that parents can stay in contact with their children. However, the research suggests these products may introduce serious privacy and security risks instead.

Blomqvist says he reported the vulnerabilities to the manufacturer and initially received instructions on where to submit the details, but after that communication stopped. Pontus Johnson, professor of cybersecurity at KTH, commented that many software-based systems remain highly vulnerable and that smaller manufacturers may lack the resources to properly address security issues.

The EU Cyber Resilience Act introduces mandatory cybersecurity requirements for connected products, but full enforcement will not take effect until 2027.

Sources: kth.se, expressen.se

show 1 reply
TazeTSchnitzeltoday at 5:29 PM

I guess some folks at KTH have been looking at this topic for a while now, there was a story about it on SVT (Swedish equivalent of the BBC) two years back: https://www.svt.se/nyheter/inrikes/sa-latt-hackas-ditt-barns...

Same professor, Pontus Johnson, is mentioned that story.

Lyrkantoday at 5:03 PM

Reminded me of this recent talk from 39C3 regarding another company (Xplora) that also sells smartwatches for children: https://www.youtube.com/watch?v=VRQz9EX2Tl0

coredev_today at 4:10 PM

I'm very excited for EUs CRA, very promising for the future of digital security in the EU.

quinnjhtoday at 6:40 PM

Article was a bit of a nothingburger for the technically inclined.

Digging into the paper, the significant finding (RCE) is achieved via:

A payload was written which installs a reverse shell backdoor for root persistence. The payload was sent from a computer hosting a Wi-Fi to which the watch was connected, to ensure the watch had a reachable IPv4 address. The program ncat was used both to send the payload to the watch's network service, and to catch reverse shell connections.

So if i understand this- it requires the watch being connected to a compromised AP. Anyone get a different read?

show 2 replies
j45today at 6:17 PM

Someone really needs to make a watch for kids sans touchscreen but with enough features for parents.

defraudbahtoday at 4:36 PM

which smartwatch was that?

the source linked in the article is dead, and I only see that AI slop comment here

-- MyFirst Fone R1, singapore

funny that it's called my first, find my first upon your device, haha

show 1 reply
octoclawtoday at 6:03 PM

[dead]

fleahuntertoday at 4:48 PM

[dead]