Story image

Check Point uncovers major security flaw in LG smart devices

27 Oct 17

With recent news from LG and Check Point, It’s like all your favourite horror movies have come true.

Check Point’s security researchers uncovered a vulnerability that exposed millions of users of LG SmartThinQ smart home devices to the risk of unauthorised remote control of their home appliances.

It’s undoubtedly concerning given the skyrocketing rise of smart applicances – in 2016 80 million smart home devices were shipped around the world, a 65 percent increase from the year before.

Deemed ‘HomeHack’, the vulnerabilities in the SmartThinQ mobile app and cloud application enabled the Check Point team to remotely login, take over the user’s legitimate account and gain control of the vacuum cleaner and its integral video camera.

Once in control of a specific user’s LG account, any LG device or appliance associated with that account could be controlled by the attacker – including the robot vacuum cleaner, refrigerators, ovens, dishwashers, washing machines and dryers, and air conditioners. 

Furthermore, the HomeHack vulnerability equipped attackers with the ability to spy on users’ home activities via the Hom-Bot robot vacuum cleaner video camera that sends live video to the associated LG SmartThinQ app as part of its HomeGuard Security feature.

“As more and more smart devices are being used in the home, hackers will shift their focus from targeting individual devices, to hacking the apps that control networks of devices. This provides cyber criminals with even more opportunities to exploit software flaws, cause disruption in users’ homes and access their sensitive data,” says Oded Vanunu, head of products vulnerability research at Check Point.

“Users need to be aware of the security and privacy risks when using their IoT devices and it’s essential that IoT manufactures focus on protecting smart devices against attacks by implementing robust security during the design of software and devices.”

Check Point disclosed the vulnerability to LG on July 31 2017, following responsible disclosure guidelines and LG responded by fixing the reported issues in the SmartThinQ application at the end of September.

Vanunu says fortunately LG responsibly provided a quality fix to stop possible exploitation of the issues.

“In August, LG Electronics teamed with Check Point Software Technologies to run an advanced rooting process designed to detect security issues and immediately began updating patch programs,” says Koonseok Lee, manager of the smart development team within smart solution BD at LG Electronics.

“Effective September 29th the security system has been running the updated 1.9.20 version smoothly and issue-free.  LG Electronics plans to continue strengthening its software security systems as well as work with cyber-security solution providers like Check Point to provide safer and more convenient appliances.” 

In terms of protecting devices, Check Point and LG recommend:

  • Update LG SmartThinQ app to the latest version (V1.9.23)
  • Update smart home physical devices with the latest version
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.
What disaster recovery will look like in 2019
“With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose."
Proofpoint launches feature to identify most targeted users
“One of the largest security industry misconceptions is that most cyberattacks target top executives and management.”
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
25% of malicious emails still make it through to recipients
Popular email security programmes may fail to detect as much as 25% of all emails with malicious or dangerous attachments, a study from Mimecast says.