IntoMobile

Breaking news, information, and analysis on the latest mobile phones and mobile technology

Open NavigationOpen Search
  • Home
  • Platforms
    • iOS / iPhone OS
    • Android
    • Windows Phone
    • BlackBerry OS
  • Hardware
    • New Hardware
    • Tablets
    • Reviews
    • Rumors
  • Carriers
    • AT&T
    • Sprint
    • T-Mobile
    • Verizon
  • Manufacturers
    • Apple
    • Samsung
    • HTC
    • LG
    • Motorola
  • Best VPNs
    • Best VPNs for iPhone
    • Best VPNs for Android

Don’t Hack My Can! Android Controlled Toilet Has Bluetooth Vulnerability

August 6, 2013 by Wade Keye - Leave a Comment

Share on Twitter Share on Facebook ( 0 shares )

Do you remember the Android controlled toilet we reported on a few months back? Well it looks like the best seat in the house might not be so secure after all. There’s a fatal flaw in the Bluetooth connectivity of the Satis “Smart Toilet” that leaves you vulnerable to hackers when you’re in your most vulnerable position.

The Satis toilet comes with an accompanying Android app called My Satis, that allows you “log in” to check on important things such as water and energy consumption. The app also allows you to control the toilet’s many functions, while you work on your own.

Now Security firm Trustwave has blown the lid off of a major flaw in the Satis’ security. The toilets can be controlled using the Android app, but the Bluetooth PIN is hard-coded to “0000.” This opens up a backdoor to anyone within Bluetooth range of your back door. Because this toilet has so many features, potential attackers could  “unexpectedly open/close the lid, activate bidet or air-dry functions,” Trustwave warns.

As such, any person using the “My Satis” application can control any Satis
toilet. An attacker could simply download the “My Satis” application and
use it to cause the toilet to repeatedly flush, raising the water usage and
therefore utility cost to its owner.

Attackers could cause the unit to unexpectedly open/close the lid, activate
bidet or air-dry functions, causing discomfort or distress to user.

The company behind the Satis, Japan’s Lixil, has yet to comment on the security issue. But the hard-hitting reporters at the BBC, who first pinched off the story, tracked down security expert Graham Cluley. Mr. Cluley took pains to wipe away our fears:

“It’s easy to see how a practical joker might be able to trick his neighbours into thinking his toilet is possessed as it squirts water and blows warm air unexpectedly on their intended victim, but it’s hard to imagine how serious hardened cybercriminals would be interested in this security hole.”

[Via: BBC]

Share on Twitter Share on Facebook ( 0 shares )

Back to top ▴

Back to top ▴

Follow IntoMobile

38k
36k
4k
13k
12k

Most Recent Posts

  • iPhone No Sound: Tips on How to Fix this Common Issue
  • The newest iOS – things you surely did not know
  • Transferring money through mobile: Why digital wallets are the future of commerce?
  • Review: Shine laser light Bluetooth headphones
  • Neptune Suite smart watch with phone and tablet screens killing it at Indiegogo

Get Updates Via E-Mail

  • This field is for validation purposes and should be left unchanged.

About IntoMobile

  • About IntoMobile
  • Contact IntoMobile
  • Send us News Tips
  • Privacy Policy

Social Links

  • IntoMobile on Facebook
  • IntoMobile on Twitter
  • IntoMobile on Google+
  • IntoMobile on YouTube

Copyright © 2006-2021 IntoMobile. All rights reserved.