Holy sh*t! Smart toilet hack attack! – Ars Technica
You have to give this hack 10 out of 10, it’s my favorite hack. 🙂
Information security firm Trustwave has reported a potential cyber-attack vector to a device you may have never expected the phrase “security vulnerability” would be applied (other than in reference to the end of a toilet paper roll, that is). In an advisory issued August 1, Trustwave warned of a Bluetooth security vulnerability in Inax’s Satis automatic toilet.
Functions of the Satis—including the raising and lowering of its lid and operation of its bidet and flushing nozzles—can be remotely controlled from an Android application called “My Satis” over a Bluetooth connection. But the Bluetooth PIN to pair with the toilet—”0000″—is hard-coded into the app. “As such, any person using the ‘My Satis’ application can control any Satis toilet,” the security advisory noted. “An attacker could simply download the ‘My Satis’ application and use it to cause the toilet to repeatedly flush, raising the water usage and therefore utility cost to its owner. Attackers could cause the unit to unexpectedly open/close the lid, [or] activate bidet or air-dry functions, causing discomfort or distress to user.”
I wanna activate the bidet… and the air dry… oh pleeease.