Thursday, March 27, 2025
HomeHacksHomehack Glitch : Hackers found a way to spy through LG SmartThinQ

Homehack Glitch : Hackers found a way to spy through LG SmartThinQ

Published on

SIEM as a Service

Follow Us on Google News

Security Researchers have detected a flaw termed HomeHack in LG SmartThinQ mobile app that allows hackers to access all Electronic appliances present and get the live feed of the Surrounding through the integrated camera present in LG Hom-Bot robot vacuum cleaner.

The researchers discovered a glitch with the mobile app in the authentication process and the way in which it interacts with the LG infrastructure between apps and the devices.

This Basically consists of four steps:
1. Authentication request – verifies user credentials.
2. Signature request – creates a signature based on the username from authentication request.
3. Token request – use the signature response as a header and username as the parameter to get an access token for the user account.
4. Login request – sends the access token in order to log in to the application.

Also Read GoCrack – Password Cracking Tool for Security Professionals to test Password Effectiveness

These steps allowed hackers to detect that there is no dependency between the authentication request and the signature or token request, Which helped them to create a fake username which seems legit and get control over the devices.

“As more and smarter devices are being used in the home, hackers will shift their focus from targeting individual devices to hacking the apps that control networks of devices. This provides cybercriminals an opening to exploit software flaws, cause disruption in users’ homes and access their sensitive data,” said Oded Vanunu, head of products vulnerability research at Check Point.

Mitigations

After This LG Released a security patch for their LG SmartThinQ (V1.9.23) mobile app and suggested Users keep their application updated To be free from such vulnerability.

LG now plans to join forces With Check Point an Israel based multinational Company who detected this flaw to Secure their Devices.

LG’s SmartThinQ® range of smart appliances and safety solutions enable users to access and maintain their homes from a smartphone.

Sales of the Hom-Bot robotic vacuum cleaner alone exceeded 400,000 in the first half of 2016.  In 2016, 80 million smart home devices were shipped worldwide, a 64% increase from 2015.

Latest articles

CodeQLEAKED: GitHub Supply Chain Attack Enables Code Execution via CodeQL Repositories

A recent discovery has revealed a potential supply chain attack vulnerability in GitHub's CodeQL...

Exim Use-After-Free Vulnerability Enables Privilege Escalation

A significant security threat has been uncovered in Exim, a popular open-source mail transfer...

OpenAI Offers Up to $100,000 for Critical Infrastructure Vulnerability Reports

OpenAI has announced major updates to its cybersecurity initiatives. The company is expanding its...

Splunk RCE Vulnerability Enables Remote Code Execution via File Upload

A severe vulnerability in Splunk Enterprise and Splunk Cloud Platform has been identified, allowing...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Specter Insight C2 Tool Fuels ClickFix-Based Hacking Campaigns

A recent cybersecurity investigation has uncovered a previously unidentified Command and Control (C2) framework,...

Four Members of Hacker Group Behind 90 Worldwide Data Breaches Exposed

A recent investigation by Group-IB has shed light on a notorious cybercriminal operating under...

Attackers Hide Malicious Word Files Inside PDFs to Evade Detection

A newly identified cybersecurity threat involves attackers embedding malicious Word files within PDFs to...