skip to Main Content

Cybercrime created software for breaking into Ring security cameras

Cybercrime Created Software For Breaking Into Ring Security Cameras

Motherboard discovered that cybercrime hackers have created dedicated software for breaking into Ring security cameras

Cybercrime hackers have created dedicated software for breaking into Ring security cameras. It has been discovered by Motherboard, that reviewed some posts on hacking forums. The camera company is owned by Amazon, which has hundreds of partnerships with police departments around the country. On Wednesday, local Tennessee media reported that a hacker violated device cyber security, broking into a Ring camera installed in the bedroom of three young girls in DeSoto County, Mississippi, and spoke through the device’s speakers with one of the children. The family said they had the camera for four days, during which time the hacker could have been watching the kids go about their days. According to Tennessee local news outlet WMC5, the parents installed the camera in the bedroom of their three young daughters to keep an eye on them.

The Media found several posts on different hacking forums about creating tools for breaking into the Ring accounts which are connected to cameras

Motherboard found several posts on different cybercrime forums where hackers discuss creating tools for breaking into the Ring accounts which are connected to cameras. “Ring Video Doorbell Config,” one thread on a hacking forum reads. A config is a file used to drive special software for rapidly churning through usernames or email addresses and passwords and trying to use them to log into accounts. Hackers have developed configs for a wide variety of websites and online services, from Uber to Facebook. The thread title adds that the config has a “High CPM,” or high “check per minute,” meaning it can test if a username and password allows access to a Ring camera quickly. In a different thread, one hacker is offering a Ring.com checker for $6. Apparently there is demand for the file.

Back To Top