Cocoon by chistera.eu

“Cayla,… what did you just say?” How children toys might become the keys to our smart homes

Advertisements

In the past the only toys that could speak and hear were those in the movies. However, with the Internet of Things, fantasy is now becoming reality, and a recent hack shown this month by the National Cyber Security Centre demonstrated what might just happen when good toys go bad.

“My friend Cayla” first became available in 2014, as a Bluetooth enabled e-doll that comes equipped with a microphone and Internet connectivity. Cayla is interacting with children by capturing their speech and analysing it with voice recognition software, in conjunction with mobile apps. The result is a toy that can talk, play games, tell stories, as well as respond to questions about animals, countries and famous people; every kids dream!

The problem is that Cayla allows for arbitrary connectivity with any Bluetooth-enabled device within reach, which essentially makes the toy a remote microphone and audio recorder; albeit disguised as a cute looking doll. Even a lightweight protection that limits connectivity to one device at a time can easily be subverted, because once a legitimate device (such as the child’s/parent’s tablet or mobile phone) goes out of range or runs out of battery, a would-be attacker is able to connect to the toy and play or record audio. In fact, because the toy can be used to illegally spy on children, as of February 2017, Germany’s Federal Network Agency classified Cayla as an “illegal espionage apparatus”.

This is not the first time Cayla has been in the limelight. Security researcher Tim Medin and penetration company Pen Test Partners have both revealed vulnerabilities with the toy, from listening in on conversations to forcing the doll to repeat expletives (by using the “My friend Cayla app” with a rooted Android device). However, the NCSC have taken this one step further by demonstrating how e-dolls such as Cayla can lead to cyber-physical threat in the smart home; exploiting the dolls speech playback functionality to open a doors smart lock.

Whilst the NCSC have not given specific details on how they executed the attack, it is in fact fairly simple to carry out on a number of smart lock devices. For example, depending on whether a doors smart lock has voice-recognition software or is controlled via an app, Cayla provides the perfect medium for circumventing both in exactly the same way. In the first figure below, an attacker aiming to gain access to a smart home stealthily uses Cayla to record occupants speech in the local vicinity (when nobody is connected); ex-filtrating the necessary information for communicating directly with a voice-controlled smart lock (step 1). Next, the attacker plays back the recording when access to the doll is available and the home’s occupants are away (step 2).

In figure two, an attacker simply uses Cayla to playback an audio file that uses the standard app voice commands (which are typically available in the manual!) to open a smart lock which is controlled via the Amazon Echo Alexa assistant (Google Home would be equally useful here …)

Cayla is not the only toy that is vulnerable to hackers. Similar concerns have also been raised about i-Que toy and the new Hello Barbie. So, the age of internet connected toys is most definitely upon us, but what can we do to ensure that these toys are adequately protected, without compromising the safety of the children and environment in which they are used?

Below are a number of best practice tips that can help provide protection for e-toys, whether in the smart home or more generally for the children that use them.

Recently in the news:

View Poll

Advertisements

Advertisements