The Hamilton Spectator

What I learned from the hacker who spied on me

Columnist asked an ethical hacker to get into as many of her webcams as he could

- JOANNA STERN

When my nanny sends me a photo of my 18-month-old son busy at play, my immediate thought: He’s a genius.

When a hacker sent me a photo of my son, after breaking into the baby monitor on my Wi-Fi network, my thought: I’m an idiot.

(My editor deleted an expletive from that sentence.)

To be fair, I gave Alexander Heid, a certified ethical hacker and chief research and developmen­t officer at security firm Security Scorecard, free rein to try to break into all my cameras. Still, that’s no excuse for me not changing the default password.

We’re putting cameras in more and more places, yet more and more people are putting tape over their computer webcams because they fear who may be looking.

How secure are these tiny eyes into our private lives? The bad news is, it was possible for Mr. Heid to get into my Windows 10 laptop’s webcam and, from there, my entire home network. He also eventually cracked my MacBook Air. The good news is that both operating systems were initially able to thwart the hacker. It took me performing some intentiona­lly careless things for him to “succeed.”

If you’re on guard and aware that people are out there trying to trick you to let down your defenses, and you follow some basic practices, you can make it much more difficult for the bad guys to get to you.

Mr. Heid employed off-theshelf hacking tools often used by security profession­als to find network and device vulnerabil­ities. With more time and resources, however, he says he could have better concealed the attacks. Even so, they highlighte­d some key human vulnerabil­ities. While I expected the phishing emails, and played along with them, his requests were all fairly simple user actions or settings adjustment­s that we might encounter in our daily use over months or even years.

When Mr. Heid got into my system, he got a glimpse of my digital body—my passwords, emails, personal info. And the truth is, most hackers are more interested in our bank info than our birthday suits. Various security experts told me while webcam hacks happen, notably to women or children, they’re not as common as other threats.

Here’s what I learned along the way about how to play things safer.

Getting my attention

In a recent tweet, I announced I was looking to hire a new video producer. Mr. Heid decided that was his attack vector. He got together everything needed for “Rutiger Watkins” to apply for the job: a coherent intro email with a résumé attached and a link to a video reel. Of course, the reel was actually a file containing malware, and the résumé was a Word doc that had the instructio­ns for executing it. (A similar fake-résumé tactic was recently used by Russian hackers.)

Sure, I was in on it, but spearphish­ing—the practice of targeting individual­s by leveraging public informatio­n and posing as a known or trustworth­y sender— is getting increasing­ly popular.

“Most people can fall for some social-engineerin­g attack,” says Jack Koziol, the chief executive of InfoSec Institute. “It’s becoming easier and easier to trick a person to just click on a link.” There’s also an abundance of informatio­n about us now on the internet, too.

What you can do: We’re the weakest part of our own digital security. We’re busy, we click things, we ignore warning signs. Be suspicious of even the most routine digital communicat­ions. Pay attention to those email warnings. I didn’t receive a phishing warning in Gmail when I got the fake job applicatio­n, but the email did have a big yellow warning about being unable to scan the encrypted attachment for viruses. (Gmail has three classes of security notificati­ons that differ in size and color based on the anticipate­d threat level.)

Getting Into Windows

When I opened the attached Word doc, Microsoft’s built-in, free anti-virus software, Windows Defender, immediatel­y flagged it.

When I clicked the link to the “reel,” the file that began downloadin­g was identified as a virus and deleted. The system worked, but I wanted to see what would happen if I were someone who didn’t have anti-virus turned on in the first place, or who turned it off because it got annoying.

I went into Windows settings and disabled real-time virus protection. I was able to download the “reel” without issue. But when I double-clicked the document, Microsoft Word opened it in a protected view. I intentiona­lly dismissed the warning sign and enabled editing of the document.

Once the two files were activated, Mr. Heid was able to fire up my webcam within 15 minutes. There I was, no makeup on and thankfully not picking my nose. The HP’s indicator light went on when he first reached the camera, but everything on the laptop’s desktop remained as is. He set it to snap photos every few seconds and was even able to tap into my mic and hear the commotion

in my home. Some of HP’s newest laptops have a physical webcam kill switch that disconnect­s the camera’s power supply.

Microsoft patched this Microsoft Office vulnerabil­ity in April 2017, which is why Mr. Heid had to use a second file to successful­ly infect the updated machine, says Tanmay Ganacharya, Microsoft’s general manager of Windows Defender, in an email. The key weakness was in my own actions. “If security features are deliberate­ly disabled and warnings are not heeded, technology becomes limited in how well it can protect users,” he says.

What you can do: Windows users should make sure Windows Defender or other name-brand anti-virus is always up and running. For users who don’t want to worry every time they download something, Mr. Ganacharya recommends putting Windows 10 in S Mode, which only runs apps that have been approved by Microsoft. It also helps to view documents in the cloud, for instance in Office Online or Google Docs, where any malware won’t touch your machine.

Getting Into the Mac

Hacking a 2015 MacBook Air running the latest MacOS version, Mojave, also required a multistep process (and some missteps by the “victim”). This time the malware was embedded in an .odt document, an opensource file format.

To open it, I downloaded LibreOffic­e. The free version of the popular open-source office suite isn’t in the Mac App Store, however, so I had to disable the Mac security setting that prevents unverified developer software installati­on.

This is something that comes up often when downloadin­g the many popular apps that aren’t in the App Store. (I could have paid $14 (U.S.) for a version in the App Store, however.)

Once I installed LibreOffic­e, I turned off its macro security setting, per the hacker’s instructio­ns. There are scenarios where you might do this—say, for instance, because your company used a specially designed inventory

spreadshee­t or sales form—but for most people, it’s a bad idea.

“Setting macro security to low is like jumping from the 10th floor hoping to land on a soft surface. Chances to survive are close to zero,” says Italo Vignoli, a founder of The Document Foundation, which oversees LibreOffic­e.

Whenever the security scenario slacked even a bit, the hacker was able to gain an advantage. Before snapping a few shots of me sitting in a Starbucks, he downloaded some files he needed to access the camera. I did get a pop-up asking for camera access, and I clicked OK, like we might do when we’re in a rush. Because Mr. Heid was only snapping stills, the webcam LED only lit up for a second.

“Apple has built security features into MacOS to protect users from mistakenly downloadin­g unsafe software,” said an Apple spokesman in a statement. “We recommend downloadin­g software only from the Mac App Store or trusted members of the Apple Developer Program and never opening files from unknown or untrusted sources.” The company also stresses the importance of paying attention to warnings.

What you can do: Installing those nagging security and OS updates are a must—on your phone, laptop, router, thermostat, really anything that connects to the internet. They include the latest attempts to patch the holes that hackers use to get in. Mac users should install Malwarebyt­es or other malwarefig­hting software—and don’t turn off any security features just because someone asks you to.

And yes, my laptop now also has a sliding webcam cover, though a piece of tape or Post-it will do.

What about the cameras on our phones? While it’s possible to hack a smartphone, it’s harder. “Many vendors are doing an excellent job securing phones,” says Dave Lewis, advisory chief informatio­n security officer at Cisco subsidiary Duo Security. Various security experts I spoke to highlighte­d the strong security of Apple’s iOS. Android is considered a more likely target but Google has made security improvemen­ts over the last few years. Plus, phone cameras aren’t exactly revealing. A hacker could get some great shots of my ceiling right now.

Getting Into Everything Else

When connected to the Windows laptop, Mr. Heid was able to scan for other devices on my home Wi-Fi network. He quickly found two cameras: a Nest Camera and a Wansview 1080p connected baby monitor that I bought for this column along with the laptops.

From this point on, getting into the baby monitor didn’t even require hacking. He went to its IP address, searched Google for the default username and password and typed it in to the camera’s web portal. He had a nice stream of my son’s playroom—my son included.

When I configured the camera with Wansview’s iPhone app, it wouldn’t allow me to change the default credential­s. If you want to change the password, you have to go back into the settings of the app and change it later.

While this was a result of bad password hygiene, various security experts told me that IP web cameras have some of the poorest security. They pointed out a site where you can view webcam streams from inside homes of oblivious users.

The setup process requires default settings for technical reasons, said Una Tan, a Wansview representa­tive, who also stressed the importance of changing the password (after setup) and keeping your home network secure.

The cloud-based Nest camera is managed through a Nest account, which is safer because it requires you to create a password, has other security features and is protected by parent-company Alphabet Inc.’s own security. Unfazed, Mr. Heid pulled up a database of usernames and passwords that have been publicly shared after major security breaches. He found an old password of mine, but it would have failed because I use a unique password on my Nest account. (Other Nest owners haven’t been so careful.)

If he was really determined, he could have installed a keystrokel­ogging program on my laptop to capture my passwords over time.

What you can do: PASSWORDS ARE IMPORTANT. As soon as Mr. Heid showed me that old password of mine, I immediatel­y strengthen­ed the passwords of my most important accounts and made sure there were no repeats. Use a password manager to manage all your various passwords and turn on two-factor authentica­tion where you can.

Also, you don’t need to have your own personal ethical hacker to see if your accounts have been breached. Go to haveibeenp­wned.com and type in your email address.

The laptops I used for this experiment have been reset to factory settings, have web camera covers and up-to-date software.

As for a baby monitor? I’m using one that doesn’t connect to the internet at all.

 ?? GISELE WINTON SARVIS METROLAND ?? If you’re aware people are trying to trick you to and you follow some basic practices, you can make it much more difficult for the bad guys to get to you.
GISELE WINTON SARVIS METROLAND If you’re aware people are trying to trick you to and you follow some basic practices, you can make it much more difficult for the bad guys to get to you.

Newspapers in English

Newspapers from Canada