Toilets next target for hackers
Security researchers find flaw that allows for hijacking of 'smart toilet'
Toilets could be the next target for hackers, according to a research report from Trustwave's SpiderLabs security team.
The team have detected a flaw in the hardware of Satis ‘smart' toilets produced by Japanese company LIXIL, which makes them vulnerable to unauthorised access to the toilet controls.
The toilet can be controlled using a Google application, also produced by LIXIL, which links to the toilet via Bluetooth. The ‘My Satis' Android application has a hard-coded Bluetooth PIN of 0000, meaning that any mobile with the application installed can be used to control any Satis toilet.
While the hack would be limited to the range of the Bluetooth, an attacker could potentially catch a user with an unexpected flush, a blast of hot air or water from the bidet function, or shut the lid without warning.
No patch is available for the vulnerability at present.