this post was submitted on 12 Oct 2024
358 points (98.1% liked)

Technology

58692 readers
4028 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] sbv@sh.itjust.works 55 points 3 days ago (1 children)

On May 24, the same day that Mr Swenson's device was hacked, a Deebot X2 went rogue, and chased its owner's dog around their Los Angeles home.

The robot was being steered from afar, with abusive comments coming through the speakers.

...

Late at night, an Ecovacs robot in El Paso started spewing racial slurs at its owner until he unplugged it.

The future is stupid.

[–] Dasus@lemmy.world 17 points 3 days ago (4 children)

These hackers are stupid.

I dint understand how you have the intelligence and patience to learn enough to hack one of these, but the go with some unoriginal racist bullshit.

Could've actually made it fun and original.

[–] theneverfox@pawb.social 0 points 1 day ago

There's different types of hacking. Finding and coding up an exploit? That takes skill

Then, they post it in a corner of the Internet somewhere to get appreciation for their achievement, or maybe even sell it on the dark web (or someone else sees it and packages it up in a state to sell/share)

Now, using the exploit? That's pretty easy. It requires some technical ability, but not much. It's just installing and configuring stuff, then using an app

So here's what I think happened. Someone found the exploit, and posted about it in a hacker community off the beaten path. One thing led to another, and somehow a group of edgelords get a hold of it. As a group, they manage to get it working, and act like edgelords

The original hacker might have been related, but real hackers are cautious or quickly caught - they probably solved the puzzle, maybe played with it a bit, then posted their findings and moved on to the next puzzle

[–] DancingBear@midwest.social 2 points 2 days ago

I’m sorry Dave, I can’t do that

[–] actually@lemmy.world 5 points 3 days ago

I’ve no idea how they hacked. But most likely the vulnerability was a mistake the vacuum cleaner manufacturer did, after using second tier software to “save costs”. And they probably skimped on paying the coders, if any

Most likely someone more sophisticated found the exploit, tried to get a bug bounty , was declined by the penny pinching company, and they posted to a place people like your comment inhabit.

If I’m right, this is only the start of problems with this cleaner, because it will happen over and over?