They accessed the Talk function on the camera placed in my living room and played a series of very loud screams and music, and then they said "we are sorry for disturbing you this late" (but that could have also been a recording). It was 2 AM.
When I figured out what was happening, I opened the Tapo app on my iPhone and noticed I was logged out (never happened before). I reset the password, got back access to all the cameras and upgraded them all to the 1.1.16 firmware version (I couldn't find the option to automatically upgrade to new firmware versions, perhaps that should be implemented).
I found a series of articles (cannot add the links unfortunately) that are describing in details how this can be achieved, but the vulnerability was supposed to have been fixed back in 2020. Also, this would mean the attacker would have also hacked my WiFi to be able to be on the same local network as the camera, which makes it a bit less random - they would have needed to be good at both hacking WiFis and Tapo devices. I didn't find any evidence that my WiFi had been hacked, but I did find an IP address that looked suspicious in the router's logs.
So either the vulnerability is still there, in some shape or form, or it is a different type of vulnerability that is affecting more recent versions of the firmware. Or perhaps it was just the Tp-Link account information that was hacked, or the Tapo app I'm using, and not the camera itself.
If this was related to the Tapo app or the Tp-Link account, I really hope all the logged-in devices are logged out after the account password is changed - otherwise the attackers might still have access to my account. According to this thread describing recent similar events that was closed, this may be the case still: -link.com/en/smart-home/forum/topic/239838
I already sent all the details to Tp-Link Support and I am also writing to my ISP provider about this - mostly to mention that IP that I found. If it's kids playing around and just using tools found online, they might not be as good as hiding their tracks.
It's a great step to reach our local support and check Security Advisory (at the bottom of tp-link website) for any privacy and security related concerns, here you could reach our support team directly, so they could help look into the concern in the first time and provide assistance.
Also, make sure you have used a strong password and do not reuse the same account and password on different platforms, which could be the reason that an account is compromised. After the changing of password, the app requires to logging in on all the mobile devices.
I did reach out to local support but they claimed no one has ever reported this issue .... which is clearly not true, as I found mentions on this very forum and there are many articles online describing previous issues, that have been fixed in the meantime by Tp-Link.
I also discovered by searching online the CVE-2021-4045 vulnerability that affects my camera model and the 1.1.15 firmware version, which the camera was running on before I upgraded to 1.1.16. It seems 1.1.16 should be safe, I asked my local support for confirm this but no reply.
@JoaoR Thank you for the feedback, it's good to know you have changed the password in the first time, we'd recommend also ensure the device firmware & app version are both up to date. Here from Security Advisory board you could find the latest information about remediation. We take security concern with high priority and would like to investigate further, to better assist your case, we created a support email TKID220518977 for your case, please check your email.
Good morning. We were also hacked last night. C200 camera. Loud noises were heard. Firmware 1.1.16 build 211209 is installed and does not change the problem!! My password consists of 32 characters. It would be nice if you could also assign special characters in the password.
d'abord une sirne d'alarme trs forte histoire de bien nous rveiller, puis clignotement de la lampe, puis une voix fminine en anglais qui dit " hello i'm here do you find me, don't be afraid" sur diffrentes camras.
After contacting D-Link support: The DCS-6100LH uses RTSP embedded in HTTPS which is sent to the MyDlink app through their servers. For full functionality, the ports 80, 443, 2047, and 2048 should be open.
Someone sent me a grabify link on discord. Now they told me they know my IP address, the device's name that I am using, my location and IP address. I am wondering how much else do they know? Should I be worried? What should I do now?
Essentially they send you a tracking link and they know from which IP address this linked was accessed. They then can match this IP address to your ISP, and might infer a more or less precise location depending on how your ISP assigns IP addresses. This is the kind of information which are visible by any website your visit, i.e. these are not actually secret private information. While the attacker could for example try to DDoS you it is likely more to just scare you in this case. Don't be scared.
I've tried myself and for example the location is way off (another town) and the claimed device name is actually only its IP address again. Not actually impressive and nothing to worry about. Depending on the capabilities of your device this might also include the battery level etc. Again, these information are not really secret but might be used to scare you since you don't expect the "attacker" to know this and wonder what else they know. Best check yourself.
People with print disabilities may request braille, large print, or screen-reader friendly versions of this article via the email form at fcc...@fcc.gov. For audio and other access, use the "Explore Accessibility Options" link.
Did this post help you? If so, give it a Like below to let us know.
Need help with something else? Ask me a question!
Find Tips & Tricks Discover more ways to use Dropbox here!
Interested in Community Groups? Click here to join!
Did this post not resolve your issue? If so please give us some more information so we can try and help - please remember we cannot see over your shoulder so be as descriptive as possible!
Hi there, To check if there are recent updates on your ticket, you can click on this link below to route you to Support Tickets page and you can check if there is a recent communication regarding your issue. Hope this helps
hi, in the link you shared i see no track record of the ticket. it brings me to the general support page. can you please explain exactly where and how i can access the records on the support ticket?
or can you copy paste here the resolution for on it? thank you
So I was on twitter on my iPhone 7 Plus and came across this link. Judging by the look of the account it was posting links to adult sites but in a different language. As I was scrolling through Twitter I pressed the link by accident and instantly pressed done before it fully loaded.
It is not possible for malware or spyware to be installed on your phone if it is at the current version, 11.2.6, and you have not hacked or jailbroken your phone. Even if it is not fully up to date the probability of it being hacked is pretty close to zero.
The one thing to watch out for is a website that wants to install something (a profile) on your phone. You would be prompted by iOS to approve installing it, so it can't happen without your knowledge. If you have any doubts at all go to Settings/General and scroll to the bottom. Look in the space between VPN and Regulatory. If there is nothing there then nothing risky has been installed on your phone (It would be called Device Management or Profiles).
If your phone is fully patched (has all the current updates) there shouldn't be a problem.
The only way you can be "hacked remotely" via a website (without downloading or installing anything) is for the attacker to have some fancy exploit for your browser. As far as I know there isn't a current exploit for Safari available, and the changes for someone using an 0day on malvertising websites is quite low.
That depends on where your pictures were stored. If you open the Settings app, then tap on your name, then iCloud, if "Photos" is turned on then all of your photos are safe in iCloud. They will resync automatically.
Is it possible to unlink a hackers Steam account from my EA Play account and instead link my real Steam account? My Origin was hacked some time ago, but I only now noticed that they also linked their Steam account to my EA Play account. I wanted to link my Steam to Origin to play Battlefields open beta, but when I used my e-mail and password it said the account cant be linked because my EA Account has previously been linked to my hackers Steam account. Under my EA Account > Connections no link is shown so perhaps the link between my EA Account and their Steam has already been deleted, but still, an EA Account can only be connected to Steam once in its lifetime. I hope its still somehow possible, though.
d3342ee215