Toy Company VTech Left Millions of Parents, Children Vulnerable to Security Risk

By

A Chinese toy manufacturer’s loose security has led to a massive breach of user data for both children and parents. VTech’s lax security measures not only left about 5 million parents - but also more than 200,000 children’s personal data vulnerable.

When one hacker noticed those security oversights, they took advantage of the unprotected network. With a simple SQL Injection – one of the oldest, simplest hacking methods – that hacker accessed reams of user data. Thankfully, rather than selling the massive amount of information, the hacker contacted Motherboard writer Lorenzo Franceschi-Bicchiera, who broke this story.

The data breach gave the hacker almost unparalleled information. Parents’ email addresses and passwords, physical addresses, first and last names, login information, and IP addresses were all compromised. In addition, the hacker accessed security questions and answers of users, severely increasing the risk that other accounts could be hacked.

But the most haunting aspect of this breach, and the outlier from a security history standpoint, is the children’s data. The hacker accessed names, genders, and addresses of children, alongside headshots and voice recordings.

The children’s accounts were then easily matched to their parents’. That means almost 200,000 children could have irreplaceable data out in the ether. 

If this information had been previously accessed, or if other similar services are equally unprotected, then parents have a lot to worry about. The Internet is already a haven of untraceable illicit activity, the least dangerous of which is identity theft.

In addition, no other generation has had to deal with such severe security breaches at such a young age. If their information had been previously accessed, or if it’s somehow leaked further, then these children could grow into case studies of extended, unnoticed identity theft. 

VTech has been slow to respond to the controversy. Motherboard’s Lorenzo got redirected when bringing the data breach to the company’s attention and VTech is reportedly only grudgingly responding to the extended, serious backlash.

Security expert and advisor Troy Hunt has called for the site to go offline, even though the company claims to have bolstered security.

Today, the security community has again bashed VTech. In the wake of this most recent breach, slipstream/ROL – a popular, independent security researcher – found that VTech’s Android app is also poorly protected.

Readers with VTech accounts can learn if they’ve been hacked at this website




Edited by Stefania Viscusi
SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More