• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Hackers Can Spy on Peloton Workouts

You are here: Home / General Cyber Security News / Hackers Can Spy on Peloton Workouts
June 17, 2021

Peloton bike people could be spied on when operating out, according to new research by McAfee’s Highly developed Menace Study staff.

The staff found out a vulnerability (CVE-2021-3387) in the touchscreen of the $2,495 Bike+ that will allow it to be managed remotely by a risk actor without the need of any interference to the equipment’s functioning system.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Hackers could exploit the flaw to put in destructive apps that spoof Netflix or Spotify to steal particular specifics and login qualifications. 

Researchers also found that the vulnerability allowed bad actors to access the Peloton bike’s microphone and digital camera to spy on people. 

McAfee reported that bikes utilized in lodges and other community areas have been most at risk for the reason that hackers had to physically accessibility the display and infect it with destructive code saved on a USB travel to exploit the flaw. 

The reduce-priced Peloton Bike is not influenced by the flaw as the physical fitness product employs a distinct sort of touchscreen. 

But scientists famous: “Further conversations with Peloton verified that this vulnerability is also present on Peloton Tread exercise equipment, on the other hand, the scope of our investigate was confined to the Bicycle+.”  

The flaw was detected in the Peloton bike’s software package. Soon after McAfee shared the discovery with Peloton, the two corporations joined forces to “responsibly produce and issue a patch.”

A mandatory software update that fixes the issue was launched to customers by Peloton previously this thirty day period. 

Adrian Stone, Peloton’s Head of Global Information Security, stated: “This vulnerability noted by McAfee would call for direct, bodily accessibility to a Peloton Bike+ or Tread. Like with any related machine in the home, if an attacker is able to obtain physical obtain to it, supplemental bodily controls and safeguards grow to be ever more essential. 

“To maintain our users secure, we acted immediately and in coordination with McAfee. We pushed a mandatory update in early June and each individual machine with the update installed is safeguarded from this issue.”

McAfee’s report is the 2nd security issue to strike Peloton in the past two months. In May, the organization unveiled an update to quit the leakage of personal account information and facts, which includes the age, weight and place of its buyers.


Some areas of this posting are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News LORCA Announces New Intensive Program for Most Promising Cyber Startups
Next Post: CVS Health Records for 1.1 Billion Customers Exposed cvs health records for 1.1 billion customers exposed»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.