Chromecast hack promoting PewDiePie reveals security bug

3 Jan 20191.42k Views

Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Pin on PinterestShare on RedditEmail this to someone

A Chromecast device. Image: Fruehauf/Depositphotos

Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Pin on PinterestShare on RedditEmail this to someone

Hackers have hijacked thousands of Chromecasts, smart TVs and Google Home devices using incorrectly configured routers.

Two hackers have taken advantage of a router setting that makes smart devices such as the Google Chromecast publicly visible on the internet.

Using the misconfigured settings, TheHackerGiraffe and j3ws3r claim to have forced devices to display a message promoting controversial YouTube star Felix Kjellberg, also known as PewDiePie.

A statement from the perpetrators

The two hackers responsible said: “We want to help you, and also our favourite YouTubers (mostly PewDiePie).” They continued: “We’re only trying to protect you and inform you of this [vulnerability] before someone takes real advantage of it.”

According to TheHackerGiraffe, the attack does not gather or save any information from the affected devices, it simply renames the devices and forces them to play their promotional YouTube video.

The takeover of thousands of devices was made possible using Shodan, a search engine specifically for connected devices.

Last year, TheHackerGiraffe successfully took over tens of thousands of printers, making them print a similar message telling affected users to subscribe to PewDiePie’s channel.

How to protect your devices

The attack is being referred to as CastHack and both Google itself and TheHackerGiraffe said that users should turn off Universal Plug and Play (UPnP) on their routers. Users can also ensure that UPnP does not forward network traffic to ports 8008, 8009 and 8443.

“We have received reports from users who have had an unauthorised video played on their TVs via a Chromecast device,” a Google spokesperson said. “This is not an issue with Chromecast specifically, but is rather the result of router settings that make smart devices, including Chromecast, publicly reachable,” the spokesperson added.

According to TechRadar, in 2014 security company Bishop Fox found it was able to gain control of a Chromecast by disconnecting it from its current Wi-Fi network and reverting it to a factory state, which is known as a ‘deauth attack’. In 2016, Pen Test Partners discovered the Chromecast was still at risk from these types of attacks.

Speaking to TechCrunch, founder of Pen Test Partners, Ken Munro, said that these types of vulnerabilities could be exploited in more malicious ways. Google said it is working on a fix for the Chromecast ‘deauth’ bug.

A Chromecast device. Image: Fruehauf/Depositphotos

Ellen Tannam is a writer covering all manner of business and tech subjects

editorial@siliconrepublic.com