Smart Japanese toilets are ‘vulnerable to hacking attacks’

In Other News - August 6th, 2013
Toilet vulnerable to hacking attacks

The Satis, a Japanese manufactured advanced toilet, controlled by a free app, is vulnerable to hacking attacks, security experts have warned.

The ¥50,000 (about $5,000) toilet, which automatically flushes itself, triggers the bidet, raises and lowers the toilet seat while its user barely lifts a finger, has a Bluetooth glitch where the functions could be accessed by anyone who has the downloadable app, IT security firm Trustwave said.

The toilet uses a bluetooth to receive instructions via the app, but the pin code for every model is hardcored to “0000” and the users can’t change this.

“An attacker could simply download the My Satis application and use it to cause the toilet to repeatedly flush, raising the water usage and therefore utility cost to its owner,” Trustwave said in a report.

“Attackers could also cause the unit to unexpectedly open/close the lid, activate bidet or air-dry functions, causing discomfort or distress to the user.”

That sounds rather uncomfortable – and intrusive – especially when you’re doing your private business.

Japanese firm Lixil told Consumerist that American consumers need not worry about hacked toilets.

“The Bluetooth technology is only available in Japan and does not apply to the INAX products sold in the USA,” a rep for Lixil said.

But why “attackers” would want to hack into someone else’s toilet is completely beyond anyone who’s only worry is that the toilet has a proper flush.

by Maesie Bertumen

Image: Matthew McVickar/Flickr