How Barbie Brought Attention to Securing the Internet of Things

Hello Barbie, the new interactive doll from Mattel, has some security flaws. As the Internet of Things becomes a reality, manufacturers must make security a priority.

Every holiday season, Barbie dolls become a fascination for children everywhere. Making its debut in March 1959, Barbie is the single most successful doll ever produced. She’s run for president six times since 1992, traveled to space in 1965, and is sold in 150 countries around the globe. And in 2015, Barbie got connected.


In March, Mattel released the Hello Barbie doll to the delight of children and hackers everywhere. The doll is capable of engaging in two-way conversation over a WiFi network (and companion app), with up to 8,000 lines of dialog to choose from. Children can ask Barbie questions, participate in co-created stories, and engage in conversations on a wide variety of topics. And since it can connect to the Internet, it has become a target for hackers.

As Mattel describes the toy:

“Now, you can chat with Barbie! Using WiFi and speech recognition technology, Hello Barbie doll can interact uniquely with each child by holding conversations, playing games, sharing stories, and even telling jokes! It's a whole new way to interact with Barbie. She's ready to discuss anything in an outfit that blends trendy and techie for a cool look. Use is simple after setup — push the doll's belt buckle to start a conversation, and release to hear her respond. More than 8,000 lines of recorded content means countless hours of fun! Just like a real friend, Hello Barbie doll listens and remembers the user's likes and dislikes, giving everyone their own unique experience.”

Much like Siri, Cortana, or Google Now, the new doll gives children an interactive experience. But, according to privacy advocates, the focus on conversing specifically with children worries many. “This is really about Mattel eavesdropping on a child's heart and soul — and the most intimate things about their lives," Susan Linn, executive director of the Campaign for a Commercial-Free Childhood, told NPR in October.

While I’m not sure the technology is that different from other personal digital assistants, certainly marketing its benefits to children is disconcerting. In a recent online review of the doll, Barbie is seen asking a number of questions of the user, leading them through a series of interactive stories, and imparts general knowledge when you ask her. Interesting, but in each of the interactions, it is readily apparent that large amounts of information are gathered by Barbie as she speaks with the user. For example, Barbie at one point in the video asks, “You know what I want to talk about? Family! Do you have any sisters?”

Not surprisingly, researchers have discovered security weaknesses in the doll that can enable easy access to system information, Barbie’s microphone, and stored audio files. Security researcher Matt Jakubowski told NBC, “You can take that information and find out a person’s house or business. It’s just a matter of time until we are able to replace their servers with ours and have her say anything we want.”

Additionally, in early December, Bluebox Security released a report on the doll and the accompanying mobile application (developed by Mattel and ToyTalk). What they found was disturbing:

“We discovered several issues with the Hello Barbie app including: 

  • It utilizes an authentication credential that can be re-used by attackers.
  • It connects a mobile device to any unsecured WiFi network if it has “Barbie” in the name.
  • It shipped with unused code that serves no function, but increases the overall attack surface.
  • On the server side, we also discovered: 

  • Client certificate authentication credentials can be used outside of the app by attackers to probe any of the Hello Barbie cloud servers.
  • The ToyTalk server domain was on a cloud infrastructure susceptible to the POODLE attack.”
  • Bluebox disclosed the most critical security weaknesses to ToyTalk prior to its public release and ToyTalk promptly resolved a number of them.

    Many parents, however, still have decided to buy the doll. “I was so stressed getting this for my little girl BUT she has not put it down! The adventures and general knowledge is incredible. ... I read all the hacking stuff but I'm sorry if big brother was going to spy he's already doing it through your smart phone,” one reviewer on Amazon argues. “This is a great toy that sparks imagination my daughter is jumping around like a frog on a trip with Barbie great toy thanks for making our Christmas magic.”

    What the very public release of the security weaknesses of Hello Barbie indicate is as the Internet of Things becomes a reality, manufacturers must make security a priority. We cannot afford not to.

    LinkedIn meets Tinder in this mindful networking app

    Swipe right to make the connections that could change your career.

    Getty Images
    Sponsored
    Swipe right. Match. Meet over coffee or set up a call.

    No, we aren't talking about Tinder. Introducing Shapr, a free app that helps people with synergistic professional goals and skill sets easily meet and collaborate.

    Keep reading Show less

    Think you’re bad at math? You may suffer from ‘math trauma’

    Even some teachers suffer from anxiety about math.

    Image credit: Getty Images
    Mind & Brain

    I teach people how to teach math, and I've been working in this field for 30 years. Across those decades, I've met many people who suffer from varying degrees of math trauma – a form of debilitating mental shutdown when it comes to doing mathematics.

    Keep reading Show less

    A world map of Virgin Mary apparitions

    She met mere mortals with and without the Vatican's approval.

    Strange Maps
    • For centuries, the Virgin Mary has appeared to the faithful, requesting devotion and promising comfort.
    • These maps show the geography of Marian apparitions – the handful approved by the Vatican, and many others.
    • Historically, Europe is where most apparitions have been reported, but the U.S. is pretty fertile ground too.
    Keep reading Show less

    How KGB founder Iron Felix justified terror and mass executions

    The legacy of Felix Dzerzhinsky, who led Soviet secret police in the "Red Terror," still confounds Russia.

    Getty Images
    Politics & Current Affairs
    • Felix Dzerzhinsky led the Cheka, Soviet Union's first secret police.
    • The Cheka was infamous for executing thousands during the Red Terror of 1918.
    • The Cheka later became the KGB, the spy organization where Russia's President Putin served for years.
    Keep reading Show less