TicTocTrack Smartwatch Flaws Can Be Abused to Track Kids | Threatpost

A popular smartwatch that allows parents to track their children’s whereabouts, TicTocTrack, has been discovered to be riddled with security issues that could allow hackers to track and call children.
Researchers at Pen Test Partners revealed vulnerabilities in the watch (sold in Australia) on Monday, which could enable hackers to track children’s location, spoof the child’s location or view personal data on the victims’ accounts. The parent company of the TicTocTrack watch, iStaySafe Pty Ltd., has temporarily restricted access to the watch’s service and app while it investigates further.
Researchers found that the service’s back end does not make any authorization attempt on any request – besides the user having a valid username and password combination.
That means that an attacker who is logged into the service could remotely compromise the app and track other accounts that are based in Australia.
“All in all we can see that the developer of the back end took no consideration into authorizing any of the requests, and cared only that the application was working effectively, leaving all the data available to access and manipulate,” Pen Test Partners researcher Vangelis Stykas said in a analysis . “This is unacceptable for a product that is supposed to keep children secure and a trend that we constantly see in the IoT market that products are rushed to the market.”
The TicTocTrack smartwatch is made by iStaySafe subsidiary Gator Group (which has had watch privacy issues before ). The smartwatch also comes with a complementary mobile app, developed by a company called Nibaya, that is available on Google Play and the Apple App Store.
iStaySafe did not return a request for comment from Threatpost by deadline.
The smartwatch, available in Australia for $149 (USD), is designed for children and uses GPS to track the movement of the wearer every six minutes, and offers voice calling and SMS features.
Tracking smartwatch coordinates
The smartwatch’s API can be attacked by changing the FamilyIdentifier number (which identifies the family that the user belongs to), which then could give a bad actor complete access to the user’s data – including the children’s location, parent’s full names, phone numbers and other personal identifiable information.
“Anyone could discover the location of children using the watch,” Stykas said. “Anyone could tamper with that position data, making you think your children were safe whilst they were actually elsewhere. Anyone could cause false alarms by moving the reported position of your child.”
Researchers with Pen Test Partners teamed up with security researcher Troy Hunt, who lives in Australia, to test the attack . With Hunt’s daughter wearing the device, Pen Test Partners researchers found that they were able to successfully both track and spoof her location– as well as contact her via a phone call, which purported to be from “dad” on the watch.
In this video below, Hunt shows how the smartwatch vulnerability could be exploited to call his daughter – and how her smartwatch would answer automatically without any interaction needed from her end:
The company said in its notice to customers that they will restrict all use access to the TicTocTrack application and service until they can confirm the validity of the flaws and fix them.
Smartwatches continue to be a cause for security concern – particularly ones targeted at tracking children. In January, researchers found an array of security issues in the Gator portfolio of watches from TechSixtyFour, and found flaws exposing sensitive data of 35,000 children. In February , the European Commission issued a recall for the Safe-KID-One, an IoT watch made by German company Enox Group, due to “serious” privacy issues. And, in November, The Misafes “Kids Watcher” GPS watch  was found to have vulnerabilities  that translate into a stalker or pedophile’s ideal toolset.
Don’t miss our free Threatpost webinar , “Data Security in the Cloud,” on April 24 at 2 p.m. ET.
A panel of experts will join Threatpost senior editor Tara Seals to discuss how to lock down data when the traditional network perimeter is no longer in place. They will discuss how the adoption of cloud services presents new security challenges, including ideas and best practices for locking down this new architecture; whether managed or in-house security is the way to go; and ancillary dimensions, like SD-WAN and IaaS.