• Attack of the AI lawnmowers? Yarbo forced to patch products after

    From TechnologyDaily@1337:1/100 to All on Friday, May 15, 2026 23:30:25
    Attack of the AI lawnmowers? Yarbo forced to patch products after experts reveal method to remotely hijack thousands of devices

    Date:
    Fri, 15 May 2026 22:20:00 +0000

    Description:
    A cybersecurity flaw in Yarbo robotic mowers exposed thousands of internet-connected devices to spying, hijacking, infrastructure, and surveillance risks.

    FULL STORY ======================================================================Copy link Facebook X Whatsapp Reddit Pinterest Flipboard Threads Email Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Newsletter Subscribe to our newsletter Thousands of Yarbo lawnmowers exposed identical passwords across homes worldwide Researchers remotely hijacked a 200-pound mower outside a family residence GPS locations and WiFi passwords leaked from vulnerable robotic lawnmowers Security researcher Andreas Makris has uncovered a serious flaw in the Yarbo robotic lawnmowers that allowed remote access using identical default administrator credentials across thousands of units.

    These autonomous machines, equipped with cameras, GPS, and AI mapping,
    operate worldwide in over 30 countries without constant human oversight. Makris demonstrated the vulnerability by accessing owner email addresses, Wi-Fi passwords, exact GPS locations, and plotted a live map showing more
    than 11,000 devices globally. Latest Videos From You may like Tinkerer accidentally gets access to thousands of DJI Romo robot vacuums A simple hack gives a DJI Romo owner access to a global army of robovacs The FBI just remotely reset thousands of home and small office routers Linux Devices waiting to be weaponised Yarbo mowers run on Linux systems connected to the internet, functioning much like exposed computers.

    Hackers could theoretically activate blades remotely, scan nearby networks,
    or assemble the devices into a botnet for larger attacks.

    Makris noted that units operating near critical sites, such as a major power plant, amplifies potential risks to infrastructure.

    The danger of this vulnerability was showcased during a live test for The Verge, seizing control of a 200-pound mower operating outside a family home
    in upstate New York. Are you a pro? Subscribe to our newsletter Sign up to
    the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed! Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners
    or sponsors By submitting your information you agree to the Terms &
    Conditions and Privacy Policy and are aged 16 or over.

    The robots camera turns to reflect each of those moves, the report noted, warning: Theres little to keep him from driving anywhere he likes, spying on this family.

    Reporter Sean Hollister lay in the mower's path from Germany, roughly 6,000 miles away, to test Yarbo's prior security claims.

    The experiment exposed how easily an outsider could command the device, overriding local controls without detection. What to read next Weak
    safeguards leave thousands of AI agents open to attack Honeywell CCTV cameras vulnerable to hijacking which allows hackers to crack passwords easily
    Russian hacker uses multiple AI tools to break hundreds of firewalls

    Unfortunately, regular firmware updates failed to resolve the core issue, as they reportedly reset devices to the same weak default passwords.

    Simple password changes alone cannot address the deeper architectural
    problems in these networked robots. Made in China, headquartered in New York Yarbo operates publicly from Ronkonkoma, New York, but traces back to Hanyang Tech in Shenzhen, China, a dual identity which has sparked scrutiny amid the security lapse affecting devices sold internationally.

    The revelation prompted Makris to release his findings, including official
    CVE disclosures, before Yarbo fully patched the issues.

    Critics question whether geographic ties influence the persistence of manufacturer access features in consumer hardware.

    Yarbo co-founder Kenneth Kohlmann acknowledged the flaws in a statement accessible mainly via VPN outside the US.

    The company disabled remote diagnostic tunnels, reset root passwords, and restricted unauthenticated entry points.

    They also shifted from shared passwords to device-specific credentials and promised an allowlist-based diagnostic model with audits.

    However, neither Makris nor Hollister found these measures convincing. The company stopped short of removing manufacturer remote access entirely,
    instead promising tighter controls and audit logging.

    It controversially retains an internal backdoor, Hollister said in an assessment of the measures taken so far.

    That decision has fuelled wider concerns about smart devices with persistent backdoorstyle access whose manufacturer has refused to close hidden access points.

    Via Cybernews Follow TechRadar on Google News and add us as a preferred
    source to get our expert news, reviews, and opinion in your feeds.



    ======================================================================
    Link to news story: https://www.techradar.com/pro/security/attack-of-the-ai-lawnmowers-yarbo-force d-to-patch-products-after-experts-reveal-method-to-remotely-hijack-thousands-o f-devices


    --- Mystic BBS v1.12 A49 (Linux/64)
    * Origin: tqwNet Technology News (1337:1/100)