Announcement

Collapse
No announcement yet.

Schlage door lock hacked

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    Schlage door lock hacked

    Just took possession of new house in Dallas Tx, I had a lock Smith re-key all the doors all mechanical locks & dead bolts.

    i asked about his experience with the Schlage locks in the Dallas area. To my surprise he had just left a house with Schlage locks that had been hacked and entered. He shared his job was to disabled the wireless capabilities. He great things to say about the non blue tooth , non zwave and non WiFi in version

    before I go and purchase several new Schlage wireless locks wanted to get some feedback and conversation on what we know about the new locks hack ability .

    Devoir

    #2
    There were some articles years ago about some Z-Wave locks that while capable of being included secure (S0) would default to non-secure.

    And other articles displaying a vulnerability where if a hacker was present and listening at the moment of inclusion, they could shoe-horn themselves into the network.

    Both of those were in reference to the older security model, now referred to as S0, which was replaced by S2.

    If the device has correct S2 security support, uses the correct S2 security class (access control), and is included securely using the DSK, then you should be fine.

    If you need to be certain of what a certain locks supports, check the z-wave alliance catalogue. Manufacturers product pages may screw you around and hide the information you need, the catalogue will show you supported security and command classes in a standard format.

    Or alternatively, drop the battery powered lock completely and go for a hardwired electric strike set into the door frame, paired with an externally mounted keypad. More work to install, but this setup has been thoroughly battle tested in commercial spaces for decades.

    Comment


      #3
      That's the first time I've heard one of these getting hacked. Did he say how it was hacked? I know there are reports of users asking Alexa to open the doors from outside the home and that hack worked. I can tell you this. It's a ton easier to kick a door in than it is messing with hacking a lock so if someone wants in they'll get in.
      💁‍♂️ Support & Customer Service 🙋‍♂️ Sales Questions 🛒 Shop HomeSeer Products

      Comment


        #4
        Rupp,,

        he was pretty tight lipped about the details. I quizzed him several times. Not sure he wanted backlash from Schlage. I used RekeyDFW.com



        i agree it is easier to brake a window than hack a lock......

        duh caveman vs high school geek

        Comment


          #5
          I'd be really suspicious about that report also. White-Hat hackers have broken into pretty much all of the various protocols at one point or the other, but you're talking about a bunch of REALLY smart people doing it as an intellectual exercise. The type of people doing residential burglaries aren't that smart. And even if they were, it's not cost effective when all they need to get in is a sledgehammer or a couple of heavy kicks. More likely, the homeowner did something stupid like not changing the default code. Or he just didn't lock the door. "I got hacked" is the burglary version of "My brakes failed" for a rear-end auto collision.
          My system is described in my profile.

          Comment


            #6
            It also could have been something completely unrelated to the lock. The homeowner could have not secured his WiFi network, allowing someone to connect into it. The "hacker" then could have loaded up the Homeseer web page and do whatever he wanted, or do it some other way. I too am very suspicious of what we are not being told.

            I feel very comfortable with my combo locks, including knowing that there is less chance of me forgetting my keys and getting locked out.

            Comment


              #7
              Rupp Alexa doesn't unlock the door for me. I think Amazon changed their API some time ago..
              HS3PRO 3.0.0.500 as a Fire Daemon service, Windows 2016 Server Std Intel Core i5 PC HTPC Slim SFF 4GB, 120GB SSD drive, WLG800, RFXCom, TI103,NetCam, UltraNetcam3, BLBackup, CurrentCost 3P Rain8Net, MCsSprinker, HSTouch, Ademco Security plugin/AD2USB, JowiHue, various Oregon Scientific temp/humidity sensors, Z-Net, Zsmoke, Aeron Labs micro switches, Amazon Echo Dots, WS+, WD+ ... on and on.

              Comment

              Working...
              X