The Register

Researcher who found McDonald’s free-food hack turns her attention to Chinese restaurant robots

A researcher caught the world’s leading supplier of commercial service robots using shoddy admin security that let attackers redirect the delivery machines to anywhere and make them follow any command.

Pudu Robotics is a Chinese robot manufacturer with over 100,000 units in over 1,000 cities doing everything from serving meals with the cat-like BellaBot, to using its mechanical-armed FlashBot to operate human-designed systems like elevators, as you can see below.

Youtube Video

According to analysts Frost and Sullivan, last year it captured 23 percent of the market for such kit, but a hacker has found that the backend software systems controlling them are vulnerable to abuse.

White-hat hacker Bobdahacker, who exposed the free-food flaw in McDonald’s ordering system earlier this month, has been digging into Pudu and found she could exploit the control software behind the robots because administrators hadn’t locked down access. To do so, an attacker must have a valid auth token, which can be snaffled using a cross-site scripting intrusion, or someone could just set up an account to try before you buy a robot, she told The Register.

With this level of access, an attacker could redirect food orders or shut down the entire fleet of restaurant robots in a DDoS food attack. Crims could also make FlashBot foul office systems up or steal intellectual property.

Once she got past the initial authentication test, Bobdahacker found there were no extra security checks, enabling anyone to reset orders, move the robots to new locations, and rename them to make recovery that much harder. But when she alerted the business about the issue, she was stonewalled until she started contacting their customers.

On August 12, she contacted Pudu about the issue, but the company’s tech, support, and sales teams all blanked the warning. By August 21, she’d been reduced to emailing over 50 company staffers to try and get someone to take notice.

It was only when she started contacting Pudu’s restaurant customers that Bobdahacker got a call back. Japanese restaurant group Skylark Holdings, which has over 7,000 restaurants, and Zensho, a food chain, both took the warnings seriously.

About 48 hours after Bobdahacker contacted these customers, Pudu replied with an email that looked like it was written by ChatGPT. “They couldn’t even be bothered to replace the ‘[Your Email Address]’ placeholder from their ChatGPT template. Peak effort right there,” she said in her report.

“On behalf of Pudu Robotics, I would like to extend our sincere gratitude for taking the time to report the security vulnerability to us. We highly appreciate your efforts in following responsible disclosure practices,” the message read.

“Thank you for your valuable contribution to our security. If you have any further details or questions, please do not hesitate to reach out to me directly at [Your Email Address].”

On the bright side, Pudu locked down its systems and eliminated the security hole. It just goes to show that sometimes the best pressure you can put on a manufacturer to fix their problems comes from following the money and alerting customers.

Pudu had no comment at press time. ®

READ MORE HERE