{"id":23948,"date":"2025-03-26T19:22:58","date_gmt":"2025-03-26T15:22:58","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=23948"},"modified":"2025-03-26T19:22:58","modified_gmt":"2025-03-26T15:22:58","slug":"how-to-hack-a-smart-mattress","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/how-to-hack-a-smart-mattress\/23948\/","title":{"rendered":"Three ways to hack\u2026 a mattress!"},"content":{"rendered":"<p>For a while after we wrote about <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-hack-bicycles-shimano-di2-wireless-shifting-technology\/52026\/\" target=\"_blank\" rel=\"noopener nofollow\">hacking a bicycle<\/a>, it seemed it couldn\u2019t be beat as the most unlikely hack target ever. However, developers\u2019 imagination seems to know no bounds \u2014 and hackers aren\u2019t far behind in their ingenuity\u2026<\/p>\n<p>And so, here\u2019s introducing the internet-connected mattress system \u2014 or \u201cPod\u201d as it\u2019s called \u2014 made by the company Eight Sleep, along with several ways it can be hacked as <a href=\"https:\/\/trufflesecurity.com\/blog\/removing-jeff-bezos-from-my-bed\" target=\"_blank\" rel=\"nofollow noopener\">discovered<\/a> by security researcher Dylan Ayrey.<\/p>\n<h2>Smart mattress Pod? What\u2019s that?<\/h2>\n<p>Perhaps we should start by explaining what an Eight Sleep Pod is and why someone might want to buy this futuristic piece of tech. The Eight Sleep designers position their product as an \u201cIntelligent Bed Cooling System\u201d. The primary target audience is people with various sleep problems: insomnia, poor sleep quality, snoring, and similar issues that can significantly impact quality of life.<\/p>\n<p>The Pod is made up of a sheet-like \u201chigh-tech layer\u201d (\u201cCover\u201d), and an external unit (\u201cHub\u201d); optionally there\u2019s also a motorized \u201cBase\u201d. It allows users to adjust the temperature of the bed \u2014 heating it up or cooling it down as instructed by the owner. It can do it automatically too \u2014 more on this later. There\u2019s a network of tubes with water circulating through them built into it. The external unit connected to this system handles the heating and cooling. The Eight Sleep Pod is divided into two independent zones of a double-bed \u2014 each with its own settings. The temperature range is fairly broad: from 12 to 43\u00b0C.<\/p>\n<div id=\"attachment_53228\" style=\"width: 3090px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26190415\/how-to-hack-a-smart-mattress-1.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53228\" class=\"size-full wp-image-53228\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26190415\/how-to-hack-a-smart-mattress-1.jpeg\" alt=\"Eight Sleep Pod 4 Ultra smart mattress \" width=\"3080\" height=\"2000\"><\/a><p id=\"caption-attachment-53228\" class=\"wp-caption-text\">At $4699, the Eight Sleep Pod\u00a04 Ultra package is the most expensive version of the system made by the company <a href=\"https:\/\/www.eightsleep.com\/product\/pod-cover\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>But wait: there\u2019s more to it! The Pod has several dozen \u201cclinical-grade sensors\u201d that track users\u2019 sleep quality. It also has vibration motors to wake you up, and sensors for ambient temperature and humidity. The ultimate version \u2014 the Pod\u00a04 Ultra \u2014 comes with a transformable, electronically-controlled bed base.<\/p>\n<p>It goes without saying that the system connects to the internet. It does this via a Wi-Fi receiver in the Hub. Eight Sleep Pods are configured and controlled almost exclusively via an app. We say \u201calmost\u201d, because the latest (and most expensive) generation \u2014 Pod\u00a04 \u2014 has pressure-sensitive areas on the sides that you can tap to control certain functions.<\/p>\n<h2>Autopilot and sleep by subscription<\/h2>\n<p>The main software component of an Eight Sleep Pod is the \u201cAutopilot\u201d system, which uses sensors built into the Cover to collect lots of statistics about the quality and quantity of users\u2019 sleep, and generate detailed reports for them. In addition, Autopilot has a number of other interesting options. For example, the system can detect when the user starts snoring and change the geometry of the Base to fix the problem.<\/p>\n<div id=\"attachment_53231\" style=\"width: 2346px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26190444\/how-to-hack-a-smart-mattress-2.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53231\" class=\"size-full wp-image-53231\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26190444\/how-to-hack-a-smart-mattress-2.jpeg\" alt=\"Eight Sleep Autopilot combats snoring \" width=\"2336\" height=\"1216\"><\/a><p id=\"caption-attachment-53231\" class=\"wp-caption-text\">Autopilot uses vibration sensors to track snoring, and combats it by adjusting the geometry of the bed base <a href=\"https:\/\/www.eightsleep.com\/pod-cover\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The Pod also has a physical alarm clock that wakes the user by changing the temperature of the bed and turning on vibration. However, the key Autopilot feature (and the one Eight Sleep touts the most) is, well, autopilot mode. What this does is continuously monitor the users\u2019 sleep quality \u2014 automatically adjusting the temperature to ensure the deepest and most comfortable sleep possible.<\/p>\n<p>In case you thought this was an Eight Sleep Pod ad, let\u2019s look at this product\u2019s numerous flaws\u2026<\/p>\n<p>To start with, these things are eye-wateringly expensive: retail prices start at $3000, and the top-of-the-line Pod\u00a04 Ultra costs a whopping $4700.<\/p>\n<div id=\"attachment_53229\" style=\"width: 2715px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26190556\/how-to-hack-a-smart-mattress-3.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53229\" class=\"size-full wp-image-53229\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26190556\/how-to-hack-a-smart-mattress-3.jpeg\" alt=\"Eight Sleep Autopilot only works with a subscription\" width=\"2705\" height=\"2000\"><\/a><p id=\"caption-attachment-53229\" class=\"wp-caption-text\">An Autopilot subscription would set you back at least $200 per year \u2014 without it, the most exciting features simply won\u2019t work <a href=\"https:\/\/www.eightsleep.com\/product\/pod-cover\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>But the outlay doesn\u2019t end there: the user will almost certainly have to pay for a subscription that costs between $200 and $300 per year. In theory, you could choose not to pay it, but without the subscription most of the smart features remain inactive.<\/p>\n<p>Also, like any modern tech company, Eight Sleep constantly collects data about its users. CEO Matteo Franceschetti talks quite openly about this on X:<\/p>\n<div id=\"attachment_53230\" style=\"width: 1020px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26190619\/how-to-hack-a-smart-mattress-4.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53230\" class=\"size-full wp-image-53230\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26190619\/how-to-hack-a-smart-mattress-4.jpeg\" alt=\"Eight Sleep collects user data \" width=\"1010\" height=\"1216\"><\/a><p id=\"caption-attachment-53230\" class=\"wp-caption-text\">Eight Sleep has accumulated data on almost a billion hours of their users\u2019 sleep <a href=\"https:\/\/x.com\/m_franceschetti\/status\/1886850192957227231\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<h2>Smart mattress hack No. 1: developer backdoor<\/h2>\n<p>Now let\u2019s shift the focus to why this post was written: hacking this smart-mattress system. Dylan Ayrey, a security researcher, decided to look into Eight Sleep\u2019s security \u2014 simply out of curiosity, he said, as Dylan is the happy owner of an Eight Sleep Pod, which helps him with his insomnia.<\/p>\n<p>You might remember Dylan for his other notable investigations, such as the possibility of using <a href=\"https:\/\/www.kaspersky.com\/blog\/vulnerability-in-google-oauth\/50286\/\" target=\"_blank\" rel=\"noopener nofollow\">phantom corporate accounts<\/a> uncontrollable by workspace admins, or <a href=\"https:\/\/www.kaspersky.com\/blog\/google-oauth-abandoned-domains-attack\/53104\/\" target=\"_blank\" rel=\"noopener nofollow\">attacking Google OAuth via abandoned domains<\/a>.<\/p>\n<p>To begin analyzing the Pod\u2019s security, Ayrey needed a copy of its firmware. Security-conscious vendors don\u2019t just give their firmware away, so trying to find a copy often becomes a quest unto itself. Not so with Eight Sleep. The update server lets anyone who follows the link download the firmware for any of the company\u2019s Pod models, no questions asked.<\/p>\n<p>While examining the code, Dylan found a number of noteworthy things, including an API for remote connection via SSH. Given that an Eight Sleep Pod is essentially a computer running Linux (as many other modern devices are), a connection like this allows running arbitrary code remotely on the mattress pad Hub.<\/p>\n<div id=\"attachment_53225\" style=\"width: 1356px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26190956\/how-to-hack-a-smart-mattress-5.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53225\" class=\"size-full wp-image-53225\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26190956\/how-to-hack-a-smart-mattress-5.jpeg\" alt=\"Remote access API in the Eight Sleep Pod firmware \" width=\"1346\" height=\"484\"><\/a><p id=\"caption-attachment-53225\" class=\"wp-caption-text\">The Eight Sleep Pod firmware was found to contain an API for remote access to the smart mattress <a href=\"https:\/\/trufflesecurity.com\/blog\/removing-jeff-bezos-from-my-bed\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Judging by the email address associated with the SSH public key found in the firmware code, all (or at least many) Eight Sleep engineers could have remote access to any Pod.<\/p>\n<div id=\"attachment_53226\" style=\"width: 1354px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26191018\/how-to-hack-a-smart-mattress-6.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53226\" class=\"size-full wp-image-53226\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26191018\/how-to-hack-a-smart-mattress-6.jpeg\" alt=\"SSH public key and associated email address \" width=\"1344\" height=\"296\"><\/a><p id=\"caption-attachment-53226\" class=\"wp-caption-text\">Judging by the email address associated with the SSH public key, every Eight Sleep engineer has remote access to any Pod <a href=\"https:\/\/trufflesecurity.com\/blog\/removing-jeff-bezos-from-my-bed\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>One could use an SSH connection like this to spy on the Pod\u2019s owner \u2014 to find out when they\u2019re sleeping or when they spend the night away from home. It would even be possible to check if there\u2019s one person in bed or two. Having this type of control could also let someone play pranks on the owner by changing the temperature of the Pod, turning the alarm clock on or off, adjusting the geometry of the bed base, and so on.<\/p>\n<p>Nothing like that seems to have happened to Eight Sleep Pod owners yet, but something like it could; theoretical possibilities like this sometimes do materialize. This is what recently happened with Ecovacs robot vacuums: pranksters used vulnerabilities in these devices to <a href=\"https:\/\/www.kaspersky.com\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/52837\/\" target=\"_blank\" rel=\"noopener nofollow\">harass their owners<\/a>.<\/p>\n<h2>Smart mattress hack No. 2: an AWS key in the firmware<\/h2>\n<p>While still looking at the Eight Sleep Pod firmware, Dylan discovered a valid AWS (Amazon Web Services) key in its code \u2014 used to continuously upload telemetry to the cloud. Again this is only theoretical, but if the key fell into the wrong hands it could lead to serious violations of user privacy.<\/p>\n<div id=\"attachment_53223\" style=\"width: 1244px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26191052\/how-to-hack-a-smart-mattress-7.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53223\" class=\"size-full wp-image-53223\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26191052\/how-to-hack-a-smart-mattress-7.jpeg\" alt=\"AWS key in the firmware of the Eight Sleep smart mattress \" width=\"1234\" height=\"480\"><\/a><p id=\"caption-attachment-53223\" class=\"wp-caption-text\">(Not the) best practices for programming smart devices: hardcoded AWS key in the firmware accessible to anyone <a href=\"https:\/\/trufflesecurity.com\/blog\/removing-jeff-bezos-from-my-bed\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>For better or for worse, the full truth about the presence of an Amazon key won\u2019t come out. Dylan notified Eight Sleep, and by the time his research was published the key had already been revoked. However, the mere presence of the key within the firmware, where it was accessible to anyone, was clear evidence that user security and privacy were taken lightly.<\/p>\n<p>Dylan further adds that the key could have, at the very least, been used to cause financial damage to the company by sending a large number of meaningless requests to the AWS cloud.<\/p>\n<h2>Smart mattress hack No. 3: jailbreaking with the help of an aquarium chiller<\/h2>\n<p>Clearly inspired by his earlier findings, Dylan decided to attempt jailbreaking the Pod \u2014 that is, detaching it from Eight Sleep\u2019s cloud services. Dylan took a drastic approach: he disconnected the external unit (with all its smart electronics and internet connectivity).<\/p>\n<div id=\"attachment_53227\" style=\"width: 1610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26191117\/how-to-hack-a-smart-mattress-8.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53227\" class=\"size-full wp-image-53227\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/03\/26191117\/how-to-hack-a-smart-mattress-8.jpeg\" alt=\"Physical hack of the Eight Sleep smart mattress achieved with an aquarium chiller \" width=\"1600\" height=\"738\"><\/a><p id=\"caption-attachment-53227\" class=\"wp-caption-text\">Detaching an Eight Sleep smart mattress from the cloud using a $150 aquarium chiller <a href=\"https:\/\/trufflesecurity.com\/blog\/removing-jeff-bezos-from-my-bed\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Dylan replaced the Eight Sleep Hub with\u2026 a common aquarium chiller. This system, in contrast, doesn\u2019t require an app or a subscription fee, collects no user data, comes without any backdoors, and runs perfectly well without an internet connection. What it <em>does<\/em> do is effectively adjust the temperature of your bed, and, just as importantly, it costs only $150.<\/p>\n<p>For those who prefer a less radical approach to the issue of Eight Sleep products being tied to the vendor cloud, <a href=\"https:\/\/github.com\/throwaway31265\/free-sleep\" target=\"_blank\" rel=\"nofollow noopener\">Free Sleep<\/a> offers a solution. This is an open-source software suite that allows you to take control of your smart mattress.<\/p>\n<blockquote><p>Want to know what other unexpected devices have been successfully hacked? Here you go!\u2026<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/train-hack-37c3-talk\/50321\/\" target=\"_blank\" rel=\"noopener nofollow\">Hacking a train<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/black-hat-2021-hacking-capsule-hotel\/41160\/\" target=\"_blank\" rel=\"noopener nofollow\">Hacking a capsule hotel<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/pet-feeders-vulnerabilities\/48461\/\" target=\"_blank\" rel=\"noopener nofollow\">Hole in the bowl: smart pet feeder springs a leak<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/robot-toy-security-issue\/50630\/\" target=\"_blank\" rel=\"noopener nofollow\">Vulnerabilities in a toy robot permitting snooping. Seriously<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/hacking-things\/27431\/\" target=\"_blank\" rel=\"noopener nofollow\">Hacking our boss\u2019s smart home<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/insecure-vibrator\/12777\/\" target=\"_blank\" rel=\"noopener nofollow\">Vibrators hacked<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ip-cameras-unsecurity-eufy\/46574\/\" target=\"_blank\" rel=\"noopener nofollow\">IP camera security: the bad, the ugly, and the evil<\/a><\/li>\n<li>\u2026and <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/hack\/\" target=\"_blank\" rel=\"noopener nofollow\">many others<\/a>!<\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>A security researcher has investigated his own smart mattress cover, discovering several ways to hack it \u2014 including through a backdoor preinstalled by the developer.<\/p>\n","protected":false},"author":2726,"featured_media":23950,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1226,1486],"tags":[111,1520,2817,82,628,765,97,738,321,521,783,268],"class_list":{"0":"post-23948","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"category-threats","9":"tag-attacks","10":"tag-backdoors","11":"tag-data-collection","12":"tag-hacking","13":"tag-internet-of-things","14":"tag-iot","15":"tag-security-2","16":"tag-surveillance","17":"tag-technology","18":"tag-threats","19":"tag-tracking","20":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-to-hack-a-smart-mattress\/23948\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-hack-a-smart-mattress\/28709\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-hack-a-smart-mattress\/28826\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-to-hack-a-smart-mattress\/39285\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-to-hack-a-smart-mattress\/53232\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-to-hack-a-smart-mattress\/28981\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-to-hack-a-smart-mattress\/34773\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-to-hack-a-smart-mattress\/34405\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/internet-of-things\/","name":"Internet of things"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=23948"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23948\/revisions"}],"predecessor-version":[{"id":23951,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23948\/revisions\/23951"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/23950"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=23948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=23948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=23948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}