Substrate
technology

Security Researcher Demonstrates Remote Takeover of Yarbo Robot Lawn Mowers

Andreas Makris showed he could seize control of Yarbo's 200-pound robotic lawn mowers from nearly 6,000 miles away, overriding safety features on devices located in the United States. The researcher accessed location data, owner email addresses, Wi-Fi passwords and GPS coordinates for thousands of the Chinese-made robots.

The Verge
1 source·May 7, 5:35 PM(1 day ago)·2m read
Security Researcher Demonstrates Remote Takeover of Yarbo Robot Lawn Mowersslashgear.com
Audio version
Tap play to generate a narrated version.
Developing·Limited corroboration so far. This page will refresh as more sources emerge.

A security researcher remotely took control of a 200-pound Yarbo robot lawn mower while it was operating in upstate New York and drove it over a person lying in its path to demonstrate security vulnerabilities. The researcher, Andreas Makris, was nearly 6,000 miles away and unable to physically reach the emergency stop button.

The demonstration occurred on May 7, 2026. The Verge reported that Makris had gained access to approximately 5,400 Yarbo devices in the United States and Europe, and was tracking more than 11,000 worldwide. " The robots, which use tank treads and modular attachments for mowing, trimming, leaf blowing, snow blowing and edging, run on a full Linux operating system.

The researcher found that access to one Yarbo robot grants access to all of them. He displayed a map showing locations of the devices and then took control of one that was actively mowing a field near a white house. Using an onscreen joystick, he directed its movement and camera while observing its live video feed.

Makris identified 12 Yarbo robots located within three kilometers of a major power plant. One of those robots appeared to be registered to a nuclear security analyst. He also extracted owners' email addresses, Wi-Fi passwords and exact GPS coordinates of their homes.

Four days after the initial demonstration, a reporter visited addresses provided by the hacked robots in the Silicon Valley foothills. At the first location, a Yarbo robot was found in the backyard exactly where the data indicated. The homeowner, Wayne Yu, confirmed that the email address and Wi-Fi passwords obtained by Makris belonged to him.

Yu, who purchased the robot to mow his steep hillside yard, said he was not surprised that devices can be hacked but expressed discomfort that a researcher halfway across the planet had obtained his personal information and led a reporter to his door.

"Not good. Not good," he repeated. Retired network architect Matt Petach, another Yarbo owner who was visited, was less surprised. He noted that his Wi-Fi password came from an isolated guest network set to reject unknown devices. Petach compared poorly secured gadgets to "a chainsaw without a handguard" and said users should treat such devices as hostile agents.

Makris reported that each Yarbo robot has the same hardcoded root password. Owners cannot permanently change it because firmware updates from the manufacturer reset the password to the default. The company also maintains a remote-access backdoor that is deployed automatically to every robot, cannot be disabled by the owner, and is restored if removed.

The vulnerabilities allow a hacker to override safety features, including the emergency stop button, spin up blades, probe home networks or incorporate the robots into botnets. Yarbo was founded in 2015 initially as a robot snowblower company. The company sent emails to Makris attempting to assure him that the remote backdoor cannot be abused.

Makris published his research on the same day as the demonstration, an action security researchers generally avoid.

I can do whatever I want with all the bots. It’s completely unsecured.

Andreas Makris (The Verge)

Key Facts

Andreas Makris
security researcher who remotely controlled Yarbo robots
5,400 devices
Yarbo robots located in US and Europe
11,000+ robots
total tracked worldwide by researcher
Hardcoded root password
same on every Yarbo robot and reset by firmware updates
Remote backdoor
cannot be disabled by owner and is automatically restored

Story Timeline

4 events
  1. May 7, 2026

    Andreas Makris remotely controls a Yarbo robot lawn mower in upstate New York and drives it over a reporter.

    1 sourceThe Verge
  2. May 7, 2026

    Makris extracts data from over 11,000 Yarbo robots worldwide including emails, passwords and GPS.

    1 sourceThe Verge
  3. May 11, 2026

    Reporter visits Silicon Valley homes using data from hacked robots and meets owners Wayne Yu and Matt Petach.

    1 sourceThe Verge
  4. May 7, 2026

    Makris publishes his research on Yarbo security vulnerabilities.

    1 sourceThe Verge

Potential Impact

  1. 01

    Yarbo may be required to issue firmware updates that allow permanent password changes and backdoor removal.

  2. 02

    Yarbo robot owners may change their Wi-Fi passwords and review device permissions following public disclosure.

  3. 03

    The demonstration could prompt broader regulatory scrutiny of security standards for robotic lawn equipment.

  4. 04

    Owners near critical infrastructure could face increased physical security reviews after location data exposure.

  5. 05

    Some consumers may delay purchases of autonomous yard robots until security issues are resolved.

Transparency Panel

Sources cross-referenced1
Confidence score75%
Synthesized bySubstrate AI
Word count545 words
PublishedMay 7, 2026, 5:35 PM
Bias signals removed5 across 2 outlets
Signal Breakdown
Loaded 2Amplifying 1Framing 1Editorializing 1

Related Stories

NGA Director Announces New AI Framework and Launches Rapid Capabilities Officeforbes.com
ai42 min ago

NGA Director Announces New AI Framework and Launches Rapid Capabilities Office

Lt. Gen. Michelle Bredenkamp outlined the agency's blueprint for becoming an AI-first organization in her first major speech since taking charge in November 2025. The National Geospatial-Intelligence Agency is finalizing the framework to align with the Department of Defense AI st…

forbes.com
Variety
Breaking Defense
3 sources
Apple and Intel Reach Preliminary Chip Manufacturing AgreementSubstrate placeholder — needs review
technology2 hrs agoUpdated

Apple and Intel Reach Preliminary Chip Manufacturing Agreement

Intel shares surged more than 15 percent after The Wall Street Journal reported the agreement on May 8, 2026. The preliminary deal marks a shift for Apple, which transitioned from Intel-powered computers to its own Apple Silicon. Intel appointed Lip-Bu Tan as CEO in March 2025 an…

cnbc.com
WA
Coindesk
The Verge
KO
+2
7 sources
U.S. Sanctions 10 Individuals and Companies in China, Hong Kong, Belarus and UAE for Aiding Iran’s Missile and Drone ProgramsSubstrate placeholder — needs review
technology8 hrs agoFraming55Framing risk55/100Rewrite inherits lede misdirection and consensus framing by centering the U.S. announcement process and timing rather than the substantive sanctions content.Click to jump to full framing analysis

U.S. Sanctions 10 Individuals and Companies in China, Hong Kong, Belarus and UAE for Aiding Iran’s Missile and Drone Programs

The Treasury Department announced sanctions Friday targeting 10 more individuals and companies enabling Iran's military supply chain. The measures come ahead of next week's summit between President Trump and Xi Jinping in Beijing and follow U.S. strikes on two Iranian oil tankers…

The New York Times
MA
SA
TechCrunch
4 sources