Ashley LeMay said she was terrified when a stranger began playing music and talking to her eight-year-old daughter Alyssa through their recently installed Ring camera. (Picture: Fox 6)

A creepy internet hacker took control of a camera in a little girl’s bedroom and told her: ‘I’m your best friend.’

Ashley LeMay installed the Ring camera in her three daughters’ bedroom so she could check on them while she worked late shifts as a nurse, but four days later the camera began addressing her daughter Alyssa.

The girl told WMC: ‘First, what happened was, in the hallway. I thought it was my sister because I heard some music, it was like “tiptoe to the window.”

‘So I come upstairs and I hear some banging noise and I am like, “Who is that?”‘

The Ring camera had begun playing ‘Tiptoe Through The Tulips’ by Tiny Tim – and when Alyssa asked ‘who is that,’ a man’s voice came through.


‘I’m your best friend,’ the voice answered back.

Alyssa yelled, ‘Mommy,’ and the voice replied, “I’m Santa Clause. Don’t you want to be my best friend?’

thumbnail for post ID 12111155Uber rider strikes up heartwarming friendship with her lonely driver

Her mother Ashley told said that the stranger also encouraged ‘destructive behavior’ before her father discovered what was happening and disconnected the camera.

Ashley LeMay said: ‘They could watch them sleeping, changing. They could have watched a lot of things.’

The LeMay family, who lives in DeSoto County, Mississippi, has since said they are going to return their Ring camera.

thumbnail for post ID 12110702Boy, 16, 'coldly shot mother and four siblings dead as each returned home for the day'

A Ring spokesperson said they investigated the incident and determined that it was not caused by a security breach on their end.

Instead, they said it was likely the result of hackers stealing the family’s login information, which they also used for another site.

Ring also encouraged users to enable two-factor authentication on their accounts, adding multiple users instead of sharing login info, and using strong passwords.