

New Ultrasound Attack Can Secretly Hijack Phones and Smart Speakers - Slashdot
source link: https://it.slashdot.org/story/23/04/06/2221257/new-ultrasound-attack-can-secretly-hijack-phones-and-smart-speakers
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

New Ultrasound Attack Can Secretly Hijack Phones and Smart Speakersbinspamdupenotthebestofftopicslownewsdaystalestupid freshfunnyinsightfulinterestingmaybe offtopicflamebaittrollredundantoverrated insightfulinterestinginformativefunnyunderrated descriptive typodupeerror
The attacks work by modulating voice commands into near-ultrasound inaudible signals so that humans can't hear them but the voice assistant will still respond to them. These signals are then embedded into a carrier, such as an app or YouTube video. When a vulnerable device picks up the carrier, it ends up obeying the hidden embedded commands. Attackers can use social engineering to trick the victim into playing the sound clip, Xia explained. "And once the victim plays this clip, voluntarily or involuntarily, the attacker can manipulate your Siri to do something, for example, open your door."
For NUIT-1 attacks, using Siri, the answer is yes. The boffins found they could control an iPhone's volume so that a silent instruction to Siri generates an inaudible response. The other three voice assistants -- Google's, Cortana, and Alexa -- are still susceptible to the attacks, but for NUIT-1, the technique can't silence devices' response so the victim may notice shenanigans are afoot. It's also worth noting that the length of malicious commands must be below 77 milliseconds -- that's the average reaction time for the four voice assistants across multiple devices.
In a NUIT-2 attack, the attacker exploits the speaker on one device to attack the microphone and associated voice assistant of a second device. These attacks aren't limited by the 77-millisecond window and thus give the attacker a broader range of possible action commands. An attacker could use this scenario during Zooms meeting, for example: if an attendee unmutes themself, and their phone is placed next to their computer, an attacker could use an embedded attack signal to attack that attendees phone. The researchers will publish their research and demonstrate the NUIT attacks at the USENIX Security Symposium in August.
Recommend
-
13
Home / About /
-
10
‘Pegasus’ Spyware Infects Phones, Steals Photos, Secretly Films Owners
-
15
September 22, 2021
-
15
Ultrasound Device Market Size was US$ 7.2 Billion in 2021. Industry Trends, Growth, Insoght, Impact of COVID-19, Company Analysis, Global Forecast 2021-2027.
-
2
Lasers and ultrasound combine to pulverize arterial plaque ...
-
11
This Skin-Sticking Ultrasound Patch Is Like A Tricorder Band-Aid
-
3
China Building Cyberweapons To Hijack Enemy Satellites, Says US Leak
-
10
Microbubbles And Ultrasound: Getting Drugs Through The Blood-Brain Barrier
-
10
Building a Raspberry Pi based ultrasound imaging development platform
-
11
Market Scope: The Intravascular Ultrasound (IVUS) Devices Market is experiencing significant growth due to technological advancements, increased prevalence of cardiovascular diseases, and expanding applications in both clinical practice and r...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK