Ultrasound Voice Command
Researchers have discovered a new vulnerability in Siri, Google Assistant, and other voice assistants. Voice commands can be entered ultrasound on the table and objects. The scene sounds like an acting movie, but the threat is real.
Do you put your phone on the table when not in use? Here you can quickly check the time without the expensive phone falling out of your pocket. If you use a voice assistant (such as Siri or Google Assistant), criminals can control the phone from their desktop.
Researchers at the University of Washington tested this in experiments and were successful. The American magazine Vice wrote that the researchers sent voice commands in the sound range to the voice assistant. The phone is placed on a table and can theoretically be controlled at a height of 30 feet (about 9 meters).
However, the required technology is very expensive
As an attack strategy, researchers first controlled the size of the device and reduced it to a minimum. They then used a microphone to listen to the device, which is now "almost inaudible in noisy environments." You can then use other voice commands in the ultrasound area, such as blocking codes or other personal information for two-factor authentication.
However, it is extremely unlikely that an attacker could exploit this vulnerability in practice. According to the article, the technology is very expensive and requires several components. These are "clumsy and seem strange", which means that bystanders can quickly become suspicious. To prevent security breaches, it's enough to leave your phone in your pants or jacket pocket.
These devices are affected by Kr00K
Picture 1/11
The 13-inch version of the Apple MacBook Air (2018) is affected by this vulnerability.
(Source: Netzwelt)
Criminals may be using cyberanonymists for cyber attacks. For example, in March 2020, the security interval "Kr00k" allows reading in a WLAN network. In the linked article, you will learn all about the new security holes.
More information on this topic
6 items
Popular scams: this is how scammers try to fool you online
Watch now
Table of Contents