CYBER NEWS

Tale(en)r Proof-of-Concept Malware Slår Hovedtelefoner til Spies

teknologi-musik-sound-ting

Alle vores enheder kan udvikle sig til en gateway for spionage, selv vores hovedtelefoner. Israelske sikkerhedsstyrker forskere på Ben Gurion Universitet for nylig opdaget en måde at vende hovedtelefonerne til mikrofoner til at bruge dem til at optage lyd. Med andre ord, your headphones could act like a spying device without, needless to say – without your knowledge or consent.


Speake(en)r proof-of-concept malware transforms the speakers in earbuds or headphones to microphones.

The researchers developed a piece of proof-of-concept code they named Speake(en)r for the purpose to show how hackers could establish a way to hijack a computer to record audio, even when the device’s microphones have been entirely removed or disabled, Wired forklarer. The experimental malware literally transforms the speakers in earbuds or headphones to microphones, converting the vibrations in air into electromagnetic signals to audibly capture audio from across a room.

Researchers point out that the employment of headphones as microphones is not a new idea.

Men, something was done differently this time – and it was using the output channel of the audio card for input signal. The recording of the sound comes next.

Relaterede: Android Firmware retsakter Ligesom Backdoor, Hemmeligt Sender PII til en kinesisk Company

For that to be done, the research team used a piece of malware dubbed Speak(en)r. Med dens hjælp, they converted headphones into microphones by changing vibrations in the air emitted by the sound (dvs.. stemme) into electromagnetic signals. This enables the headphones to act as a microphone. Almost all sounds across the room can be detected.

What researchers did next was to make the output channel of the audio chip turn into an input channel, this way allowing it to record sound. Wired says that all of this is possible due to a feature available in the Realtek audio codec chip. This feature enables the malware to record audio.

What’s worse is that the majority of the available Windows and Mac systems are prone to the vulnerability described above.

It’s one of the many privacy-related issues we are (ikke) dealing with.

Desværre, many people are unaware of the dangers that their beloved devices bring. Or they just don’t seem to care enough to do something. Those who care, dog, don’t have many choices.


Is there a way to be protected against this Speake(en)r exploit?

According to the tests performed by the research team who unveiled the problem, recording is possible from 20 feet away, eller ca. 6 meter. Brugere, naturligt, have no idea of what is happening.

But that’s not even the worst part. The real issue here stems from the fact that the vulnerability exists in the Realtek chip. And there is no software patch that can fix it. One way to deal with the issue is to upgrade the hardware to prevent such exploits from taking place in the future.

Milena Dimitrova

Milena Dimitrova

En inspireret forfatter og indhold leder, der har været med SensorsTechForum siden begyndelsen. Fokuseret på brugernes privatliv og malware udvikling, hun tror stærkt på en verden, hvor cybersikkerhed spiller en central rolle. Hvis almindelig sund fornuft giver ingen mening, hun vil være der til at tage noter. Disse noter senere kan blive til artikler! Følg Milena @Milenyim

Flere indlæg

Følg mig:
Twitter

Efterlad en kommentar

Din e-mail-adresse vil ikke blive offentliggjort. Krævede felter er markeret *

Frist er opbrugt. Venligst genindlæse CAPTCHA.

Del på Facebook Del
Loading ...
Del på Twitter Tweet
Loading ...
Del på Google Plus Del
Loading ...
Del på Linkedin Del
Loading ...
Del på Digg Del
Del på Reddit Del
Loading ...
Del på Stumbleupon Del
Loading ...