Casa > cibernético Notícias > Speak(uma)r Prova de Conceito Malware Transforma auscultadores em Spies
CYBER NEWS

Falar(uma)r Prova de Conceito Malware Transforma auscultadores em Spies

tecnologia de música e de som coisas

Todos os nossos aparelhos poderia se transformar em uma porta de entrada para espionagem, até mesmo os nossos fones de ouvido. Israeli security researchers at Ben Gurion University recently discovered a way to turn headphones into microphones to use them to record audio. Em outras palavras, your headphones could act like a spying device without, needless to say – without your knowledge or consent.


Speake(uma)r proof-of-concept malware transforms the speakers in earbuds or headphones to microphones.

The researchers developed a piece of proof-of-concept code they named Speake(uma)r for the purpose to show how hackers could establish a way to hijack a computer to record audio, even when the device’s microphones have been entirely removed or disabled, Wired explica. The experimental malware literally transforms the speakers in earbuds or headphones to microphones, converting the vibrations in air into electromagnetic signals to audibly capture audio from across a room.

Researchers point out that the employment of headphones as microphones is not a new idea.

Contudo, something was done differently this time – and it was using the output channel of the audio card for input signal. The recording of the sound comes next.

relacionado: Android Atos de firmware como Backdoor, Secretamente Transmite PII a uma empresa chinesa

For that to be done, the research team used a piece of malware dubbed Speak(uma)r. Com sua ajuda, they converted headphones into microphones by changing vibrations in the air emitted by the sound (i.e. voz) into electromagnetic signals. This enables the headphones to act as a microphone. Almost all sounds across the room can be detected.

What researchers did next was to make the output channel of the audio chip turn into an input channel, this way allowing it to record sound. Wired says that all of this is possible due to a feature available in the Realtek audio codec chip. This feature enables the malware to record audio.

What’s worse is that the majority of the available Windows and Mac systems are prone to the vulnerability described above.

It’s one of the many privacy-related issues we are (não) dealing with.

Infelizmente, many people are unaware of the dangers that their beloved devices bring. Or they just don’t seem to care enough to do something. Those who care, Contudo, don’t have many choices.


Is there a way to be protected against this Speake(uma)r exploit?

According to the tests performed by the research team who unveiled the problem, recording is possible from 20 feet away, ou aproximadamente 6 metros. Comercial, naturalmente, have no idea of what is happening.

But that’s not even the worst part. The real issue here stems from the fact that the vulnerability exists in the Realtek chip. And there is no software patch that can fix it. One way to deal with the issue is to upgrade the hardware to prevent such exploits from taking place in the future.

Milena Dimitrova

Milena Dimitrova

Um escritor inspirado e gerente de conteúdo que está com SensorsTechForum desde o início do projeto. Um profissional com 10+ anos de experiência na criação de conteúdo envolvente. Focada na privacidade do usuário e desenvolvimento de malware, ela acredita fortemente em um mundo onde a segurança cibernética desempenha um papel central. Se o senso comum não faz sentido, ela vai estar lá para tomar notas. Essas notas podem mais tarde se transformar em artigos! Siga Milena @Milenyim

mais Posts

Me siga:
Twitter

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *