Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

IoT Security

Hackers Can Use Lasers to Send Voice Commands to Phones, Smart Speakers

Hackers can use lasers to send voice commands to Siri, Alexa, Google Assistant and other voice assistants present on phones, tablets and smart speakers, researchers have demonstrated.

Hackers can use lasers to send voice commands to Siri, Alexa, Google Assistant and other voice assistants present on phones, tablets and smart speakers, researchers have demonstrated.

A group of researchers from the University of Michigan in the United States and the University of Electro-Communications in Japan has shown that a laser pointed at the microphone of a device can be used to issue commands that get processed by the voice assistant present on the device.

The attack method, dubbed Light Commands, relies on the fact that the MEMS (micro-electro-mechanical systems) microphones, which are used in many modern devices, react to light if it’s aimed directly at them.

Microphones are designed to convert sound waves into electrical audio signals, but researchers noticed that they react to a light source, such as a laser, similarly to how they react to sound waves. This can be used to “inject” sound into a microphone by modulating the intensity of the laser light.

Light Commands attack

In attacks aimed at voice assistants, the attacker can transmit a voice command attached to a laser beam to the targeted device’s microphone, which demodulates the signal. The device will process the resulting signal as it would a voice command sent by the user.

According to the researchers, an attacker could use the Light Commands attack to instruct voice assistants to execute various types of commands aimed at smart systems, including to control home light switches, open garage doors, unlock and start vehicles, open locks, and make online purchases on behalf of the victim. Attacks can work against many devices, including phones and tablets running Siri or Google Assistant, and the Amazon Echo smart speaker and Facebook’s Portal smart display, both of which use the Alexa assistant.

The researchers have published a paper detailing their findings and they have set up a website that summarizes the Light Commands attack, including through some demo videos.

Advertisement. Scroll to continue reading.

The attack has been tested on over a dozen devices from Apple, Google, Amazon, Facebook and Samsung. Depending on the device, the attack can be launched over distances of at least 110 m (360 ft) — the testing distance was limited by the length of a corridor available to the researchers — and it can work even through glass windows.

The experts say an attack can be launched with as little as $600 worth of commercially-available equipment, including a simple laser pointer, a laser driver to modulate the signal, a sound amplifier for playing recorded commands, and a telephoto lens to focus the laser.

A telescope or binoculars can be used to point the laser at the microphone of a device that is located at a large distance from the attacker’s setup. Alternatively, over smaller distances, an attacker could use a laser flashlight, which has a larger spot size, making it easier to aim at the targeted device’s microphone.

In order to launch stealthier attacks, hackers could use invisible lasers and they could instruct the targeted devices to lower the speaker volume so that the victim does not hear the voice assistant confirming the execution of a command.

According to the researchers, the most efficient mitigations against such attacks would be adding an extra layer of authentication, using physical barriers to block straight light beams from reaching the microphone, and using multiple microphones, as a legitimate voice command would result in a signal being transmitted to more than just one microphone.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.