• bbutler67

Alexa Can Be Hacked A Lot Easier Than You Might Think

Keep Alexa away from all windows. Turns out hackers can shine lasers at your Google Assistant or Amazon Alexa enabled devices and gain control of them, sending commands to the smart assistants or obtaining your valuable account information.

Researchers proved this by using lasers to inject malicious commands into voice controlled devices like smart speakers, tablets, and phones across long distances through glass windowpanes.

The researchers describe the laser based vulnerability as a "signal injection attack" on microphones based on the photoacoustic effect, which converts light to sound through a microphone.

User authentication is lacking or nonexistent on voice assistant devices, the researchers also found. That meant they could use the light injected voice commands to unlock the victim's smartlock enabled doors, shop on their e-commerce sites, use their payment methods, or even unlock and start vehicles connected to the victim's Google account.

The research funded by the Japan Society for the Promotion of Science and the U.S. Defense Advanced Research Projects Agency (DARPA), among other organizations was meant to uncover possible security vulnerabilities in Internet of Things Devices.

"While much attention is being given to improving the capabilities of voice controlled systems, much less is known about the resilience of these systems to software and hardware attacks" the researchers stated. "Indeed, previous works already highlight a major limitation of voice-only user interaction: the lack of proper user authentication."


So how does it work? The mics can convert sound into electrical signals but they also react to light aimed directly at them. By using a high intensity light beam modulating an electrical signal the researchers could trick the microphones embedded in the voice devices into producing electrical signals as if they were receiving real audio from your voice. That means hackers can then inject inaudible commands through the light beams.

Devices are vulnerable from up to 110 meters away as of the time of the research. That's about the length of a football field.

Pretty much any voice enabled device you can imagine is vulnerable to this kind of attack.


The most disturbing part is how easy this kind of hack is. All you need, according to the research group, are a simple laser pointer, a laser diode driver (which keeps a constant current of power supply to the laser), a sound amplifier, and a telephoto lens to focus the laser better for long range attacks.


While this research and the associated hacks were conducted by professional researchers criminals could do the same (though they found no instances of this happening maliciously...yet). However, with the methodology out there now, it's a double edged sword. Yes, some consumers may read about this vulnerability and prepare against it, but now hackers also have new ideas.

It's pretty difficult to tell if you're being attacked this way but users may notice the light beam's reflection on the device in question or a user can try to monitor the device's verbal response and light pattern changes. If you notice your device acting erratically more or less unplug that thing and move it away from the window.

The good news is that there are ways to protect yourself from a laser based attack according to the research.

An additional layer of authentication can be effective at somewhat mitigating the attack. Alternatively, in case the attacker cannot eavesdrop on the device's response having the device ask the user a simple randomized question before command execution can be an effective way at preventing the attacker from obtaining successful command execution.

Manufacturers can also attempt to use sensor fusion techniques such as acquire audio from multiple microphones. When the attacker uses a single laser only a single microphone receives a signal while the others receive nothing. Thus, manufacturers can attempt to detect such anomalies ignoring the injected commands.

Another approach consists in reducing the amount of light reaching the microphone's diaphragm using a barrier that physically blocks straight light beams for eliminating the line of sight to the diaphragm or implement a non transparent cover on top of the microphone hole for attenuating the amount of light hitting the microphone. However, we note that such physical barriers are only effective to a certain point as an attacker can always increase the laser power in an attempt to compensate for the cover induced attenuation or for burning through the barriers creating a new light path.


At Dallas Network Services, we work with a large variety of businesses based in Dallas and Fort Worth (DFW) and the surrounding area such as Addison, Plano, Carrollton, Denton, Richardson, Garland and beyond. We also extend our reach outside the area to include all Texas and other states. We provide on premise server support including Microsoft Exchange as well as Cloud computing services and hosted solutions. We specialize project services, network support, desktop support and voice over IP (VoIP) business phones. Our fully managed IT services will improve your business reliability as well as your bottom line. Contact us today at www.dallasnetworkservices.com chat or call 214-696-6630.  #DNS# #dallasnetworkservices#dallasnetworkservices #techsupport#techsupport #hacker#hacker #cybersecurity#cybersecurity #MSP#MSP

0 views

Follow

Contact

Address

4851 Keller Springs,  Suite 228,

Addison, TX 75001, USA

F:  (214) 853-5696

©2019 BY DALLAS NETWORK SERVICES