www.techspot.com
Open in
urlscan Pro
151.139.128.10
Public Scan
Submitted URL: https://statics.teams.cdn.office.net/evergreen-assets/safelinks/1/atp-safelinks.html?url=https%3A%2F%2Fwww.techspot.com%2Fnews%2F9820...
Effective URL: https://www.techspot.com/news/98200-new-ultrasonic-attacks-can-issue-malicious-commands-voice.html
Submission: On April 07 via manual from MX — Scanned from DE
Effective URL: https://www.techspot.com/news/98200-new-ultrasonic-attacks-can-issue-malicious-commands-voice.html
Submission: On April 07 via manual from MX — Scanned from DE
Form analysis
3 forms found in the DOM/search/
<form class="search_form" action="/search/" id="cse-search-box-header">
<input type="hidden" name="cx" value="partner-pub-7395890353660701:j5claj-6kfy">
<input type="hidden" name="cof" value="FORID:11">
<input type="hidden" name="ie" value="UTF-8">
</form>
POST https://www.techspot.com/products/
<form action="https://www.techspot.com/products/" method="POST" id="form_search" autocomplete="off">
<div class="pfmenuSideTitle">Search</div>
<input class="ProdSearch" name="productsearch" id="productsearch" type="text" placeholder="Search product reviews, pros & cons, pricing">
</form>
POST //app.mailerlite.com/webforms/submit/v3t1x0
<form class="ml-block-form" action="//app.mailerlite.com/webforms/submit/v3t1x0" data-id="492661" data-code="v3t1x0" method="POST" rel="noopener" target="_blank" autocomplete="off">
<div class="footitle"><label for="tsnlemail">Subscribe to the TechSpot Newsletter</label></div>
<div class="form-email">
<input type="email" id="tsnlemail" name="fields[email]" class="form-control email" placeholder="email address" value="" autocomplete="off" data-lpignore="true" spellcheck="false" autocapitalize="off">
</div>
<div class="form-submit">
<input type="hidden" name="ml-submit" value="1">
<input type="submit" value="Subscribe" name="subscribe">
</div>
</form>
Text Content
WE VALUE YOUR PRIVACY We and our partners store and/or access information on a device, such as cookies and process personal data, such as unique identifiers and standard information sent by a device for personalised ads and content, ad and content measurement, and audience insights, as well as to develop and improve products. With your permission we and our partners may use precise geolocation data and identification through device scanning. You may click to consent to our and our partners’ processing as described above. Alternatively you may access more detailed information and change your preferences before consenting or to refuse consenting. Please note that some processing of your personal data may not require your consent, but you have a right to object to such processing. Your preferences will apply to this website only. You can change your preferences at any time by returning to this site or visit our privacy policy. MORE OPTIONSAGREE * User loginUser iconLogin * * SearchA search icon TechSpot logoThe word TechSpot * Trending * Nvidia RTX 4070 Ti * 5800X3D vs. Ryzen 7600X * Stable Diffusion How-To * 7900 XTX vs RTX 4080 * PC Buying Guide * Features * Tech Culture * Must Reads * Hardware * Software * Gaming * Explainers * Tips & Tricks * Reviews * CPU * Graphics Cards * Laptops * Storage * Monitors * More Reviews * The Best * Best CPUs * Best Graphics Cards * Best Monitors * Best Software * Best SSD * Best PC Speakers * Downloads * Latest Updates * Popular Apps * Software We Recommend * Drivers * Product Finder Search * Forums * Join TechSpot Elite * New Posts * Latest Comments * Jobs * Security * Electronics * hacking * voice assistant NEW ULTRASONIC ATTACKS CAN ISSUE MALICIOUS COMMANDS TO VOICE ASSISTANTS AND SMART HOME DEVICES NUIT-1 AND NUIT-2 PROVIDE A PATH FOR SILENT ATTACKS AGAINST SMART SPEAKERS By Alfonso Maruccia April 5, 2023 at 1:56 PM TechSpot is about to celebrate its 25th anniversary. TechSpot means tech analysis and advice you can trust. What just happened? Voice assistants and smart devices have a known vulnerability against ultrasound-based attacks. Researchers have now developed two new ultrasonic exploits that could put millions of devices at risk. Unheard commands can be sent during teleconferencing or in-person. Researchers from the University of Texas, San Antonio, and the University of Colorado have developed new ultrasound attacks dubbed NUIT, or Near-Ultrasound Inaudible Trojan, which can exploit vulnerabilities in microphone-equipped IoT devices and voice assistants such as Apple Siri, Google Assistant, and Microsoft Cortana. The attacks are inaudible to humans, yet they can effectively turn smart devices into potentially malicious appliances. The researchers plan to unveil the new attacks publicly during the upcoming 32nd USENIX Security Symposium, August 9-11, in Anaheim, California. The research team provided a preview demonstration to The Register, showing two separate attacks--NUIT-1 and NUIT-2. The first sends near-ultrasound signals to a smart speaker to compromise the microphone and voice assistant on the same device. The second exploits a victim's speaker to attack the microphone and voice assistant on a different device. The NUIT attacks work by modulating voice commands into near-ultrasonic signals, which the human ear cannot detect, but voice assistants can. The instructions modulated in NUIT-1 are extremely fast, lasting under 77 milliseconds. That period is the average reaction time for the four voice assistants installed in the multiple devices tested by US researchers. The researchers tested NUIT-1 as an "end-to-end silent" attack. Siri turned out to be fully vulnerable to NUIT-1. The researchers could control an iPhone's volume with a silent, sub-77 ms instruction ("speak six percent") to lower the smartphone's volume to 6%. A second silent instruction ("open the door") allowed them to use Siri to open the victim's front door via Apple's Home app. The NUIT-2 attack sends embedded ultrasonic signals via a teleconference like a Zoom meeting. This vector allows hackers to exploit a nearby phone remotely. The NUIT-2 attacks don't have the 77ms time window, enabling researchers to try more complex commands. The researchers tested both attacks against 17 different devices, including several iPhone models, a 2021 MacBook Pro, a 2017 MacBook Air, a Dell Inspiron 15 system, Samsung Galaxy phones and tablets, first-gen Amazon Echo Dot, Apple Watch 3, Google Pixel 3, Google Home, and more. They achieved different levels of success with both silent and audible responses from the compromised devices. The iPhone 6 Plus was the only device that turned out to be invulnerable to both NUIT-1 and NUIT-2. The researchers explained this was because the 2014 device likely uses a low-gain amplifier while newer iPhones use high-gain. Another relevant issue discovered by the team is that NUIT-1 exploit only works if the distance between the device's speaker and microphone isn't too wide. The researchers said that users should avoid purchasing devices designed with the speaker and mic close together to avoid becoming victims of NUIT-1 or NUIT-2 attacks. Using earphones effectively mitigates the exploits since the sound signals are too quiet to register on the microphone. Enabling voice authentication on personal assistant devices (where possible) will limit unauthorized usage. Furthermore, device manufacturers could end the entire category of ultrasound attacks by developing new tools to recognize (and reject) inaudible commands embedded in near-ultrasonic frequencies. 3 comments 15 likes and shares Share this article: FIND YOUR DREAM TECH JOB iOS Software Engineer, TikTok Live Revenue TikTok - Sydney Growth Product Manager Adobe - San Jose PowerBI – SQL Developer Purple Drive Technologies - Armonk J.P. Morgan Wealth Management - Private Client Advisor - Hollywood Hills Market - Beverly Hills, CA (including Los Angeles/ Burbank/ Hollywood/ West Hollywood/ North Hollywood) JPMorgan Chase Bank, N.A. - Beverly Hills RELATED STORIES * Teen hacker arrested in Spain following daring cyberattacks * GM plans to develop an Azure-powered in-car AI assistant * Tax return website eFile.com hacked with malware-spreading scripts * Who created Siri? FEATURED ON TECHSPOT * Tile anti-theft mode makes trackers undetectable, threatens $1 million fine if used for stalking * Under new guidelines, Android apps must let users easily delete accounts and data Most Read * 28 comments AMD Radeon RX 7900 XT vs. Radeon RX 6800 XT * 46 comments The Last of Us Part I GPU Benchmark * 42 comments AMD Ryzen 7 7800X3D Review: Gaming Efficiency FTW! * 46 comments Bank stops handling cash in some branches as more people go digital Load Comments 3 ... User Comments: 3 Got something to say? Post a comment Load all comments... Discuss * Recently commented stories * Jump to forum mode Add your comment to this article Create your free account to leave a comment. Join thousands of tech enthusiasts and participate. TechSpot Account Sign up for free, it takes 30 seconds. Already have an account? Login now. Main Sections * Tech News * Features * Reviews * The Best * Downloads * Product Finder * Tech Jobs Popular Features * How to Run Stable Diffusion * Nvidia GeForce RTX 4070 Ti Review * 5800X3D vs. Ryzen 7600X * AMD Radeon 7900 XTX Review * Nvidia GeForce RTX 4090 Review * Top 10 Hacks for Microsoft Excel * microSD and SD Card Buying Guide Top Downloads * Cinebench * Windows Installation Tool * DS4Windows * iTunes Download * Java JDK * Minecraft Download * Fortnite Download Subscribe to the TechSpot Newsletter Follow TechSpot * * * * * TECHSPOT : Tech Enthusiasts, Power Users, Gamers TechSpot is a registered trademark. About Us Ethics Statement Terms of Use Privacy Policy Change Ad Consent Advertise © 2023 TechSpot, Inc. All Rights Reserved.