Malware can turn your laptop into an eavesdropping device

Image
IANS New York
Last Updated : Nov 23 2016 | 5:08 PM IST

Malware that can covertly transform headphones into a pair of microphones can turn your personal computer into a perpetual eavesdropping device, warn researcher.

Using the malware SPEAKE(a)R, the researchers at Ben-Gurion University of the Negev (BGU) in Israel demonstrated how most PCs and laptops today are susceptible to this type of attack.

"The fact that headphones, earphones and speakers are physically built like microphones and that an audio port's role in the PC can be reprogrammed from output to input creates a vulnerability that can be abused by hackers," said Professor Yuval Elovici, Director, BGU Cyber Security Research Center.

A typical computer chassis contains a number of audio jacks, either in the front panel, rear panel or both.

Each jack is used either for input (line-in), or for output (line-out). The audio chipsets in modern motherboards and sound cards include an option for changing the function of an audio port with software -- a type of audio port programming referred to as jack retasking or jack remapping.

Malware can stealthily reconfigure the headphone jack from a line-out jack to a microphone jack, making the connected headphones function as a pair of recording microphones and turning the computer into an eavesdropping device.

This works even when the computer does not have a connected microphone, said the study published in the journal arxriv.

The researchers studied several attack scenarios to evaluate the signal quality of simple off-the-shelf headphones.

"We demonstrated it is possible to acquire intelligible audio through earphones up to several metres away," Yosef Solewicz, an acoustic researcher at the BGU Cyber Security Research Center (CSRC) said.

"This is the reason people like Facebook Chairman and Chief Executive Officer Mark Zuckerberg tape up their mic and webcam," lead researcher Mordechai Guri, Head of Research and Development at the CSRC, noted.

"You might tape the mic, but would be unlikely to tape the headphones or speakers," Guri added.

Potential software countermeasures include completely disabling audio hardware, using an HD audio driver to alert users when microphones are being accessed, and developing and enforcing a strict rejacking policy within the industry.

Anti-malware and intrusion detection systems could also be developed to monitor and detect unauthorised speaker-to-mic retasking operations and block them, the researchers said.

--IANS

gb/dg

Disclaimer: No Business Standard Journalist was involved in creation of this content

*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

First Published: Nov 23 2016 | 5:00 PM IST

Next Story