An attacker’s phones smart speakers or digital assistant He demonstrates how he can use inaudible ultrasound to silently control any device that has
Firstly BleepingComputer Researchers found that you can use this technique to issue voice commands to devices to make phone calls, unlock doors in smart homes, disable alarms, read text messages, and more. Attack Alexa, Cortana, Google Assistant And Siri Tested on digital assistants such as
NUIT The technique, called the technique, was featured in a presentation for the USENIX Security Symposium 2023 by a team of researchers at the University of Texas at San Antonio and the University of Colorado Springs.
“NUIT is a new inaudible attack against voice assistants that can be executed remotely over the internet,” the researchers write on a website describing the study. A series of attacks on YouTube video You can see it working.
attack method, the human ear of digital assistants He benefits from the use of microphones that can pick up sounds he cannot hear. NUIT uses the near ultrasound frequency range to give voice commands to smart devices. (16kHz-20kHz) sounds, some commands take less than a second to play.
Study, NUITIt shows that you can use ‘ in a few different ways. For example, an attacker can trick you into a website or website on your phone. to YouTube video can make you click on an outgoing link, which plays inaudible voice commands after a short delay to control your phone. As researchers control NUITs from one phone to another, Zoom calls playing through a smart speaker or any other IOT It also showed that it works when playing on a phone to control your device and even embedded in files with additional background music.
In tests, NUIT attacks iPhone‘s, Samsung Galaxy It seems to have managed to control phones and devices like Google Home and Amazon Echo Devices.
While such new attacks are difficult actions to face in the real world for now, with the rise of artificial intelligence, voice commands will become more important to our daily lives and voice exploits will be in demand more than ever.
Researchers in August At the USENIX Security Symposium they will offer more details about the study.