*Malware may turn your computer into an eavesdropping device!

TechViews.org   …..

Malware can turn your computer into a perpetual eavesdropping device by covertly turning speakers or headphones into a microphone, scientists have warned.

Researchers at Ben-Gurion University of the Negev (BGU) in Israel have showed how most PCs and laptops today are susceptible to this type of attack using a malware called SPEAKE(a)R.

“The fact that headphones, earphones and speakers are physically built like microphones and that an audio port’s role in the PC can be reprogrammed from output to input creates a vulnerability that can be abused by hackers,” said Yuval Elovici, director of the BGU Cyber Security Research Centre (CSRC).

“This is the reason people like Facebook Chairman and Chief Executive Officer Mark Zuckerberg tape up their mic and webcam,” said Mordechai Guri, head of Research and Development at the CSRC.

“You might tape the mic, but would be unlikely to tape the headphones or speakers,” Guri said. A typical computer chassis contains a number of audio jacks, either in the front panel, rear panel or both.

Each jack is used either for input (line-in), or for output (line-out).

The audio chipsets in modern motherboards and sound cards include an option for changing the function of an audio port with software – a type of audio port programming referred to as jack re-tasking or jack re-mapping.

Malware can stealthily reconfigure the headphone jack from a line-out jack to a microphone jack, making the connected headphones function as a pair of recording microphones and turning the computer into an eavesdropping device.

This works even when the computer does not have a connected microphone. The BGU researchers studied several attack scenarios to evaluate the signal quality of simple off-the-shelf headphones.

“We demonstrated that it is possible to acquire intelligible audio through earphones up to several meters away,” said Yosef Solewicz, an acoustic researcher at the BGU CSRC.

Potential software counter measures include completely disabling audio hardware, using an HD audio driver to alert users when microphones are being accessed and developing and enforcing a strict rejacking policy within the industry.

Anti-malware and intrusion detection systems could also be developed to monitor and detect unauthorised speaker-to-mic retasking operations and block them, researchers said.


Please Subscribe for free on the right panel to receive updates as soon as they are published.

And please comment below, or visit our “Comments and Discussion” page and tell us what you think.

Data Source: http://bit.ly/2gWxtJE


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s