{"id":153875,"date":"2022-12-30T04:22:43","date_gmt":"2022-12-30T10:22:43","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/12\/researcher-uncovers-potential-wiretapping-bugs-in-google-home-smart-speakers"},"modified":"2022-12-30T04:22:43","modified_gmt":"2022-12-30T10:22:43","slug":"researcher-uncovers-potential-wiretapping-bugs-in-google-home-smart-speakers","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/12\/researcher-uncovers-potential-wiretapping-bugs-in-google-home-smart-speakers","title":{"rendered":"Researcher Uncovers Potential Wiretapping Bugs in Google Home Smart Speakers"},"content":{"rendered":"<p style=\"padding-right: 20px\"><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/researcher-uncovers-potential-wiretapping-bugs-in-google-home-smart-speakers2.jpg\"><\/a><\/p>\n<p>A security researcher was awarded a bug bounty of $107,500 for identifying security issues in Google Home smart speakers that could be exploited to install backdoors and turn them into wiretapping devices.<\/p>\n<p>The flaws \u201callowed an attacker within wireless proximity to install a \u2018backdoor\u2019 account on the device, enabling them to send commands to it remotely over the internet, access its microphone feed, and make arbitrary HTTP requests within the victim\u2019s LAN,\u201d the researcher, who goes by the name Matt, <a href=\"https:\/\/downrightnifty.me\/blog\/2022\/12\/26\/hacking-google-home.html\" rel=\"noopener\" target=\"_blank\">disclosed<\/a> in a technical write-up published this week.<\/p>\n<p>In making such malicious requests, not only could the Wi-Fi password get exposed, but also provide the adversary direct access to other devices connected to the same network. Following responsible disclosure on January 8, 2021, the issues were remediated by Google in April 2021.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A security researcher was awarded a bug bounty of $107,500 for identifying security issues in Google Home smart speakers that could be exploited to install backdoors and turn them into wiretapping devices. The flaws \u201callowed an attacker within wireless proximity to install a \u2018backdoor\u2019 account on the device, enabling them to send commands to it [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,418],"tags":[],"class_list":["post-153875","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-internet"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/153875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=153875"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/153875\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=153875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=153875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=153875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}