{"id":162295,"date":"2023-04-16T20:22:21","date_gmt":"2023-04-17T01:22:21","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/04\/new-ultrasonic-acoustic-attack-targeting-microphones-and-voice-assistants-gives-remote-access-to-most-smart-devices"},"modified":"2023-04-16T20:22:21","modified_gmt":"2023-04-17T01:22:21","slug":"new-ultrasonic-acoustic-attack-targeting-microphones-and-voice-assistants-gives-remote-access-to-most-smart-devices","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/04\/new-ultrasonic-acoustic-attack-targeting-microphones-and-voice-assistants-gives-remote-access-to-most-smart-devices","title":{"rendered":"New Ultrasonic Acoustic Attack Targeting Microphones and Voice Assistants Gives Remote Access to Most Smart Devices"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/new-ultrasonic-acoustic-attack-targeting-microphones-and-voice-assistants-gives-remote-access-to-most-smart-devices2.jpg\"><\/a><\/p>\n<p>Researchers in the United States have developed a new ultrasonic acoustic attack that can covertly give hackers remote access to many smart devices by turning the device\u2019s microphone and voice assistant against them.<\/p>\n<p>The attack works by using ultrasonic acoustic signals that are inaudible to humans but can be picked up by voice assistants on smart devices, a type of cyberattack commonly referred to as a \u201cSurfingAttack\u201d or \u201c<a class=\"\" href=\"https:\/\/www.theregister.com\/2017\/09\/07\/dolphins_help_pwn_electronics\/\" target=\"_blank\" rel=\"noopener\"> DolphinAttack<\/a>.\u201d<\/p>\n<p>With a SurfingAttack, a hacker can modulate voice commands into silent, near-ultrasonic signals, allowing them to issue commands to a smart device, all while a user is blissfully unaware their device has been hijacked.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers in the United States have developed a new ultrasonic acoustic attack that can covertly give hackers remote access to many smart devices by turning the device\u2019s microphone and voice assistant against them. The attack works by using ultrasonic acoustic signals that are inaudible to humans but can be picked up by voice assistants on [\u2026]<\/p>\n","protected":false},"author":396,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-162295","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/162295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=162295"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/162295\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=162295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=162295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=162295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}