Attacks/Breaches

11/23/2016
02:25 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Researchers Demo Method For Turning A PC Into An Eavesdropping Device

The audio chipsets in many modern PCs allow audio jacks to be flipped from lineout to line-in, says team from Israel's Ben-Gurion University.

Researchers at Israel’s Ben-Gurion University of the Negev have devised a way to turn any computer into an eavesdropping device by surreptitiously getting connected headphones or earphones to function like microphones.

In a paper titled "SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit," the researchers this week described malware they have developed for reconfiguring a headphone jack from a line-out configuration to a line-in jack, thereby enabling connected headphones to work as microphones.

The exploit works with most off-the-shelf headphones and even when the computer doesn’t have a connected microphone or has a microphone that has been disabled, according to the researchers.

The malware takes advantage of the manner in which some audio chipsets in modern motherboards and soundcards work. In a typical computer chassis, the audio jacks that are built into the front or rear panel are used either as line-in or input jacks or line-out jacks for audio output.

The chipsets in such cards support a little-used jack re-mapping or a jack re-tasking option for changing the function of the audio ports from line-in to line-out via software.

Audio chipsets from Realtek Semiconductor, for instance support this capability, though it is not documented in any technical specifications for the product, the researchers from Ben-Gurion University noted. Realtek codecs are the most widely used in PCs but other codec manufacturers allow jack repurposing as well, the researchers said.

In addition, researchers have for some time known that speakers can, with a little tweaking, be made to function like a microphone, they said. “Loudspeakers convert electric signals into a sound waveform, while microphones transform sounds into electric signals,” their paper noted.

In a speaker, electrical signals are used to create a changing magnetic field that moves a diaphragm in order to produce sounds. In a microphone, a diaphragm moves through a magnetic field to induce an electrical signal. “This bidirectional mechanism facilitates the use of simple headphones as a feasible microphone, simply by plugging them into the PC microphone jack,” the research paper said.

This capability, coupled with the fact that audio jacks can be programmatically altered to switch from output only to input jacks, creates a vulnerability that attackers can use to turn any computer into an eavesdropping device, according to the BGU researchers.

Tests to evaluate the quality of audio signals generated by off-the-shelf headphones plugged into jacks that had been modified by SPEAKE(a)R showed it is possible to acquire intelligible audio from several meters away.

Craig Young, a cybersecurity researcher for Tripwire says the fact that audio-chipsets allow this sort of reprogramming is interesting. But the chances of someone being able to pull off an attack are not easy, he says. For one thing, in order for the exploit to work, an attacker would likely need full access to the computer that is being used for eavesdropping. Anti-malware tools would also likely be able to easily spot and block the malware from working, he says.

“Based on the description of the malware, it is using the RealTek retasking feature to reconfigure an output line to be used as an input line,” he says. In a Windows environment, this is generally controlled within the registry, he says. “Anti-malware software should be able to detect either an unauthorized registry change or unexpected communication with the hardware,” he says.

The attack would also only work under a limited set of conditions.  The victim for instance would need to have done something to have the malware installed on the system. The victim’s headphone would need to be connected to the compromised system and the victim also needs not to be using the headphones for this attack to work, Young says.

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18643
PUBLISHED: 2019-04-25
GitLab CE & EE 11.2 and later and before 11.5.0-rc12, 11.4.6, and 11.3.10 have Persistent XSS.
CVE-2018-19359
PUBLISHED: 2019-04-25
GitLab Community and Enterprise Edition 8.9 and later and before 11.5.0-rc12, 11.4.6, and 11.3.10 has Incorrect Access Control.
CVE-2019-11488
PUBLISHED: 2019-04-25
Incorrect Access Control in the Account Access / Password Reset Link in SimplyBook.me Enterprise before 2019-04-23 allows Unauthorized Attackers to READ/WRITE Customer or Administrator data via a persistent HTTP GET Request Hash Link Replay, as demonstrated by a login-link from the browser history.
CVE-2019-11489
PUBLISHED: 2019-04-25
Incorrect Access Control in the Administrative Management Interface in SimplyBook.me Enterprise before 2019-04-23 allows Authenticated Low-Priv Users to Elevate Privileges to Full Admin Rights via a crafted HTTP PUT Request, as demonstrated by modified JSON data to a /v2/rest/ URI.
CVE-2019-3720
PUBLISHED: 2019-04-25
Dell EMC Open Manage System Administrator (OMSA) versions prior to 9.3.0 contain a Directory Traversal Vulnerability. A remote authenticated malicious user with admin privileges could potentially exploit this vulnerability to gain unauthorized access to the file system by exploiting insufficient san...