Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:50 PM
Connect Directly

Alexa, Disarm the Victim's Home Security System

Researchers who last year hacked popular voice assistants with laser pointers take their work to the next level.

It's still a mystery to researchers at the University of Michigan and The University of Electro-Communications (Tokyo) – just what physically enabled them to inject commands into the embedded microphones of Amazon Alexa, Google Home, and other digital voice assistant devices via laser pointers.

The team in 2019 used light to remotely control Google Assistant, Amazon Alexa, Facebook Portal, and Apple Siri by exploiting a vulnerability in their so-called MEMS microphones. They used the light beams to inject invisible and inaudible commands to the digital voice assistants as well as voice-controlled smartphones and tablets – through glass windows as far away as 110 meters (120 yards).

They're now taking their research to a new phase.

Related Content:

The Coolest Hacks of 2019

The Changing Face of Threat Intelligence

New on The Edge: How Industrial IoT Security Can Catch Up With OT/IT Convergence

"There's still some mystery around the physical causality on how it's working. We're investigating that more in-depth," says Benjamin Cyr, a Ph.D. student at Michigan who, along with researcher Sara Rampazzi, will be presenting the latest iteration of the research at Black Hat Europe on Dec. 10. Why do the mikes respond to light as if it's sound? he says. "We want to try to nail down what's happening on a physical level, so that future hardware designs" protect them from light-injection attacks.

They are now studying the security of sensing systems overall as well, including those found in medical devices, autonomous vehicles, industrial systems – and even space systems.

Cyr, Rampazzi, an assistant professor at the University of Florida, and Daniel Genkin, an assistant professor at the University of Michigan, plan to show at Black Hat Europe how a security camera could be manipulated via a hijacked voice assistant with which it interfaces. They'll be demonstrating their light-injection hack against the Amazon Echo 3, a newer model of the smart speaker system that was not available last year when they first tested Echo, Siri, Facebook Portal, and Google Home. Cyr says they haven't had the opportunity yet to test the fourth-generation Echo speaker.

As a bonus, Cyr says he plans to demonstrate what the laser beam actually sounds like when it hits the mike of the digital assistant. "I'll be taking some recordings of the mike" to play during the demo, he says.

At the heart of the research is the broader problem of an explosion of Internet of Things devices on the market that were not built with security in mind.

"We want to understand ... how to defend against these vulnerabilities. Our final goal is to protect the system and make it more resilient, not only for the attack we found but for future attacks that have not yet been discovered," Rampazzi says.

Cat Toys and Light Commands
The researchers spent just $2,000 in equipment to conduct the attack, which they dubbed "Light Commands" and included laser pointers, a laser driver, and a sound amplifier. However, they say it could be done for as little as $100, including a low-end laser printer for cats that can be bought on Amazon.

"The Amazon lasers we bought were for cats" that came with cat toys, Cyr says. "So we were giving away cat toys" after that.

For longer range attacks, they purchased a $200 telephoto lens, which allowed them to shoot the light beam down a long hallway. They encode the signal to the mike, and it gets modulated by the light.

"You shoot it to the acoustic part of the mike that then gets converted into an acoustic signal. So the voltage signal looks exactly the same is if it's being done by an acoustic signal," Cyr says.

This allows them to issue commands to voice-enabled devices, such as garage door openers, smart locks, and home security system cameras.

The researchers shared their findings with Amazon, Google, and the other vendors before they went public last year with the initial research. Rampazzi says Amazon has since made some slight updates to Alexa's software, for example, such that an attacker would be unable to brute-force the device PIN.

"The new generation of devices also have a cover" over the mike, she notes, although the researchers don't know whether that was in response to their attack. "The cover makes it harder to find the location of the mike and to be able to inject [light commands] into the device." 

Vendors could make other hardware adjustments to protect the devices from the Light Command attack, she says, such as ensuring the mike isn't susceptible to light, or adding authentication techniques to the software so an unauthorized user can't commandeer the digital voice assistant.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-19
Apache Guacamole 1.2.0 and earlier do not consistently restrict access to connection history based on user visibility. If multiple users share access to the same connection, those users may be able to see which other users have accessed that connection, as well as the IP addresses from which that co...
PUBLISHED: 2021-01-19
In SOOIL Developments Co., Ltd Diabecare RS, AnyDana-i and AnyDana-A, a client-side control vulnerability in the insulin pump and its AnyDana-i and AnyDana-A mobile applications allows physically proximate attackers to bypass user authentication checks via Bluetooth Low Energy.
PUBLISHED: 2021-01-19
In SOOIL Developments Co., Ltd Diabecare RS, AnyDana-i and AnyDana-A, a client-side control vulnerability in the insulin pump and its AnyDana-i and AnyDana-A mobile applications allows physically proximate attackers to bypass checks for default PINs via Bluetooth Low Energy.
PUBLISHED: 2021-01-19
In SOOIL Developments Co., Ltd Diabecare RS, AnyDana-i and AnyDana-A, the communication protocol of the insulin pump and its AnyDana-i and AnyDana-A mobile applications lacks replay protection measures, which allows unauthenticated, physically proximate attackers to replay communication sequences vi...
PUBLISHED: 2021-01-19
The Stockdio Historical Chart plugin before 2.8.1 for WordPress is affected by Cross Site Scripting (XSS) via stockdio_chart_historical-wp.js in wp-content/plugins/stockdio-historical-chart/assets/ because the origin of a postMessage() event is not validated. The stockdio_eventer function listens fo...