Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Insider Threats

3/16/2017
03:30 PM
Connect Directly
Facebook
Twitter
RSS
E-Mail
50%
50%

Sound Waves Used to Hack Common Data Sensors

Though the immediate threat to your smartphone or Fitbit is slight, University of Michigan researchers show command-and-control capability with spoofed signaling on a variety of MEMS accelerometers.

University of Michigan researchers have shown that sound waves can be used to hack into devices that use a commonly deployed piece of silicon called a MEMS accelerometer. Fitbits, smartphones, and a variety of medical devices and GPS locators all rely on accelerometers.

The bad news is that the sound-wave hack can be used to control an emerging class of autonomous devices such as drones, self-driving cars, and anything attached to the Internet of Things. The good news: The hack requires physical proximity, expertise in both mechanical and electrical engineering, and above-average programming skills, the researchers tell Dark Reading.

They also admit the actual threat is slight. "We're not saying the sky is falling," says Tim Trippel, one of the researchers and a PhD candidate in the computer science and engineering department at the University of Michigan. "But we need to think about software security and how the hardware can be stimulated environmentally with sound waves and [electromagnetic interference]. If attackers can craft the right type of vibration, they can make a device behave the way they way want it to."

Trippel says the research builds on a paper presented at a 2015 USENIX conference that showed how an acoustical blast could register on a drone as a gust of wind. But rather than just interfere with the accelerometer, the Michigan researchers are taking this to the next level with command-and-control capability.

To demonstrate the acoustical hack, the researchers played a YouTube video from a smartphone that prompted the phone to spell out the word walnut. "We laced a music video with the tones, demonstrating that the interference remains effective even when combined with videos and music that could be automatically played from websites, email attachments, Twitter links tapped on a smartphone," the researchers say in their paper, which will be presented at an IEEE security conference next month in Paris.

The Michigan researchers were also able to use audio tones to disrupt a Fitbit device, artificially adding steps to the device's daily tally. "We also took it a step further to see if we could steer a vehicle, which we did with a toy car," Trippel says.

But infosec professionals don't need to rush out and download a patch or swap out hardware. "This exploit is academic in nature and presents no real-world risk," says Mike Murray, VP of security research and response at mobile security vendor Lookout. "Accelerometer data isn't usually used for any significantly risky purpose."

Trippel says the acoustic attack requires more sophistication than just flooding a network with server requests like a distributed denial-of-service attack, for example. "Attackers would need some knowledge of the algorithms of the sensor data and the signal they're trying to spoof," he adds. "And they'd need physical proximity as well."

The researchers also alerted five chipmakers whose sensors they tested and found vulnerable: Analog Devices, Bosch, InvenSense, Murata Manufacturing, and STMicroelectronics. While acknowledging there's no fundamental flaw, Trippel would like to see the manufacturers alert component customers, who tend to automatically trust sensor data. "It's good hardware that does what it was designed to do," Trippel says, but manufacturers need to make customers who buy them aware so they know when they might fail.

"We're not trying to say all these devices are broken. But going into the age of autonomous systems, we need to be security-aware with hardware and software, and the information fed to those algorithms," Trippel says. With growing reliance on sensors to collect data for industry and consumers, the vulnerability needs to be addressed.

Related Content:

 

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Attackers Infiltrate the Supply Chain & What to Do About It
Shay Nahari, Head of Red-Team Services at CyberArk,  7/16/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12551
PUBLISHED: 2019-07-22
In SweetScape 010 Editor 9.0.1, improper validation of arguments in the internal implementation of the Memcpy function (provided by the scripting engine) allows an attacker to overwrite arbitrary memory, which could lead to code execution.
CVE-2019-12552
PUBLISHED: 2019-07-22
In SweetScape 010 Editor 9.0.1, an integer overflow during the initialization of variables could allow an attacker to cause a denial of service.
CVE-2019-3414
PUBLISHED: 2019-07-22
All versions up to V1.19.20.02 of ZTE OTCP product are impacted by XSS vulnerability. Due to XSS, when an attacker invokes the security management to obtain the resources of the specified operation code owned by a user, the malicious script code could be transmitted in the parameter. If the front en...
CVE-2019-10102
PUBLISHED: 2019-07-22
tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". Th...
CVE-2019-10102
PUBLISHED: 2019-07-22
aubio 0.4.8 and earlier is affected by: null pointer. The impact is: crash. The component is: filterbank. The attack vector is: pass invalid arguments to new_aubio_filterbank. The fixed version is: after commit eda95c9c22b4f0b466ae94c4708765eaae6e709e.