Tuesday, February 25, 2025
HomeCyber AttackLamphone - New Attacks Let Hackers Remotely Listen to Your Conversation While...

Lamphone – New Attacks Let Hackers Remotely Listen to Your Conversation While You Speak by Watching Light Bulb

Published on

SIEM as a Service

Follow Us on Google News

Researchers uncovered a new type of attack named “Lamphone” let hackers spy and listen your private conversation by watching light bubs.

Nowadays, hackers are improving their methods at an increasing rate, and as a result, now they started the method of eavesdropping. Well, you might be thinking about how do they do it? Is it possible? 

Well, it is possible just with the help of a small bulb. You can spy on any secret conversations that are happening in a place or room from a nearby isolated location just by perceiving a light bulb hanging in there—visible from a window and estimating the volume of light it transmits.

Recently, a cybersecurity researcher team has discovered and illustrated a novel side-channel attacking method that can be utilized by eavesdroppers to collect full sound from a victim’s room that holds an overhead hanging bulb. 

One of the security researchers, from Israeli’s Ben-Gurion University of the Negev and the Weizmann Institute of Science, reported a new system for long-distance eavesdropping, which was named as “Lamphone.”

In this method, it enables anyone with a laptop and less than a thousand dollars of stuff, like a telescope and a $400 electro-optical sensor, will serve the threat actors to listen any sounds in a room that’s hundreds of meters away in real-time, just by observing the vibrations that are produced on the glass surface of a light bulb present inside the room.

How ‘Lamphone’ Attack Work?

The Lamphone is a new type of attack that occurs in remote areas. Well, in this type of attack, it connects on identifying vibrations from hanging bulbs as an effect of air pressure variations. 

When the vacillations hit their surfaces, these sound waves transpire and simply trigger hall to the attacker to collect the fragments of the on-going conversations. According to the security experts, this method could only be applied when the victim is inside the room or any office.

Well, to operate this method, the setup needs a telescope as it provides a close-up view of the room, holding the bulb from a distance. It also needs an electro-optical sensor that’s installed on the telescope to transform the light into an electrical current.

Moreover, it requires an analog-to-digital converter to convert the sensor output to a digital signal, and more importantly, a laptop that will carry out the incoming optical signals and output the collected sound data.

Demonstration of Lamphone Attack

The security experts demonstrated the Lamphone attack by showing a proper video explanation, that we have mentioned below to make the viewers understand clearly about the Lamphone attack:-

Here, the security experts have taken a statement made by the US President, Donald Trump, “We will make America great again.” Anyone can easily copy this speech of the President via Google’s Speech to Text API.

Moreover, the experts have also generated the audio of the Beatles’ “Let It Be” and Coldplay’s “Clocks,” which are remarkably clear and smooth, as anyone can quickly identify the song.

Here in this event, to recover the collected sound from the visual measures acquired from the vibrations of a light bulb and caught by the electro-optical sensor, the security researchers create an algorithm to obtain the sound via bulb.

Though the Lamphone attack could allow some new spying methods to hackers, but this type of method could be prevented quite easily. Here, to do so, all you have to do is to switch off the lights, so there are no visible changes in light to operate along with the acoustic vibrations, even you can also remove the bulbs as well. 

You must be known to the fact that this whole operation revolves around the outcome of the light bulb. In short, it’s not so critical, but we should always stay aware of these types of threats, as, with each passing day, hackers and their methods are constantly evolving.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Also Read:

VLC Vulnerability Let Remote Hackers to Execute Arbitrary Code with User Privilege

Ripple20 – 19 zero-day vulnerabilities Affects Billions of IoT Devices

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Researchers Jailbreak OpenAI o1/o3, DeepSeek-R1, and Gemini 2.0 Flash Models

Researchers from Duke University and Carnegie Mellon University have demonstrated successful jailbreaks of OpenAI’s...

INE Secures Spot Top 50 Education Software Rankings 2025 in G2’s

INE, the leading provider of networking and cybersecurity training and certifications, today announced its...

Silent Killers Exploit Windows Policy Loophole to Evade Detections and Deploy Malware

In a significant cybersecurity revelation, researchers have uncovered a large-scale campaign exploiting a Windows...

200 Malicious GitHub Repositories Distributing Malware to Developers

A sophisticated malware campaign dubbed GitVenom has infected over 200 GitHub repositories, targeting developers with fake...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Industrial Organizations Under Siege: Chinese Hackers Wield Advanced FatalRAT Malware

A recent investigation by Kaspersky ICS CERT has uncovered a sophisticated cyberattack targeting industrial...

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

The cryptocurrency sector faced one of its most significant security breaches this year as...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...