Sunday, April 27, 2025
HomeCyber AttackLamphone - New Attacks Let Hackers Remotely Listen to Your Conversation While...

Lamphone – New Attacks Let Hackers Remotely Listen to Your Conversation While You Speak by Watching Light Bulb

Published on

SIEM as a Service

Follow Us on Google News

Researchers uncovered a new type of attack named “Lamphone” let hackers spy and listen your private conversation by watching light bubs.

Nowadays, hackers are improving their methods at an increasing rate, and as a result, now they started the method of eavesdropping. Well, you might be thinking about how do they do it? Is it possible? 

Well, it is possible just with the help of a small bulb. You can spy on any secret conversations that are happening in a place or room from a nearby isolated location just by perceiving a light bulb hanging in there—visible from a window and estimating the volume of light it transmits.

- Advertisement - Google News

Recently, a cybersecurity researcher team has discovered and illustrated a novel side-channel attacking method that can be utilized by eavesdroppers to collect full sound from a victim’s room that holds an overhead hanging bulb. 

One of the security researchers, from Israeli’s Ben-Gurion University of the Negev and the Weizmann Institute of Science, reported a new system for long-distance eavesdropping, which was named as “Lamphone.”

In this method, it enables anyone with a laptop and less than a thousand dollars of stuff, like a telescope and a $400 electro-optical sensor, will serve the threat actors to listen any sounds in a room that’s hundreds of meters away in real-time, just by observing the vibrations that are produced on the glass surface of a light bulb present inside the room.

How ‘Lamphone’ Attack Work?

The Lamphone is a new type of attack that occurs in remote areas. Well, in this type of attack, it connects on identifying vibrations from hanging bulbs as an effect of air pressure variations. 

When the vacillations hit their surfaces, these sound waves transpire and simply trigger hall to the attacker to collect the fragments of the on-going conversations. According to the security experts, this method could only be applied when the victim is inside the room or any office.

Well, to operate this method, the setup needs a telescope as it provides a close-up view of the room, holding the bulb from a distance. It also needs an electro-optical sensor that’s installed on the telescope to transform the light into an electrical current.

Moreover, it requires an analog-to-digital converter to convert the sensor output to a digital signal, and more importantly, a laptop that will carry out the incoming optical signals and output the collected sound data.

Demonstration of Lamphone Attack

The security experts demonstrated the Lamphone attack by showing a proper video explanation, that we have mentioned below to make the viewers understand clearly about the Lamphone attack:-

Here, the security experts have taken a statement made by the US President, Donald Trump, “We will make America great again.” Anyone can easily copy this speech of the President via Google’s Speech to Text API.

Moreover, the experts have also generated the audio of the Beatles’ “Let It Be” and Coldplay’s “Clocks,” which are remarkably clear and smooth, as anyone can quickly identify the song.

Here in this event, to recover the collected sound from the visual measures acquired from the vibrations of a light bulb and caught by the electro-optical sensor, the security researchers create an algorithm to obtain the sound via bulb.

Though the Lamphone attack could allow some new spying methods to hackers, but this type of method could be prevented quite easily. Here, to do so, all you have to do is to switch off the lights, so there are no visible changes in light to operate along with the acoustic vibrations, even you can also remove the bulbs as well. 

You must be known to the fact that this whole operation revolves around the outcome of the light bulb. In short, it’s not so critical, but we should always stay aware of these types of threats, as, with each passing day, hackers and their methods are constantly evolving.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read:

VLC Vulnerability Let Remote Hackers to Execute Arbitrary Code with User Privilege

Ripple20 – 19 zero-day vulnerabilities Affects Billions of IoT Devices

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

The cybersecurity landscape faces an escalating crisis as AgeoStealer joins the ranks of advanced...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Russian Hackers Attempt to Sabotage Digital Control Systems of Dutch Public Service

The Dutch Defense Ministry has revealed that critical infrastructure, democratic processes, and North Sea...