Friday, January 31, 2025
HomeComputer SecurityLight Commands - Hackers Can use Light to Inject Arbitrary voice-command and...

Light Commands – Hackers Can use Light to Inject Arbitrary voice-command and hack Alexa, Siri, and Other VA

Published on

SIEM as a Service

Follow Us on Google News

Light Commands, a new attack that lets an attacker inject arbitrary audio signals into voice assistants by using light from a very long distance.

Security researchers from the University of Electro-Communications & Michigan discovered the new class of the injection attack dubbed “Light Commands” a vulnerability in MEMS microphones that allow attackers to inject inaudible and invisible commands into voice assistants.

To launch an attack, the attacker needs to transmit a light modulated audio signal, which later converts to the original audio signal within a microphone.

Audio Injection Using Laser Light

Researchers identified a vulnerability in MEMS (micro-electro-mechanical systems) microphone, that responds to light if it has a sound, by exploiting this sound can be injected into microphones by modulating the amplitude of laser light.

Light Commands
Attack Setup

Attackers can remotely send invisible and inaudible signals to smart home devices such as Alexa, Portal, Google assistant or Siri. The Voice Controller systems lack authentication mechanisms, which allows an attacker to hijack the devices and they can perform the following functions.

  • Control smart home switches
  • Open smart garage doors
  • Make online purchases
  • Remotely unlock and start certain vehicles
  • Open smart locks by stealthily brute-forcing the user’s PIN

To exploit the attack no physical access or user interaction is required, all attacker needs to have is the line of sight access to the target device and its microphone ports. Researchers confirm that attack works with 110 meters long and published a PDF paper with details.

The important concern with the attack type is careful aiming is required for light commands to work, researchers found following voice recognition systems are suspectable to the attacks.

Light Commands
Affected Devices

Attackers mount the attack using a simple laser pointer, laser driver, sound amplifier and a telephoto lens. To build the setup it costs $584.93. Researchers confirmed that this light-based injection vulnerability was not maliciously exploited.

Light Commands
Components used

Light Commands – Mitigations Suggested

Researchers suggested to set up a PIN or a security question before executing the commands.

By applying physical barriers, you can restrict light waves reaching the devices.

The LightCommands attack was demonstrated on many voice-controllable systems such as Siri, Portal, Google Assistant, and Alexa. The attack successful at a maximum distance of 100M and even penetrate through the glass window.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates

Also Read

Hackers Can Exfiltrate & Transfer the Sensitive Data using Smart Bulbs Lights

New Research Shows Smart Light Can Be Used To Steal User’s Private Data Invisibly

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...