The sound of destruction: Malicious video, audio files could attack laptops

Apple MacBook Gold 2015 speaker grill 2
Bill Roberson/Digital Trends

If someone sends you an email with a video or audio file, you might want to think twice before hitting play. Researchers from the University of Michigan and China’s Zhejiang University have discovered that attackers can use certain sounds played through your PC speakers to cause physical damage to hard drives, which might lead to data corruption. The attacks could possibly target PCs, medical devices, and surveillance systems that rely on magnetic disk drives.

These malicious audio files contain ultrasonic and sonic sounds, and playing the file for as little as 12 seconds was enough to cause damage to a PC’s drive, The Independent reported. In addition to physical drive damage, the acoustics could also lead to file corruptions by disrupting the drives to the point that they can no longer write data.

“Intentional acoustic interference causes unusual errors in the mechanics of magnetic hard disk drives in desktop and laptop computers, leading to damage to integrity and availability in both hardware and software such as file system corruption and operating system reboots,” the researchers wrote in their paper. “An adversary without any special-purpose equipment can co-opt built-in speakers or nearby emitters to cause persistent errors.”

In order for the attack to work, the acoustic vibrations must be strong enough and the attack must be difficult to detect or stop. The researchers found that the sound waves cause the head stack assembly to vibrate outside of the operational bounds, resulting in a head crash on a hard drive. These physical drive errors can lead to data corruption at the application or operating system levels.

Given that most modern laptops and a number of desktops now rely on solid-state drives for data storage, consumers working on a newer PC shouldn’t be vulnerable to these types of attack. If you’re on an older PC or rely on a hard disk drive for backups, you may still be affected if someone sends you a malicious audio file. However, hospitals and data centers are still vulnerable because of the high use of magnetic disk systems in those environments, the researchers said.

To mitigate attacks, researchers have created a new sensor fusion model that could be delivered through a firmware update. Using a new feedback controller, once malicious ultrasonic waves are detected, the firmware would help prevent unnecessary head parking in the hard drive.

Product Review

Razer just made our favorite gaming laptop even more powerful than before

The Razer Blade, our favorite gaming laptop, is now more powerful than ever before. That’s thanks to the new Nvidia RTX graphics cards inside. Do they help Razer retain its edge over the competition?
Home Theater

Here's a handy guide to mirroring your favorite devices to your TV screen

A vast arsenal of devices exists to allow sending anything on your mobile device (or PC) to your TV. Our in-depth guide shows you how to mirror content from your smartphone or tablet to the big screen.

Don't take your provider's word for it. Here's how to test your internet speed

If you're worried that you aren't getting the most from your internet package, speed tests are a great way to find out what your real connection is capable of. Here are the best internet speed tests available today.

Here's our take on the best game-streaming services currently out there

You can still get your physical video game discs or cartridges at your local store or download games digitally, but another option is even more convenient: Game streaming. Here are the best game streaming services.

Windows updates shouldn't cause problems, but if they do, here's how to fix them

Windows update not working? It's a more common problem than you might think. Fortunately, there are a few steps you can take to troubleshoot it and in this guide we'll break them down for you step by step.

Lost your router? Here's how to find its IP address to help track it down

Changing the login information for your router isn't always easy, that's why so many have that little card on the back. But in order to use it, you need to know where to go. Here's how to find the IP address of your router.

Between Intel and AMD, these are the best gaming CPUs at every price

What are the best processors for gaming you can buy? You don't need to spend a fortune to get an amazing gaming CPU and now that AMD is competitive again, there are more choices than ever.

Our favorite Chrome themes add some much-needed pizzazz to your boring browser

Sometimes you just want Chrome to show a little personality and ditch the grayscale for something a little more lively. Lucky for you, we've sorted through the Chrome Web Store to find best Chrome themes available.

Here's our guide to how to charge your laptop using a USB-C cable

Charging via USB-C is a great way to power up your laptop. It only takes one cable and you can use the same one for data as well as power -- perfect for new devices with limited port options.

Get the best of both worlds by sharing your data on MacOS and Windows

Compatibility issues between Microsoft Windows and Apple MacOS may have diminished sharply over the years, but that doesn't mean they've completely disappeared. Here's how to make an external drive work between both operating systems.

Is Ice Lake coming soon? Here's what we know about Intel's future chip design

Intel's Ice Lake may end up launching before the architecture it was supposed to replace. With hints of more announcements about the chip design in the very near future, here's everything you need to know about Ice Lake.

Apple is reportedly set to showcase a new Mac Pro at WWDC 2019 in June

Our Mac Pro 2019 rumor roundup covers all the news, leaks, and rumors about Apple's new machine, set to be announced sometime in 2019. Here's what Apple has said, what the experts think, and what we're likely to see with the new Mac Pro.

Potentially malicious WinRAR vulnerability patched after almost 20 years

WinRAR, a piece of Windows software for managing archival formats, has been harboring a vulnerability for nearly two decades, potentially allowing malicious software to insert items into a computer's startup folder without user permission.

Learn to uninstall a Steam game and clear some space on your PC

Looking to learn how to uninstall Steam games? You've come to the right place. In this guide, we walk you through the process step by step, whether you want Steam to do it for you or handle the process manually.