Skip to main content

Hackers can control your smartphone using sound waves from a $5 speaker

Hackers are developing new and improved ways to take control of your devices. The latest? Apparently, it’s by using sound waves.

Researchers have come up with a new way to hack all kinds of different devices and it’s a pretty complex system that basically imitates micro-electro-mechanical systems (MEMS) accelerometers — which is a chip in your device that lets phones and trackers know when they are moving and how quickly.

Recommended Videos

You would expect the system to use some pretty impressive tech, right? On the contrary, the hackers simply used a $5 speaker, which was able to blast as many as 20 different accelerometers from five different manufacturers with sound waves. Those frequencies were able to trick the sensors in devices like smartphones into doing a range of different things. Accelerometers are basically sensors suspended on a few different springs, and when the sound waves reach the chip, it moves — just like what would happen when you move.

“It’s like the opera singer who hits the note to break a wine glass, only in our case, we can spell out words,” Kevin Fu, author of the research paper and professor at the University of Michigan, told the New York Times. “You can think of it as a musical virus.”

So what exactly is the result of the hack? Well, the team was basically able to trick a phone into doing whatever they wanted. Specifically, the team was able to tell the phone to show a video or even control an app that controls a remote control car — all using only sound waves. That’s just the beginning, though — the team notes that if you had an app to start your car using the accelerometer when you shake your phone, you could potentially hack the phone to start the car.

It’s important to note that for now, this is only a proof of concept and it’s unlikely we’ll see hackers walking around with tiny speakers to control your phone. The fact is, however, that hacking methods are getting increasingly creative and complex.

Check out the video below to see the system in action.

Sonic Cyber Attacks on MEMS Accelerometers
Christian de Looper
Christian de Looper is a long-time freelance writer who has covered every facet of the consumer tech and electric vehicle…
This critical exploit could let hackers bypass your Mac’s defenses
A hacker typing on an Apple MacBook laptop while holding a phone. Both devices show code on their screens.

Microsoft has discovered a critical exploit in macOS that could grant hackers easy access to your Mac’s most important data. Dubbed ‘Migraine,’ it shows why it’s vital to update your Mac as soon as possible.

Migraine is so damaging because it can bypass Apple’s System Integrity Protection, or SIP for short. SIP is enabled by default on modern Macs and works by sandboxing sensitive parts of the computer from outside meddling. Only processes that are signed by Apple (or those with special privileges, like Apple installers) are allowed to alter something guarded by SIP.

Read more
Hackers are using a devious new trick to infect your devices
A person using a laptop with a set of code seen on the display.

Hackers have long used lookalike domain names to trick people into visiting malicious websites, but now the threat posed by this tactic could be about to ramp up significantly. That’s because two new domain name extensions have been approved which could lead to an epidemic of phishing attempts.

The two new top-level domains (TLDs) that are causing such consternation are the .zip and .mov extensions. They’ve just been introduced by Google alongside the .dad, .esq, .prof, .phd, .nexus, .foo names.

Read more
This Bing flaw let hackers change search results and steal your files
The new Bing preview screen appears on a Surface Laptop Studio.

A security researcher was recently able to change the top results in Microsoft’s Bing search engine and access any user’s private files, potentially putting millions of users at risk -- and all it took was logging into an unsecured web page.

The exploit was discovered by researcher Hillai Ben-Sasson at their team at Wiz, a cloud security firm. According to Ben-Sasson, it would not only allow an attacker to change Bing search results but would also grant them access to millions of users’ private files and data.

Read more