3. Voice assistants never sleep
Posted: Wed Feb 12, 2025 9:42 am
Armed with DolphinAttack technology, a hacker can force the voice assistant to visit a malicious website, spy on the user, enter false information and even carry out DDOS attacks, the researchers said.
While in standby, the voice assistant does not take any action, but this does not mean that it is not working. Like mobile phones, home assistants are sensors that absorb information about the owner and his habits. It is known that such information is valuable for advertisers, so manufacturers of “smart” speakers and other similar equipment that store information about users on their remote servers can become an ideal target for attackers.
“These devices are designed in such a way that they cannot be malta whatsapp data off - they are designed to listen constantly. As soon as you say a phrase or a keyword, they immediately start collecting data and sending it to the cloud. In essence, this is a forced architectural vulnerability of the voice machines that you have sheltered in your home,” Beeri said. It is also worth mentioning that assistants inadvertently reveal the owner’s identity even without hacking. This was demonstrated by the example with the voice message recording, when the system mistakenly perceived random words in the conversation as a command to send to a specific recipient.
4. Hackers can use voice assistants to bypass the security of other devices
Many hackers use code bases or parts of code bases to break into target devices such as phones or computers. According to Beeri, voice interaction technology increases the “surface of attack” when the owner of the device lowers the level of its security to make it more comfortable to use.
While in standby, the voice assistant does not take any action, but this does not mean that it is not working. Like mobile phones, home assistants are sensors that absorb information about the owner and his habits. It is known that such information is valuable for advertisers, so manufacturers of “smart” speakers and other similar equipment that store information about users on their remote servers can become an ideal target for attackers.
“These devices are designed in such a way that they cannot be malta whatsapp data off - they are designed to listen constantly. As soon as you say a phrase or a keyword, they immediately start collecting data and sending it to the cloud. In essence, this is a forced architectural vulnerability of the voice machines that you have sheltered in your home,” Beeri said. It is also worth mentioning that assistants inadvertently reveal the owner’s identity even without hacking. This was demonstrated by the example with the voice message recording, when the system mistakenly perceived random words in the conversation as a command to send to a specific recipient.
4. Hackers can use voice assistants to bypass the security of other devices
Many hackers use code bases or parts of code bases to break into target devices such as phones or computers. According to Beeri, voice interaction technology increases the “surface of attack” when the owner of the device lowers the level of its security to make it more comfortable to use.