Categories: NewsTechnology

Millions of Consumer Devices Vulnerable To Hacking Via Sound Waves

As if the world is not scary enough, researchers have found a way to illustrate how phones can be hacked by using sound waves. This is a very disturbing development to say the least, as it is seemingly impossible to protect against this type of behavior. Moreover, this technique can also be used to track consumers based on the GPS location of their mobile device.

Sound Waves Are A Threat To Mobile Devices

Having hackers infiltrate mobile and wearable devices has become a very real threat over the past few months. Not only are more mobile devices prone to hacking due to security concerns, but other attack vectors are becoming more prevalent as well in recent weeks. A new type of “exploit” revolves around the use of sound waves, which allows hackers to take control of the device in question. This vulnerability applies to phones, tablets, and wearable devices, all of which contain an accelerometer.

To be more specific, an accelerometer is a standard piece of hardware found in many consumer products these days. According to the researchers, they were able to manipulate said accelerator found in a Fitbit wearable to add extra steps to the user’s tally. While this is not a nefarious act that would cause long-term harm, it goes to show there is a vulnerability consumers need to be aware of at all times. However, a secondary test allowed the researchers to queue a music file on a smartphone without requiring physical access to the device.

Although both of these attacks are seemingly harmless, there is no limit as to what a hacker could do while controlling said device. In the case of a smartphone, copying sensitive information, listening in on phone calls, and stealing login credentials are all very real risks. Considering how the vulnerable type of accelerometer can be found in half of most commercial brands from five different chip makers, a lot of damage can be done by people abusing this exploit.

Our society relies more and more on mobile and wearable devices these days. Having so many products susceptible to an attack through sound waves is a great reason for concern, that much is certain. It is not a “doomsday” bug by any means, yet it highlights the bigger problem making this exploit possible in the first place. It is very well possible this vulnerability also applies to self-driving cars, for example.

Related Post

Speaking of controlling cars, the researchers successfully took control of a toy car. Rather than overloading the device’s processor, they took control of the device by forcing the accelerometer to generate false readings. The toy car is linked to a smartphone app, which facilitated this process by quite a margin. Consumers have to realize accelerometers are found on other devices as well, particularly in the medical sector. For example, it would not be impossible to increase an insulin dose by taking control of the system.

It is evident there are many dangers that could have a severe impact on our society. Some people will exploit these vulnerabilities without the intent to cause harm. Others will take things one step further, which may result in people losing their lives in the process. No one expected an accelerometer to be the cause of so much potential damage. Then again, it remains to be seen how chip manufacturers will respond to these findings and whether or not they can address these issues sooner rather than later.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Standard Chartered and Coinbase Deepen Institutional Crypto Partnership

Standard Chartered and Coinbase are pushing their institutional crypto relationship into a new phase. On…

13 hours ago

OKX Breaks Silence on MANTRA Incident as Evidence Points to Coordinated Market Manipulation

OKX has issued a detailed public statement addressing the events surrounding the MANTRA (OM) market…

13 hours ago

Ethereum Proposes ERC-8092 to Solve Onchain Identity Fragmentation

Ethereum is preparing a deep structural upgrade. Not to gas fees. Not to throughput. To…

2 days ago

Pyth Network Activates Token Buybacks as Real Revenue Crosses $1M ARR

Pyth Network is taking a decisive step toward sustainable value accrual. The oracle network announced…

3 days ago

Tether Makes €1B Play for Juventus , Exor Shuts the Door

Tether has made one of the boldest moves yet by a crypto-native company into legacy…

3 days ago

10 Trusted Cloud Mining Platforms to Earn Free Bitcoin Daily in 2026

  Cloud mining continues to gain massive traction as 2026 inches closer. In tough economic…

3 days ago