Service receive & sending SMS

Malicious software reconfigures headphones to record sound

1278   |     /   Security

Malicious software reconfigures headphones to record sound
Want to listen to audio on your computer? You need speakers or headphones. Want to record a voice? Usually you need a microphone, but it turns out that your headphones are suitable for this.

Take a free phone number for SMS Ukraine and do not worry that your personal mobile number will fall into bad hands.

Researchers at Ben-Gurion University of the Negev have demonstrated proven malware that can turn headphones and speakers without power into microphones. It has long been known that this change in role has become possible. Speakers and microphones use similar components to process electrical signals and sound in very similar ways. Cone in dynamics? This is very similar to the diaphragm in a microphone.

The Realtek audio chipset has a feature that is used in the vast majority of computers, which allows the sockets to perform a dual function. All Ben-Gurion's team needed to figure out was how to secretly switch from output to input, and they could turn the output device into an input device. When testing them, a pair of ordinary Sennheiser headphones worked as well as a microphone, so that they could record the clear sound of the voice of a person who was 20 meters from the computer.

Their tricky hack, in some cases, may not even require connecting to an audio jack: all-in-one, laptops and tablets have built-in speakers. Leading researcher Mordechai Guri confirmed that they are all theoretically vulnerable to the same attack if they have a Realtek chip installed.

Scary, but Guri warns that there is no simple software fix. After all, this is not a traditional vulnerability. The ability to change the port function from input to output is part of the core functionality of Realtek chips.

Protecting yourself is not difficult

No matter how terrible it sounds that someone can listen to you through your headphones, this is pretty easy to prevent. Disabling the headphones or speakers when not in use will prevent this attack. Devices connected via Bluetooth and USB should also be protected from these kinds of attacks, like Apple headphones using the Lightning jack.

Similar news

Android Fortnite fans cheated by malware

Fortnite has around 45 million active players. However, it is available only for iOS. Epic Games has not yet announced anything official about the Android version. Tens of millions of impatient players are waiting for his appearance, scammers will be happy to fill this void (update: Epic Games announced that the Android version will appear this summer).

How to use Google Chrome instead of antivirus?

Over the past 9 plus years, Google Chrome has become one of the best and most popular web browsers in the world. One reason for its rapid growth was Google’s attention to security.

Hackers can use sound to destroy your computer.

There have long been hackers who have released malicious malware that can erase files from your hard drive. Now, security researchers have shown that your files may be damaged by sound.


This is not only a service for receiving and sending SMS messages to virtual numbers, but also a tutorial on user safety in the modern world, the latest developments in IT, social media security, fresh programs and lessons that simplify our lives. So are other issues encountered by the average user. In simple words, each user will find for themselves something interesting or answers to their questions.

SIMonline © 2018 - 2024

All rights reserved