Gadgets can be hacked to produce 'dangerous noises'

Hackers can force devices to emit sounds beyond their normal range

loud noise

Modern gadgets can be hacked to have their volume settings turned up to deafening and dangerous levels, research has revealed.

Hardware such as smart speakers, laptops, mobile phones, headphones and even PA systems can be remotely loaded with malware and turned into "offensive" low-grade cyber weapons.

Many of these devices were also found to have very few protections in place to stop themselves from being hacked.

What's more, exploiting this vulnerability could cause physical damage to the hardware and potentially disrupt individuals and organisations with disorientating levels of sound.

Advertisement
Advertisement - Article continues below

PwC researcher Matt Wixey found the issue while conducting an experiment into how malware can cause physical harm. He looked into whether the volume or speaker controls of a device could be manipulated to produce harmful high and low-frequency sounds.

For the research, he used custom-made viruses, known vulnerabilities and other exploits to take control of devices and change their volume levels for long periods.

"Some attacks leveraged known vulnerabilities in a particular device, which could be done locally or remotely in some cases," he told the BBC. "Other attacks would either require proximity to the device, or physical access to it.

In one example, Wixey used a program that scanned local Wi-Fi and Bluetooth networks for vulnerable speakers to take control of. In some cases, the tone from the gadget would only annoy or disorientate people, but at a sustained level the noise could be loud enough to damage hearing, he said.

In one case, a device stopped working after Wixey and his team made it emit a range of sounds over several minutes.

Hacking internet-enabled gadgets is nothing new, but Wixey's research highlights the physical risk unsecured devices poses - both to the device and the user.

And IoT threats are on the rise, with a report from F-Secure Labs in April suggesting that there were 19 variants of malware-based IoT threats in 2018, having only detected five the year before.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/antivirus/28144/best-antivirus
antivirus

Best antivirus for Windows 10

3 Sep 2019
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

8 Mar 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/mobile/mobile-phones/354273/pablo-escobars-brother-launches-budget-foldable-phone
Mobile Phones

Pablo Escobar's brother launches budget foldable phone

4 Dec 2019
Visit/network-internet/wifi-hotspots/354283/industrial-wi-fi-6-trial-reveals-blistering-speeds
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019