Researchers uncover new exploits in voice-powered assistants like Amazon Alexa or Google Assistant

'Voice squatting' and 'voice masquerading' are new methods attackers can use to steal users' information

Researchers have discovered two new vulnerabilities in voice-powered assistants, like Amazon Alexa or Google Assistant, that can allow attackers to steal sensitive information.

Dubbed 'voice squatting' and 'voice masquerading', these exploits allow threat actors to take advantage of the way Virtual Personal Assistants (VPAs) embedded in smart speakers process voice commands, exploiting users' misconceptions about how they work.

In the first security analysis of the VPA ecosystem, researchers from Indiana University, the Chinese Academy of Science, and the University of Virginia demonstrated how VPAs could be tricked by simple homophones - words that sound the same but have different meanings.

The white paper outlined an example of 'voice squatting' - in which the voice assistant could mistake a command such as "Alexa, open Capital One" with that invoking "Capital Won" should an attacker create a malicious app with a similarly-sounding name.

Featured in a blogpost on Malwarebytes Labs, a company offering antivirus software, 'voice squatting' is described as a method which exploits the way a skill or action is invoked.

Indeed, the researchers demonstrated this in a real-world example by registering five new skills with Amazon designed to emulate the widely-popular Sleep and Relaxation Sounds. These fake skills, which passed Amazon's vetting process, used similar invocation names and were found to have been invoked by a high proportion of users.

'Voice Masquerading' meanwhile is a method which involves a malicious skill impersonating a legitimate skill to either trick a user into reading out personal information or account credentials or to listen in on conversations.

The two methods identified were 'in-communication skill switch', which takes advantage of the false assumption that smart assistants readily switch from one skill to another once users invoke a new one, and 'faking termination', in which a malicious app can exploit some skills' ability to self-terminate upon registering a command such as "goodbye" by remaining active and running in the background.

"With the importance of the findings reported by the study, we only made a first step towards fully understanding the security risks of VPA IoT systems and effectively mitigating such risks," the research concluded, adding: "Further research is needed to better protect the voice channel, authenticating the parties involved without undermining the usability of the VPA systems."

"Smart assistants and IoT, in general, are still fairly new tech, so we expect improvements in the AI, and the security and privacy efforts within this sector," Malwarebytes wrote in its blog. "Both Amazon and Google have claimed they already have protections against voice squatting and voice masquerading.

"While it is true that the researchers had already met with both firms to help them understand these threats further and offer them mitigating steps, they remain skeptical about whether the protections put in place are indeed adequate."

As voice-powered assistants are increasingly deployed, flaws have increasingly been featured in reports - with perhaps the most high-profile incident this year involving Alexa randomly laughing without prompt.

A Google spokesperson told IT Pro this was an area Google takes very seriously, providing a link to its policies for actions on Google.

Under deceptive behaviour, the policy says: "We don't allow Actions that attempt to deceive users. Actions must provide accurate disclosure of their functionality and perform as reasonably expected by the user.

"Actions must not attempt to mimic system functionality or warnings of any kind. Any changes to device settings must be made with the user's knowledge and consent and be easily reversible by the user."

A spokesperson from Amazon said: "Customer trust is important to us, and we conduct security reviews as part of the skill certification process.We have mitigations in place to detect this type of skill behavior and reject or remove them when identified."

Picture: Shutterstock

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021