US Researchers Show Computers Can Be Hijacked to Send Data as Sound Waves

Advertisement
By Reuters | Updated: 5 August 2015 17:49 IST
A team of security researchers has demonstrated the ability to hijack standard equipment inside computers, printers and millions of other devices in order to send information out of an office through sound waves.

The attack program takes control of the physical prongs on general-purpose input/output circuits and vibrates them at a frequency of the researchers' choosing, which can be audible or not. The vibrations can be picked up with an AM radio antenna a short distance away.

For decades, spy agencies and researchers have sought arcane ways of extracting information from keyboards and the like, successfully capturing light, heat and other emanations that allow the receivers to reconstruct content.

The new makeshift transmitting antenna, dubbed "Funtenna" by lead researcher Ang Cui of Red Balloon Security, adds another potential channel that likewise be would be hard to detect because no traffic logs would catch data leaving the premises.

Advertisement

Cui showed the system in action for a few reporters ahead of his talk Wednesday at the annual security conference Black Hat in Las Vegas. He said he would release "proof-of-concept" code after the talk, allowing other researchers and potentially malicious hackers to build on his work.

Advertisement

Hackers would need an antenna close to the targeted building to pick up the sound waves, Cui said, and they would need to find some way to get inside a targeted machine and convert the desired data to the format for transmission.

But the tool's development over the past two years is another illustration that a broadening array of devices can be manipulated in unpredictable ways and that attackers increase their advantage over defenders as gadgets grow more complex.

Advertisement

© Thomson Reuters 2015

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Black Hat, Cyber Attack, Internet
Advertisement

Related Stories

Popular Mobile Brands
  1. DoT's SIM Binding Rule Explained: How Messaging Apps Will Verify Users
  2. Realme C83 5G Debuts in India With a 7,000mAh Battery at This Price
  3. Google Pixel 10a Review: More of the Same?
  4. OTT Releases This Week: Gandhi Talks, Subedaar, War Machine, Hello Bachhon, and More
  5. Here's When the Poco C85x 5G Will be Launched in India
  6. The Upcoming Poco X8 Pro Series Could be Launched Globally on This Date
  7. iPhone 17e vs OnePlus 15R vs iQOO 15R: Price in India, Features Compared
  1. Vivo X300 Max With Zeiss Cameras and Android 16 Spotted at MWC 2026, Could Launch Soon
  2. WhatsApp Update Introduces Support for Discovering Stickers While Typing Emoji: How It Works
  3. This AI-Powered Portable Device Claims to Detect Microphones and Jam Audio Recordings
  4. Poco X8 Pro Series Global Launch Date Leaked Ahead of Anticipated Debut: Expected Price, Specifications
  5. MacBook Neo Geekbench Scores Indicate It Performs on Par With iPhone 16 Pro Max
  6. Xiaomi Testing Experimental AI Agent Miclaw, Can Perform Complex Tasks Across Devices
  7. Dear Radhi OTT Release: Where to Watch the Tamil Thriller Online?
  8. With Love Now Streaming on Netflix: Know Everything About Plot, Cast, and More
  9. Kaattaan OTT Release Date Confirmed: When and Where to Watch Vijay Sethupathi Starrer Online?
  10. OnePlus 15T Display Size, Ultrasonic Fingerprint Sensor Confirmed; Geekbench Listing Hints at Chip, Memory
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.