HomeAndroid Newshas been discovered in South Korea and can use your PC speaker...

has been discovered in South Korea and can use your PC speaker to empty your account


Cybersecurity researchers have discovered a new type of attack that uses ultrasound to steal your most sensitive data.

This is Casper: he has been discovered in South Korea and can use your PC speaker to empty your account
Casper is the name with which researchers have baptized this new type of attack

Cybercriminals spend a good part of their lives looking for new ways to carry out attacks with which to obtain sensitive information from users of mobile devices, tablets or PCs and thus obtain an economic benefit. But security measures are increasingly advanced, and these should devise increasingly sophisticated attacks.

Recently, the specialized cybersecurity division of the University of South Korea in Seoul has discovered a new type of attack that uses the internal speakers integrated into some devices, such as smartphones or laptops, to steal sensitive information of users stored in them.

The attack is carried out by transmitting binary code through ultrasound through the speakers of the victim’s device. These ultrasounds are captured by the attacker’s microphonewhich may be located at a distance of up to a meter and a half of the team that is intended to attack.

The attack that you will not hear coming: they discover how to use ultrasound to steal information from your mobile

Just like researchers have revealed, the “CASPER” attack is capable of taking advantage of a device’s internal speakers as a transmission channel. Since they are used high frequencies that the human ear cannot pick upthe attack is carried out without the user noticing.

To demonstrate how the attack worked, various tests were carried out on several different pieces of equipment, including a smartphone Samsung Galaxy Z Flip3used for capture the sound through your speaker using a simple voice recorder app.

The researchers were able to transmit from single words and more complex texts. Nevertheless, efficiency is reduced the longer the bit length of the information is that is intended to be captured, and they recognize that the maximum transfer speed that can be achieved is 20 bits per second with a bit length of 50 milliseconds, at a distance of 1.5 meters from the computer.

In order to carry out such an attack, the attacker must have physical access to the victim’s computer in order to install the software responsible for transmit the information through morse code emitted with ultrasound. Once the computer is infected, the malware could autonomously enumerate the file system, locate files or file types that match a hardcoded listor even carry out “keylogging” tasks to steal user passwords, including those used to access their banking entities. If it spreads, this attack could certainly become one of the most dangerous today.

In order to prevent attacks of this type, the researchers recommend cutting your losses and eliminating physical speakers present in some equipment. Of course, this is a recommendation addressed to personnel involved in critical missionsand it does not mean that you should disassemble your PC to remove the speakers.

Mr.Mario
Mr.Mario
I am a tech enthusiast, cinema lover, and news follower. and i loved to be stay updated with the latest tech trends and developments. With a passion for cyber security, I continuously seeks new knowledge and enjoys learning new things.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Must Read