Articles Blog

Hackers Can Now Break Into Your Phone Using Music

Hackers Can Now Break Into Your Phone Using Music

With so much important stuff on your phone,
companies have gone to great lengths to make them secure. They’ve taken steps to keep hackers from
breaking into your phone, either physically or digitally, but what about audibly? Researchers from the University of Michigan
and the University of South Carolina have found it’s possible to hack your phone using
sound. The process works by tricking the phone’s
accelerometer, the hardware that senses movement and a word you’re going to hate by the end
of this episode. You know when you flip your phone sideways
and it switches to landscape mode? That’s because of the accelerometer. That’s twice we said it already. The researchers tested 20 accelerometer models
from 5 different manufacturers by playing certain sounds over a cheap speaker. They found 65% of them could be manipulated
with a sonic attack. This isn’t an entirely new concept; previous
research has demonstrated that sound waves could be used to disable accelerometers entirely. What this research shows is that accelerometers
can be finely controlled with sound too, not just shut down. The vulnerability comes from a simple oversight:
manufacturers didn’t expect anybody to monkey with the accelerometer, so the software that
interprets the input takes it as gospel. Of course an attack like this can only affect
software that relies on the accelerometer, so it can’t be used to steal your personal
info or anything like that. The scientists demonstrated that sound could
be used to drive an radio controlled car that was controlled by a phone, or hack a fitbit
into counting steps while it was sitting still. Just be lazy but tell yourself you worked. Awright so that doesn’t sound that alarming,
but this could go beyond just phones. Self driving cars rely on a suite of sensors
including accelerometers and so they could be at risk. You don’t want somebody meddling with how
your car drives in any circumstance, but doubly so when you’re not steering it. The researchers imagined other nefarious uses
for this exploit. For example, if an insulin pump relies on
an accelerometer to automate dosage, tampering with it could be fatal. The good news is most of these attacks can
be thwarted with software rather than hardware, and the researchers contacted the manufacturers
of the accelerometers with recommendations on how to fix the flaws in their designs. This technique was also only tested on one
of the major types of accelerometers, called a capacitance accelerometer, which works by
moving small masses around. The most common technology relies on piezoelectric
accelerometers instead, where microscopic crystals become stressed by acceleration and
create a voltage that is interpreted by a chip. The researchers say sound waves could move
the small masses inside a capacitance accelerometer, but it’s unclear if the same trick would work
on these crystals. Hacking phones with sound actually has a long
and illustrious history. Starting in the 1950s people who called themselves
phreakers with (a “PH”) figured out how to game the telephone system to make free
calls using nothing but sound. Telephone systems used precise frequencies
to route calls, it’s why your phone’s buttons make specific tones when you press
them. So by playing the right frequencies into the
receiver, phreakers could connect to whomever they liked. These people were like proto-hackers, with
anonymous personas and everything. Two phreakers who would later become famous
were a couple teenagers named Steve Wozniak and Steve Jobs. Long before Apple, the two experimented with
creating digital circuits that could create tones to hack phones. One of their first business ventures was selling
homemade phreaking boxes, which actually caught the attention of the FBI, though they never
caught the Steves. It’s a bit ironic that 40 years after Steve
Jobs toyed around with phreaking, people might be figuring out how to use sound to hack the
phones he helped create. Special thanks to our sponsor, Domain dot
com. When you buy a domain name from Domain Dot
Com, you’re taking the first steps in creating an identity and vision for your brand. No domain extension will help tell your story
like a DOT COM or DOT NET domain name. Get 15% off Domain Dot Com’s already affordable
domain names and web hosting when you use coupon code SEEKER at checkout. If you want to learn why it’s hard to hack
into a phone with software, check out Julian’s video on iphone encryption here. Ok I know I said accelerometer a lot, but
I couldn’t help it, there is literally no synonym for accelerometer. How many times do you think I said it? Let us know in the comments and go ahead and
subscribe while you’re down there. Thanks for watching Seeker! Accelerometer.

100 thoughts on “Hackers Can Now Break Into Your Phone Using Music”

  1. Wait, so you're saying that you can inject code through the accelerometer? That's just wildly inaccurate.
    The research showed you can make an accelerometer give false readings. But the readings of a sensor like that are always just numbers, they're never interpreted as text, much less as code.

  2. So in other words: No, hackers can not break into our phones by using music. #StopClickBait
    This interests me and I would have watched the video anyways, but stop with the lies and stupid clickbait.

  3. Do you know that you just teach some hackers better way to hack!😐But I do not have anything to hide on my phone,so it is not a big deal to me!πŸ˜„

  4. A recent breakthrough was made on negative mass pls do a video on '' how would negative mass behave '' πŸ™πŸ™πŸ™

  5. Except they've been able to do this for years. It's just that back then people would laugh at you for saying it.

  6. I have three questions:

    1: Where's Trace, Lisette, Tara, Laura, Jules, Julia and all the other hosts from Test Tube?
    2: Why did you sell Seeker Daily/Test Tube to the crappy SJW whiners at Now This?
    3: Will it ever be the same as it was?

  7. Phreakers in the '50s? DTMF wasn't introduced by Bell until late 1963, although research into this method began in the early 1940s.

  8. key statement… "the researchers imagined". yes they did. as one who works with accelerometers i can tell you that most of these problems are extinct. or technically extremely difficult to do the simplest things. sound pollution makes aural hacking very difficult. it is way easier to use social engineering to hack phones.

  9. I once accidentally tricked my phone's step counter into thinking I ran 100,000 steps in less than 10 minutes because I was bouncing my leg that had the phone in the pants pocket.

  10. like she said its not new, a hacker can really access more than what she said. speaking of haxor and hackers have made benefits you enjoy in life

  11. noooooooo a hacker can now remotely set my screen to landscape temporarly (with a chance of 65%) and i can turn it of by disabling screen-turn!!!

  12. This leads to potential buffer overflow exploits in poorly programmed applications. You may be able to send more data than the app can handle.Again, it shouldn't be an issue with properly programmed buffers. If a program copies all data received to a buffer then processes it, if you can make it not clear the buffer fast enough (aka lag), you can theoretically overflow the buffer.

  13. you guys changed your name to seeker??!!??
    for the whole 2 months I was ignoring the videos in my feed thinking some guy is stealing your videos and uploading it, and wondering what happened to the original channel…

  14. I like how she brings up Steve Wozniak and Steve Jobs but no mention of the real phone phreaker Kevin Mitnick. At one point "Captain Crunch" was one of the world's most wanted hackers and they can't even credit him.

  15. I cringed when she said "what about audibly?" That's a horribly stupid thing to say, because sound is physical, but the context makes it seem as if it is not.

  16. Someone body ounce told me I ain't the sharpest tool in the shed ( all your money stolen )

  17. So someone can manipulate my quadcopter (drone) because that uses an accelerometer to stabilise it self

  18. i used to watch this channel alot but when i made a new acount i forgot about it but now why did the name change

  19. Mmm why your eyeballs don't move? Straight steer? Just asking 😳 one move? Are really smart😳 or karaoke 🎀 reading

  20. There are many old researches about manupilating uP/uC with sound waves. Thats not new. Please do some research before serving something as "NEW".

  21. Theoretically you can use a buffer overflow to execute arbitrary code with "music" (glitching noises that sound like an old modem)

Leave a Reply

Your email address will not be published. Required fields are marked *