The researchers discovered a new type of attack called "lamphone" that hackers can use to spy on and listen to your private conversations by watching light bubbles.
Nowadays, hackers are improving their methods with increasing speed, and as a result, they have started to use eavesdropping. Well, could you think about how to do it? Is it possible?
Well, it's only possible with the help of a small light bulb. You can spy on all the secret conversations that are taking place in one place or in a room from a nearby isolated place by perceiving a light bulb that is visible from a window and estimating the volume of light that is passing through it.
A team of cybersecurity researchers recently discovered and illustrated a novel side-channel attack method that eavesdroppers can use to collect the full sound from a victim's room, which contains a light bulb hanging overhead.
One of the security researchers at the Israeli Ben-Gurion University of the Negev and the Weizmann Institute of Science reported a new long-distance eavesdropping system known as the "Lamphone".
Using this method, anyone with a laptop and less than a thousand dollars on things like a telescope and a $ 400 electro-optical sensor can give threat actors the opportunity to hear sounds in a room hundreds of meters away. Time, only by observing the vibrations that are generated on the glass surface of a light bulb in the room.
How does a lamphone attack work?
The lamphone is a new type of attack that occurs in remote areas. Well, with this type of attack, it depends on identifying hanging light bulb vibrations as the effect of fluctuations in air pressure.
When the fluctuations hit their surface, these sound waves occur and simply trigger a hall for the attacker to collect the fragments of the ongoing conversations. According to security experts, this method could only be used when the victim was in the room or in an office.
To use this method, the setup requires a telescope because it offers a close-up view of the room and holds the light bulb from a distance. In addition, an electro-optical sensor is required, which is installed on the telescope in order to convert the light into electrical current.
In addition, an analog-to-digital converter is required to convert the sensor output into a digital signal, and above all a laptop that carries out the incoming optical signals and outputs the collected sound data.
Demonstration of the Lamphone attack
The security experts demonstrated the lamphone attack by showing a correct video explanation that we mentioned below so that viewers clearly understood the lamphone attack: –
Here, security experts made a statement by US President Donald Trump: "We will make America great again." Anyone can easily copy this President's speech through Google's Speech to Text API.
In addition, the experts also generated the audio of the Beatles "Let It Be" and Coldplay's "Clocks", which are remarkably clear and fluid because everyone can quickly identify the song.
In this case, the security researchers in this case create an algorithm to receive the sound via a light bulb in order to restore the collected sound from the visual measures that are obtained from the vibrations of a light bulb and are detected by the electro-optical sensor.
Although the lamphone attack could allow hackers some new methods of espionage, this type of method could be easily prevented. To do this, all you have to do is turn off the light so that there are no visible light changes that occur along with the acoustic vibrations. You can also remove the light bulbs.
You need to know that this whole process is about the result of the light bulb. In short, it's not that critical, but we should always be aware of these types of threats as hackers and their methods evolve every day.
You can follow us on Linkedin, Twitter, Facebook for daily cyber security and hacking news updates.
VLC Vulnerability Allow remote hackers to run arbitrary code with user rights
Ripple20 – 19 zero-day vulnerabilities affect billions of IoT devices