Hackers Can Turn Amazon Echo Into a Covert Listening Device (helpnetsecurity.com) 114
Orome1 shares a report from Help Net Security: New research released by MWR InfoSecurity reveals how attackers can compromise the Amazon Echo and turn it into a covert listening device, without affecting its overall functionality. Found to be susceptible to a physical attack, which allows an attacker to gain a root shell on the Linux Operating Systems and install malware, the Amazon Echo would enable hackers to covertly monitor and listen in on users and steal private data without their permission or knowledge. By removing the rubber base at the bottom of the Amazon Echo, the research team could access the 18 debug pads and directly boot into the firmware of the device, via an external SD card, and install persistent malware without leaving any physical evidence of tampering. This gained them remote root shell access and enabled them to access the "always listening" microphones. Following a full examination of the process running on the device and the associated scripts, MWR's researchers investigated how the audio media was being passed and buffered between the processes and the tools used to do so. Then they developed scripts that leveraged tools embedded on the device to stream the microphone audio to a remote server without affecting the functionality of the device itself. The raw data was then sampled via a remote device, where a decision could then be made as to play it out of the speakers on the remote device or save the audio as a WAV file. The vulnerability has been confirmed to affect the 2015 and 2016 editions of the device. The 2017 edition of the Amazon Echo is not vulnerable to this physical attack. The smaller Amazon Dot model also does not carry the vulnerability. More technical details can be found here.
News! (Score:5, Insightful)
Re: (Score:2)
Hackers can turn your laptop camera into a surveillance device, this has been foiled by smart people with tape.
Echo and Google Home users should submerse their devices in a bucket of oil when not in use; please don't use water as this may cause a power short.
Re:News! (Score:5, Insightful)
The "hack" described in TFA requires physical access to the device. Anything can be compromised by someone with physical access. For instance, I can "hack" the smart-lock on your front door with my sledgehammer.
Re: (Score:2)
Can you hack space time? You have physical access. Where's your teleportation device? Your time machine?
DIDN'T THINK SO.
Re: (Score:3)
If YOU made a time machine, would YOU tell anybody?
DIDN'T THINK SO.
Re: (Score:3, Funny)
Re: (Score:2)
Of course I would. And every time I would say "I told you so yesterday!", and then go back and do it.
And you could have changed your present. Then you may not be able to say "I told you so yesterday!" because the person may not see or talk to you again.
Re: (Score:2)
If YOU made a time machine, would YOU tell anybody?
DIDN'T THINK SO.
Not intentionally, but that shit can't be kept secret.
FACT: The reason we don't have backwards time travel is because it's always eventually used to go back in time and prevent it from ever being invented.
Re: (Score:2)
I'm pretty sure I eventually invent time-travel, and spend the rest of my life carefully guiding myself to the discovery faster and cheaper than I had originally done. In fact, I bet soon I'll find a way to stop myself from writing this slashdot post.
Re: (Score:2)
Can you hack space time?
By whacking you in the head with the same hammer, I can magically transport you 30 minutes into the future.
Re: (Score:2)
Exactly. If a "hacker" gained that much access to a device inside your house, they could just as easily plant their own bug inside that or any other appliance or household decoration.
How is this new or surprising? Is this just propaganda in support of EUFI?
Re: (Score:2)
I could turn your completely offline device into a covert listening device if I had access to it for 5minutes.
This has been the stuff of spy agencies since they first existed.
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: (Score:1)
Re: News! (Score:1)
Re: (Score:1)
Re: (Score:2)
The "hack" described in TFA requires physical access to the device. Anything can be compromised by someone with physical access.
This is true, but the attack on the Echo appears to be unnecessarily easy. Debug pads should not be left enabled in production devices.
Re: (Score:2)
This is true, but the attack on the Echo appears to be unnecessarily easy. Debug pads should not be left enabled in production devices.
FUCK THAT. Debug pads should be left enabled in ALL DEVICES. That's needed for the ability to make many types of repairs and modifications. It's irrelevant because the manufacturer leaves them there on purpose, so that they can troubleshoot and analyze problems in devices returned by customers. Not so that they can repair and resell them, although they may actually come in handy for that purpose as well, but so that they can figure out what they did wrong and fix it in the next revision.
It has always been a
Re: (Score:2)
This is true, but the attack on the Echo appears to be unnecessarily easy. Debug pads should not be left enabled in production devices.
FUCK THAT. Debug pads should be left enabled in ALL DEVICES.
I completely, and deeply, disagree, at least on any device that manages sensitive user information.
Re: (Score:3)
I completely, and deeply, disagree, at least on any device that manages sensitive user information.
Security through obscurity is not security. It's false.
Re: (Score:2)
Re: (Score:2)
>"Echo and Google Home users should submerse their devices in a bucket of oil when not in use;"
Consumers should just insist on all such devices having a PHYSICAL microphone OFF button. It really is that simple. Of course, many won't use it, and it doesn't protect from malware having access to when it is being actively used. But at least it is a start. It gives the user the ultimate control, without having to TOTALLY physically remove power from a device (rendering it completely useless; and that isn'
Re:News! (Score:5, Informative)
Re: (Score:1)
Are you telling me hackers can turn your sarcasm face into your shocked face?
Re: (Score:2, Funny)
"Hackers Can Turn Overt Listening Device into a Covert Listening Device."
If you own an Echo, you know Amazon is listening to you = overt. They've found a way to redirect it someone else other than Amazon is listening to you without your consent = covfefe.
FTFY
Re: (Score:2)
>That syllable over there reminds me of Trump! Time to remind the world how much I hate him (for the third time in the last 5 minutes)!
Well, if he would stop making a twat out of himself.
Re: (Score:1)
Breaking news: attackers with physical access to a device are able to compromise the device. Literally everyone in the tech industry is shocked by this discovery.
Congress is already moving to pass legislation forcing the US to revert to the stone age in order to protect the country against terrorism and pedophiles, though it has little support from the Republican party who insist it include provisions to lower taxes, nor does it have support from the Democratic party because the bill has nothing to do with
Re: (Score:3)
The key word isn't "listening device", it is "covert". Hackers can turn an overt listening device into a covert listening device. Kinda like how Android malware can turn your Google/AT&T spying device into a Google/AT&T/other spying device.
Re: (Score:3)
The key word isn't "listening device", it is "covert". Hackers can turn an overt listening device into a covert listening device. Kinda like how Android malware can turn your Google/AT&T spying device into a Google/AT&T/other spying device.
The keyword isn't covert. It is that the device listens, and as a part of the security lacking Internet of things someone or many people out there simply are listening to it. I don't give a damn if you call it onomatopoeia, the gaddamned thing is listening in all the time. And the utter naivety to think that the only people who are listening to it is Amazon is charming, but so wrong. Maybe that isn't a big deal for many people.
Re: (Score:2)
and they did it by stealing your keys.
We must give the government your keys to protect you.
Obligatory (Score:1)
"Amazon Echo still a covert listening device"
Holy Possessed Toaster (talkie anyone) (Score:5, Insightful)
How many average consumer devices can't be compromised with physical access to the hardware?
Couldn't someone also just plant a bug in the thing (or somewhere else in your house) and listen to you that way?
In what world is this news?
Re: (Score:2)
Indeed.
And in fact, *IF* you were a three letter agency and you had physical access to someone's house, and wanted to spy on them, which are you more likely to do - spend hours disassembling the Echo and doing this exploit and reassembling it, or spending 10 minutes planting bugs all over the house? I would wager the latter.
Re: (Score:2)
Re: (Score:2)
How many average consumer devices can't be compromised with physical access to the hardware?Couldn't someone also just plant a bug in the thing (or somewhere else in your house) and listen to you that way? In what world is this news?
Well, it's a nice spy trick to subvert the enemy's equipment instead of installing your own bug. If it was a cell phone, video conference system or something like that I'd say it was a pretty big deal. I just don't see the overlap between the kind of places you'd worry about a bug sweep and the kind of places you'd put an Amazon Echo though. Though it could be Trump has got one at the White House...
Re: (Score:1)
Why buy this crap? (Score:5, Insightful)
Always listening device,
Who in their right mind thought these tools would be useful to a consumer? Are people out there really that dense to think that a device like this isn't sending every waking minute of their lives to some spook at the NSA?
Every time I hear someone go on and on about how the "Internet of Things" is the next great land rush, I laugh. The sooner this and 360 VR die the better.
Re: (Score:1)
Re: (Score:3)
AND on top of it they are getting you to PAY for it. Tom Sawyer and whitewashing the fence all over again.
Re: (Score:2)
Always listening device,
Who in their right mind thought these tools would be useful to a consumer?
The same can be said of many consumer devices that wound up being successful. When the iPad first came out, people mocked A) the name, and B) the idea that anyone would want an overgrown iPhone that can't make phone calls. No-one mocks it anymore. In the case of the Echo, being able to give verbal commands to a computer rather than mess about with a keyboard has long been a feature of science fiction that many people wanted in reality. That many people have their doubts about the usefulness, reliability and
Re: (Score:2)
Who in their right mind thought these tools would be useful to a consumer?
Given digital assistants are the wet dream of pretty much every sci-fi writer, you are just showing a lack of imagination.
Re: (Score:3)
Are people out there really that dense to think that a device like this isn't sending every waking minute of their lives to some spook at the NSA?
For a tech site, you wouldn't expect questions like that. I have one, it's handy for asking questions, controlling the lights and stuff.
I also have monitored the traffic from it and there's nothing significant until you say the wake word. Might as well be afraid of your toaster sending data to the NSA.
It is going to be more interesting ... (Score:2)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Only phones that have opened google maps and told it to get their location are tracked for traffic. Pretty easy to avoid that.
Re: (Score:3)
>"Only phones that have opened google maps and told it to get their location are tracked for traffic. Pretty easy to avoid that."
Actually, that is not true. A lot of the traffic information comes from the cell companies which track all the phones BY NECESSITY and then sell that information (supposedly ananoymized) to third parties. I know that Sprint does it, and I doubt they are alone. They don't tell you and don't ask your permission. If your phone is on and the mobile radio is on, you ARE being tr
Re: (Score:2)
Re: (Score:1)
Once again (Score:5, Interesting)
Star Trek had it right. First you poke the button on the communicator, then it listens...
Re: (Score:2)
Actually no, what makes you think the star trek system can't also be trivially hacked* to listen all the time?
* I wrote 'hacked' but I'm willing to bet "hey computer, quietly record everything going on everywhere on decks 1 - 15 and deliver it to my console" would also work; so more of a 'built in functionality' rather than a 'hack'.
Re: (Score:3)
Re: (Score:2)
Button press unnecessary when on board the Enterprise.
Unless it is necessary for the plot...
Re:Once again (Score:4)
Star Trek seemed to have really strong privacy protections. Clearly they could record everything all the time, but chose not to. When investigation was required there was never any CCTV from the ship, or voice recordings made by the computer.
Re: (Score:2)
Star Trek seemed to have really strong privacy protections.
Star Trek was based on a bright future where everyone's basic needs were met.
Re: (Score:2)
Star Trek had it right. First you poke the button on the communicator, then it listens...
Except for the hundreds of times when the actor forgets to touch the communicator until halfway through his/her utterance.
Re: (Score:2)
Star Trek had it right. First you poke the button on the communicator, then it listens...
That is the way that these devices work, too, when they're not hacked. The only difference is that the "button" is a keyword.
Actually, Star Trek had that as well. The keyword was "Computer".
From the institute of (Score:3)
Back in '90 or I was sysadmin when we got a bunch of personal Sun workstations. These all had microphones on them, Usenet soon told me how to turn the mic on and record to a local file. Went to my boss, told him we needed to open up every box and cut a wire. He was all like "um, no, not gonna happen". Told him to wait 5 minutes, then call someone and talk for a minute or two. Went into his office, played back the audio file I'd recorded of his conversation, spent the next few hours opening up brand spanking new Sun workstations to cut a wire.
Why yes, I do have black tape over the camera on my laptop. Why do you ask?
People blowing this off need to consider .... (Score:2)
While yes, physical access to a device means it *can* be hacked, there are different degrees of concern you should have, depending on the device in question.
For example, physical access to my car in order to hack it? The car does have door locks on it as well as requiring a separate key to actually start it. Most people have a habit of doing some basic physical security with their car - such as putting it in a garage at night (which is also locked), or at least locking it up and taking the keys with them wh
Re: (Score:3)
Re:People blowing this off need to consider .... (Score:4, Insightful)
>"It could be compromised before the box even arrives at your house. For that matter it could even be compromised before it leaves the factory."
It might even be DESIGNED compromised with built-in back doors for three letter agencies or whatever.
Re: (Score:2)
Re: (Score:2)
If you're inviting CIA agents to your country's embassy for an evening party, then yes, you should keep a careful watch on your Amazon Echo.
Re: (Score:2)
Re: (Score:2)
"Turn"? (Score:3)
Re: (Score:2)
Re: (Score:2)
I didn't leave a comment in this vein only because I figured someone else would do it better, and I was right. Bravo.
Never Leave It Alone (Score:1)
This is why I never leave my Echo unattended....especially at a DefCon conference.
Physical access (Score:2)
It is usually considered that if you have access to a device, you can take control of it.
If we call that a hack that must be fixed, then I fear the solution is more closed software, and repair-hostile hardware.
And yet such things are becoming ubiquitous (Score:2)
Why worry about things like government attacks on end-to-end encryption [slashdot.org], when everybody and his dog is signing up for 'personal assistants', installing Smart TV's and IOT devices, and posting their whole lives on social media? The vast majority of people seem to be in the process of making wholesale violations of their own privacy trivial and commonplace - it seems unlikely that they'll give more than five seconds' thought to some security vulnerability in the latest bit of shiny. Damn the bread and circuse
captain obvious (Score:1)
Does Amazon stop sales now? (Score:2)
So we can hack these now? (Score:2)
Jeez, back in the day these threads would be full of all the projects people were going to do with commercial hardware once somebody found a way to load new firmware onto it.
Stupid article. (Score:2)
Give me 5 minutes with a desk lamp back in the 1980s and I'll have turned it into a covert listening device as well.
The people freaking out about this should look into what the FBI and CIA actually did before the internet (hint: still listened into people).
Re: (Score:1)
Re: (Score:2)
Yeah but now they don't need to bug your house, since everyone even pays for the bugs.
Yes, they do. This hack requires physical access to the device. It's essentially the same. Now if they could perform the hack remotely....then it's different.
Re: (Score:2)
...to put a discrete bug in your house you need some way to get the audio or video out of your house and into the hands of the attacker. Thus, they need physical access and a means to transmit data. If you want to transmit data a long way, you also need to take care of powering the bug in some way, as batteries won't last long. They need to put all of that in a central position in your house so they can actually capture the audio they want.
Once you've conveniently tuned your Echo to your wifi, you've handed
Re: (Score:2)
So a bunch of "difficult" problems that were solved in the 70s.
No small feat (Score:2)
How do you hide the Echo listening device by hacking it?
Not new News... (Score:1)