
Hackers can abuse Amazon Alexa and Google Home smart assistants to eavesdrop on user conversations without users’ knowledge, or trick users into handing over sensitive information.
The attacks aren’t technically new. Security researchers have previously found similar phishing and eavesdropping vectors impacting Amazon Alexa in April 2018; Alexa and Google Home devices in May 2018; and again Alexa devices in August 2018.
Both Amazon and Google have deployed countermeasures every time, yet newer ways to exploit smart assistants have continued to surface.
The latest ones were disclosed today, after being identified earlier this year by Luise Frerichs and Fabian Bräunlein, two security researchers at Security Research Labs (SRLabs), who shared their findings with ZDNet last week.
Both the phishing and eavesdropping vectors are exploitable via the backend that Amazon and Google provide to developers of Alexa or Google Home custom apps.
These backends provide access to functions that developers can use to customize the commands to which a smart assistant responds, and the way the assistant replies.
The SRLabs team discovered that by adding the “�. ” (U+D801, dot, space) character sequence to various locations inside the backend of a normal Alexa/Google Home app, they could induce long periods of silence during which the assistant remains active.
Phishing personal data
The two demos embedded below show how an attacker could carry out a phishing attack on both devices.
The idea is to tell the user that an app has failed, insert the “�. ” to induce a long pause, and then prompt the user with the phishing message after a few minutes, tricking the target into believing the phishing message has nothing to do with the previous app with which they just interacted.
For example, in the videos below, a horoscope app triggers an error, but then remains active, and eventually asks the user for their Amazon/Google password while faking an update message from Amazon/Google itself.
Notice in the first video how Alexa’s blue status light remains active and never shuts off, a clear indicator that the previous app is still active and busy interpreting a long seriesof “�. ” character sequences.
Eavesdropping on unsuspecting users
The “�. ” can also be used in a similar fashion for eavesdropping attacks. However, this time, the character sequence is used after the malicious app has responded to a user’s command.
The character sequence is used to keep the device active and record a user’s conversation, which is recorded in logs, and sent to an attacker’s server for processing.
Both of these attacks exploit the fact that while Amazon and Google verify and vet Alexa and Google Home apps when they are submitted, they do not do the same for subsequent app updates.
In an email to ZDNet, the SRLabs team said they reported the issue to both vendors earlier this year, yet the companies have failed to address the issue.
“Finding and banning unexpected behavior such as long pauses should be relatively straight-forward,” the SRLabs team told ZDNet. “We are surprised that this hasn’t happened since reporting the vulnerabilities several months ago.”
Neither Amazon nor Google have responded to requests for comment from ZDNet prior to this article’s publication.
Security
WAV audio files are now being used to hide malicious code
Building China’s Comac C919 airplane involved a lot of hacking, report says
Phorpiex botnet made $115,000 in five months just from mass-spamming sextortion emails
Apple’s new iPhone privacy feature lets you see which apps track you (ZDNet YouTube)
Best home security of 2019: Professional monitoring and DIY (CNET)
How to password protect a zip file in Linux (TechRepublic)
Related Topics:
Amazon
Security TV
Data Management
CXO
Data Centers