IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Gadgets can be hacked to produce 'dangerous noises'

Hackers can force devices to emit sounds beyond their normal range

loud noise

Modern gadgets can be hacked to have their volume settings turned up to deafening and dangerous levels, research has revealed.

Hardware such as smart speakers, laptops, mobile phones, headphones and even PA systems can be remotely loaded with malware and turned into "offensive" low-grade cyber weapons.

Many of these devices were also found to have very few protections in place to stop themselves from being hacked.

What's more, exploiting this vulnerability could cause physical damage to the hardware and potentially disrupt individuals and organisations with disorientating levels of sound.

PwC researcher Matt Wixey found the issue while conducting an experiment into how malware can cause physical harm. He looked into whether the volume or speaker controls of a device could be manipulated to produce harmful high and low-frequency sounds.

For the research, he used custom-made viruses, known vulnerabilities and other exploits to take control of devices and change their volume levels for long periods.

"Some attacks leveraged known vulnerabilities in a particular device, which could be done locally or remotely in some cases," he told the BBC. "Other attacks would either require proximity to the device, or physical access to it.

In one example, Wixey used a program that scanned local Wi-Fi and Bluetooth networks for vulnerable speakers to take control of. In some cases, the tone from the gadget would only annoy or disorientate people, but at a sustained level the noise could be loud enough to damage hearing, he said.

In one case, a device stopped working after Wixey and his team made it emit a range of sounds over several minutes.

Hacking internet-enabled gadgets is nothing new, but Wixey's research highlights the physical risk unsecured devices poses - both to the device and the user.

And IoT threats are on the rise, with a report from F-Secure Labs in April suggesting that there were 19 variants of malware-based IoT threats in 2018, having only detected five the year before.

Featured Resources

The Total Economic Impact™ Of Turbonomic Application Resource Management for IBM Cloud® Paks

Business benefits and cost savings enabled by IBM Turbonomic Application Resource Management

Free Download

The Total Economic Impact™ of IBM Watson Assistant

Cost savings and business benefits enabled by Watson Assistant

Free Download

The field guide to application modernisation

Moving forward with your enterprise application portfolio

Free Download

AI for customer service

Discover the industry-leading AI platform that customers and employees want to use

Free Download

Recommended

Hackers could use new Wslink malware in highly targeted cyber attacks
malware

Hackers could use new Wslink malware in highly targeted cyber attacks

1 Nov 2021
FBI raids Chinese POS business following cyber attack claims
malware

FBI raids Chinese POS business following cyber attack claims

27 Oct 2021
Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021

Most Popular

Why convenience is the biggest threat to your security
Sponsored

Why convenience is the biggest threat to your security

8 Aug 2022
UK water supplier confirms hack by Cl0p ransomware gang
ransomware

UK water supplier confirms hack by Cl0p ransomware gang

16 Aug 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

29 Jul 2022