A New AI-Driven Cyberattack Can Steal Your Data Just By Listening to You Type

A New AI-Driven Cyberattack Can Steal Your Data Just By Listening to You Type

Are you worried about hackers stealing your personal information? Well, researchers have recently developed an Artificial Intelligence-driven cyberattack that could be used to steal confidential data just by listening to someone type.

The new attack, dubbed “Deep-Spying”, is a type of “side-channel attack” that uses algorithms to recognize sound patterns created by a person typing on a keyboard. The sound patterns are then compared to a large audio database to ascertain the type of keystrokes the user is making. By monitoring the keyboard sounds of a victim, hackers can use the attack to gain access to a variety of sensitive information, such as confidential passwords.

The attack works by using acoustic sensors, such as those commonly found in smartphones and laptops, to capture the keyboard tapping sound of a user typing in a password. The captured sound is then fed into a deep neural network, which is used to compare the sound to patterns in a database and determine which keys the user is pressing.

The attack is still in its early stages, but the research team conducted a successful proof-of-concept attack on a commercial keyboard with a 92% accuracy rate. The team also conducted a successful attack on a computer keyboard, in which they were able to steal a password with an accuracy rate of 96.7%, proving that the attack is far from harmless.

What makes this particular attack especially concerning is the fact that it is very hard to detect. Unlike other cyber–attacks, Deep-Spying does not require malicious code to be installed on a victim’s device. All it requires is for the attacker to have access to a victim’s microphone or the ability to eavesdrop on the victim’s typing sounds.

The attack is an example of the increasing sophistication of AI-driven cyber–attacks, and serves as a reminder that even the most innocuous-seeming activities, such as typing, can be used by hackers to steal confidential information.

Researchers recommend that users take extra caution with regards to protecting sensitive information, such as passwords. They also suggest that users use a “keystone” device, such as a USB keyboard, to prevent any malicious software from gaining access to their microphone and listening to their keyboard tapping sounds.

At the end of the day, it is important to remember that new cyber attacks are constantly being developed, so it is best to stay vigilant and take the necessary steps to protect your data.

Hey Subscribe to our newsletter for more articles like this directly to your email. 

Leave a Reply