New acoustic attack determines keystrokes from typing patterns

Researchers have demonstrated a new acoustic side-channel attack on keyboards that can deduce user input based on their typing patterns, even in poor conditions, such as environments with noise.
Though the method achieves an average success rate of 43%, which is significantly lower than other methods presented in the past, it it does not require controlled recording conditions or a specific typing platform.
This makes it more applicable in real attacks, and depending on some target-specific parameters, it can produce enough reliable data to decipher the overall target's input with some post-capture analysis.
Researchers Alireza Taheritajar and Reza Rahaeimehr from Augusta University in the U.S. have published a technical paper presenting the details of their unique acoustic side-channel method.
The attack leverages the distinctive sound emissions of different keystrokes and the typing pattern of users captured by specialized software to gather a dataset.
It is crucial to gather some typing samples from the target so that specific keystrokes and words can be correlated with sound waves.
The paper does delve on the possible methods for capturing text, but it could be through malware, malicious websites or browser extensions, compromised apps, cross-site scripting, or compromised USB keyboards.
The target's typing may be recorded by using a concealed microphone near them or remotely using compromised devices in proximity, such as smartphones, laptops, or smart speakers.
The captured dataset includes typing samples under various conditions, so multiple typing sessions must be recorded, which is crucial for the attack's success.
The researchers say the dataset doesn't have to be particularly large.
The dataset is then used to train a statistical model that produces a comprehensive profile of the target's individual typing patterns based on the time intervals between keystrokes.
The researchers found that accepting a 5% deviation for the statistical model is crucial, as typing behavior varies slightly even when a person types the same word twice.
Any recorded interval between A and B that falls between 95 milliseconds and 105 milliseconds could be considered a match.
The deviation also helps to mitigate the impact of errors or noise in the recording, ensuring that minor discrepancies don't lead to a mismatch.
The method predicts the typed text by analyzing audio recordings of keyboard activity, with the accuracy enhanced by filtering predictions through an English dictionary.
On the other hand, the method has limitations that sometimes make the attack ineffective.
People who rarely use a computer and haven't developed a consistent typing pattern, or professional typists who type very fast, may be difficult to profile.
The researchers also noted that the amplitude of the produced waveform is less accentuated when using silent keyboards, which can hamper the training effectiveness for the prediction model and lower the keystroke detection rates.
New acoustic attack steals data from keystrokes with 95% accuracy.
VoltSchemer attacks use wireless chargers to inject voice commands, fry phones.


This Cyber News was published on www.bleepingcomputer.com. Publication date: Sun, 17 Mar 2024 14:31:04 +0000


Cyber News related to New acoustic attack determines keystrokes from typing patterns

New acoustic attack determines keystrokes from typing patterns - Researchers have demonstrated a new acoustic side-channel attack on keyboards that can deduce user input based on their typing patterns, even in poor conditions, such as environments with noise. Though the method achieves an average success rate of ...
1 year ago Bleepingcomputer.com
The sound of you typing on your keyboard could reveal your password - As if password authentication's coffin needed any more nails, researchers in the UK have discovered yet another way to hammer one in. The technique, developed at Durham University, the University of Surrey, and Royal Holloway University of London, ...
1 year ago Malwarebytes.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
2 years ago Trendmicro.com
Latest Information Security and Hacking Incidents - We all are no strangers to artificial intelligence expanding over our lives, but Predictive AI stands out as uncharted waters. Unlike its creative counterpart, Generative AI, Predictive AI relies on vast datasets and advanced algorithms to draw ...
1 year ago Cysecurity.news
How machine learning helps us hunt threats | Securelist - In this post, we will share our experience hunting for new threats by processing Kaspersky Security Network (KSN) global threat data with ML tools to identify subtle new Indicators of Compromise (IoCs). The model can process and learn from millions ...
10 months ago Securelist.com
The biggest cybersecurity and cyberattack stories of 2023 - Genetic testing provider 23andMe suffered credential stuffing attacks that led to a major data breach, exposing the data of 6.9 million users. The company states that the attackers only breached a small number of accounts during the ...
1 year ago Bleepingcomputer.com Scattered Spider Black Basta
CVE-2025-54576 - OAuth2-Proxy is an open-source tool that can act as either a standalone reverse proxy or a middleware component integrated into existing reverse proxy or load balancer setups. In versions 7.10.0 and below, oauth2-proxy deployments are vulnerable when ...
1 week ago
CVE-2013-4576 - GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis ...
7 years ago
East Texas hospital network can't receive ambulances because of potential cybersecurity incident - GetTime();if(!(u<=a&&d<=l throw new RangeError("Invalid interval");return r.inclusive?u<=l&&d<=a:ut||isNaN(t. Step):1;if(s<1||isNaN(s throw new RangeError("`options. Step):1;if(l<1||isNaN(l throw new RangeError("`options. GetTime()<=n throw new ...
1 year ago Cnn.com
Exploiting Side-Channel Leakage Enable Successful Exploitations on The Latest Linux Kernel - Their findings revealed that three specific defenses – enforcing strict memory permissions or virtualizing the kernel heap or kernel stack – unintentionally create exploitable TLB contention patterns. The Linux kernel employs various ...
4 months ago Cybersecuritynews.com
Cyber Security News Weekly Round-Up Vulnerabilities & Cyber Attacks - In order to enhance your security posture and defenses, it is essential that you have up-to-date knowledge on two key things like emerging cyber risks and attack vectors. Stolen information is forwarded from C&C servers used in these attacks to stage ...
1 year ago Cybersecuritynews.com Black Basta
How To Use YARA Rules To Identify Financial Sector Targeted Attacks - By analyzing multiple samples from the same malware family, security teams can create YARA rules that identify various iterations of the threat, even as attackers attempt to modify their code to evade detection. By scanning network traffic for ...
3 months ago Cybersecuritynews.com Hunters
Does AI Detection Remover Really Work? How to Fix Text Like a Pro! - Maintains consistency: The tool follows patterns found in human writing, ensuring that your content stays consistent in tone, style, and structure throughout the piece. So when you use the AI Detection Removal tool, it doesn’t just shuffle words ...
5 months ago Cybersecuritynews.com
New York's cyber chief on keeping cities and states safe from cyberattacks | The Record from Recorded Future News - And so we think that that'll continue to evolve the security posture of New York State in a way that first and foremost provides the public good, which is, if a government service is not secure, it can't be considered reliable. We're ...
4 months ago Therecord.media
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents - The U.S. Securities and Exchange Commission recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. "Currently, many public companies provide cybersecurity disclosure ...
1 year ago Feeds.dzone.com
Channel Triggered Backdoor Attack in Wireless Channels Let Attackers Read Passwords - This technique, dubbed “Channel Triggered Backdoor Attack,” manipulates subtle variations in wireless signals to establish hidden communication pathways that bypass traditional security monitoring tools. Cybersecurity researchers have ...
4 months ago Cybersecuritynews.com
CVE-2017-4995 - An issue was discovered in Pivotal Spring Security 4.2.0.RELEASE through 4.2.2.RELEASE, and Spring Security 5.0.0.M1. When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code ...
3 years ago
CVE-2020-5411 - When configured to enable default typing, Jackson contained a deserialization vulnerability that could lead to arbitrary code execution. Jackson fixed this vulnerability by blacklisting known "deserialization gadgets". Spring Batch configures ...
5 years ago
TISAX: new Catalogue ISA v6 available - ISA 6: The latest version of the ISA catalogue, published in October 2023, with many changes and improvements to address the challenges and needs of the industry. Key changes in ISA 6: New and revised controls to strengthen protection, detection, ...
1 year ago Sorinmustaca.com
A Cybersecurity Risk Assessment Guide for Leaders - Now more than ever, keeping your cyber risk in check is crucial. In the first half of 2022's Cyber Risk Index, 85% of the survey's 4,100 global respondents said it's somewhat to very likely they will experience a cyber attack in the next 12 months. ...
2 years ago Trendmicro.com
Detecting Cyber Attack Patterns by Analyzing Threats Actors Infrastructure - The identification of cyber attack patterns through infrastructure analysis has emerged as a crucial methodology in modern threat intelligence. By examining the digital footprints left by threat actors, security analysts can now reconstruct attack ...
4 months ago Cybersecuritynews.com
Neurosurgeons of New Jersey Confirms Cyber Attack Resulting in Recent Data Breach - On December 4, 2023, Neurosurgical Associates of New Jersey filed a notice of data breach with the U.S. Department of Health and Human Services Office for Civil Rights after discovering. In this notice, Neurosurgeons of New Jersey explains that an ...
1 year ago Jdsupra.com
7 Best Attack Surface Management Software for 2024 - Attack surface management is a relatively new cybersecurity technology that combines elements of vulnerability management and asset discovery with the automation capabilities of breach and attack simulation and applies them to an organization's ...
1 year ago Esecurityplanet.com
Artificial Intelligence Fuels New Wave of Complex Cyber Attacks Challenging Defenders - The O’Reilly 2024 State of Security Survey found 33% of enterprises lack staff capable of countering AI-driven threats, particularly in detecting adversarial machine learning patterns and securing generative AI deployments. While AI-driven threat ...
2 months ago Cybersecuritynews.com Ransomhub