The voice-based digital assistants are designed to ease the human efforts. The popular voice-based digital assistants are Amazon Alexa, Apple Siri, Google Assistant and Microsoft Cortana. All these smart assistants can perform a wide range of tasks like playing music, reading out news along with the support for different languages.
Amazon Alexa is the most popular smart assistant along with Apple Siri, Google Assistant, and Microsoft Cortana. But the bad side of this is that all these smart assistants are prone to hacking. They may be exploited by the hackers remotely and this will go unnoticed by the user. A team of researchers from China has discovered a drawback in all these voice assistants.
This hacking technique which can be used by hackers is known as dolphin attack. In this attack, the normal voice commands of the users were transformed into high-frequency sound waves which are not audible to human ear. Hence the hackers can easily transform the voice commands fired by the user into ultrasonic sound waves which are not audible to human ear.
If the hackers use this technique then all the user’s commands will be interpreted by them and your smart digital assistant can be hacked. The intruders may generate an audio file by gaining the remote access of the device. As these smart assistants are always on to listen to user’s commands, the private data of the user can be hacked.
The dolphin attack even works if the digital assistant is not in use or it is off. The hack even works on MacBook, Nexus 7 and can gain access to all your personal data. This may give unauthorized access to the user’s data and may compromise all your smart home devices.
However, these high-frequency sound waves can only affect your voice assistant is they are 5 to 6 feet away. Also, Apple Siri and Google Assistant first inform the users and then respond to the user’s commands.
All the popular voice-based assistant manufacturers like Amazon Alexa, Apple Siri, Google Assistant and Microsoft Cortana need to take prompt steps to protect their device from such hack.