• catfish@lemmy.ml
    link
    fedilink
    arrow-up
    63
    ·
    8 months ago

    Perhaps worth pointing out that the attacks require the attacker to position a piece of hardware between the Qi charger and the power source.

  • Gravitywell@sh.itjust.works
    link
    fedilink
    arrow-up
    26
    arrow-down
    1
    ·
    8 months ago

    According to the researchers, “A charger can be manipulated to control voice assistants via inaudible voice commands, damage devices being charged through overcharging or overheating, and bypass Qi-standard specified foreign-object-detection mechanism to damage valuable items exposed to intense magnetic fields.”

    So if someone swaps your Qi charger for a malicious one they can ruin your phone (or some other device it’s supposed to detect as not a phone ?) and maybe execute arbitrary voice commands… 🥱

    • tias@discuss.tchncs.de
      link
      fedilink
      arrow-up
      21
      ·
      8 months ago

      I don’t really get how they consider this a meaningful attack vector at all. Of course I can set the phone on fire if I can replace the charger - that’s pretty much always going to be true and there’s no reasonable way to fix it. The only possible use I see is to do it when someone is not intentionally charging their phone, e.g. holding a malicious charger close enough when they have the phone in their pocket.

  • M500@lemmy.ml
    link
    fedilink
    English
    arrow-up
    21
    arrow-down
    1
    ·
    8 months ago

    Talk about a burner phone 😎☀️ Aaaaaeeeoooowwww

  • DeltaTangoLima@reddrefuge.com
    link
    fedilink
    English
    arrow-up
    8
    ·
    8 months ago

    If feel this is (unintentionally) stretching the use of the word cyberattack. Rightly or wrongly, most people consider a cyberattack a form of hacking/attack that’s executed via a network or the internet.

    I know its true definition any form of attack against data, network, or computing device (including smartphones), but this headline could easily lead people to think their phones could be set on fire by some anonymous l337 hAx0r over the internet.

    While technically true, it requires physical exploit first.

    • Zerush@lemmy.mlOP
      link
      fedilink
      arrow-up
      3
      ·
      8 months ago

      Anyway it isn’t a good idea to use a cheap charger with unknown brand, or one which isn’t the own one at home.

  • Midnitte@beehaw.org
    link
    fedilink
    English
    arrow-up
    5
    ·
    8 months ago

    A charger can be manipulated to control voice assistants via inaudible voice commands…

    This seems like the scarier attack, to be honest…

    Though, surely there’s filtering that can be performed to prevent that as an attack vector

    • Skull giver@popplesburger.hilciferous.nl
      link
      fedilink
      arrow-up
      3
      ·
      8 months ago

      Using ultrasonic frequencies to induce vibration and transfer sound humans can’t hear to voice assistants has been demonstrated a fee years ago. With the right equipment (nothing you can’t find on AliExpress) this isn’t too difficult.

      With modern smart assistants, you’ll also need to take the owner’s voice, though AI can do that if you record just one conversation at a decent quality.

      In practice, assistants are quite useless, though. Ask them anything dangerous, such as leaking contacts or sending files, and the phone will start showing you results from Google rather than actually doing something.

      You could trick the phone into opening a website with an exploit kit, but then your target needs to be vulnerable anyway, and there are other options to do that (i.e. buying ads with a very specific profile that only matches your target).

      The physical harm of a fire is probably worse than anything you should expect out of a voice assistant attack.

      • Midnitte@beehaw.org
        link
        fedilink
        English
        arrow-up
        1
        ·
        8 months ago

        Right, and Google uses those frequencies to pair Chromecasts - my point was that if they’re using it (and aware of it), surely they have a way to detect (and filter) it.

        • Skull giver@popplesburger.hilciferous.nl
          link
          fedilink
          arrow-up
          1
          ·
          8 months ago

          It’s not like WiFi is continuously sending data. Unless something is actually connecting to the WiFi networks (or downgrading the area by not being able to handle WiFi 7), the beacons are basically empty radio space. BSSIDs themselves have almost no impact on the WiFi spectrum used and you can set up hundreds of nothing APs in a room before WiFi speed degrades/should degrade by a recognisable margin. The biggest downside is that you’ll have trouble picking the right network from the hundreds of “John’s iPhone” networks in the dropdown list.

  • Joe Breuer@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    8 months ago

    So… Considering necessary access, it’s a quarter step above “cooking a phone in a microwave oven might catch it on fire”, IMO.