The Washington PostDemocracy Dies in Darkness

Listen for the log-in: Hackers may glean your password by listening to how you type on your phone

PIN codes, individual letters and whole words can be recovered with the right app, researchers say

June 6, 2019 at 12:25 p.m. EDT
A study by Cambridge and Linkoping universities shows that hackers can decipher smartphone passwords through sound waves. (Simon Dawson/Bloomberg)

What if scammers could learn your password not from a massive cyberattack or taking control of your device, but from listening in as you type?

That’s the startling premise of a recent study by researchers at Cambridge University and Sweden’s Linkoping University, who were able to glean passwords by deciphering the sound waves generated by fingers tapping on smartphone touch screens.

Malicious actors can decode what a person is typing by using a spying app that can access the smartphone’s microphone, according to the study, which was first reported by the Wall Street Journal. “We showed that the attack can successfully recover PIN codes, individual letters and whole words,” the researchers wrote.

LabCorp discloses data breach affecting 7.7 million customers

A passive, sound-based attack could be executed if a person installs an app infected with such malware. “Many apps ask for this permission and most of us blindly accept the list of demanded permissions anyway,” the researchers wrote. Attackers could also provide their target with a smartphone on which the malicious app was pre-installed.

The researchers designed a machine-learning algorithm that could decode vibrations for specific keystrokes. Among a test group of 45 people across several tests, the researchers could correctly replicate passwords on smartphones seven times out of 27, within 10 attempts. On tablets, the researchers achieved better results, nailing the password 19 times out of 27 within 10 attempts.

“We found the device’s microphone(s) can recover this wave and ‘hear’ the finger’s touch, and the wave’s distortions are characteristic of the tap’s location on the screen,” the researchers wrote. “Hence, by recording audio through the built-in microphone(s), a malicious app can infer text as the user enters it on their device.”

WhatsApp patches security flaw that allows attackers to deliver malware through calls

The experiment ran on an Android application that allowed participants to enter letters and words on two LG Nexus 5 phones and a Nexus 9 tablet, according to the paper. As the participants tapped in the passwords, the app recorded audio through the devices’ built-in microphones. To simulate a real-world environment, the researchers had participants enter passwords at three locations at a university, with different levels of background noise: a common room where a coffee machine was used, a reading room with computers, and a library.

The study has not yet been peer-reviewed, according to the report, or been published, but it is available online through a website maintained by Cornell University for academic research.

To guard against such attacks, the researchers suggested, smartphone makers might consider installing a switch that would allow users to shut off the microphone. Another option, they said, is to simply make it more obvious when the microphone is on, by flashing a light or an icon on the screen.

Auto industry says cybersecurity is a significant concern as cars become more automated

The research fits into a broader study of security vulnerabilities that exploit a device’s built-in sensors — like cameras and accelerometers — to extract personal information from users without their knowledge.