{"id":6771,"date":"2023-08-07T15:00:00","date_gmt":"2023-08-07T12:00:00","guid":{"rendered":"https:\/\/blog.eset.ee\/?p=6771"},"modified":"2023-11-24T18:06:55","modified_gmt":"2023-11-24T16:06:55","slug":"hear-no-evil-ultrasound-attacks-on-voice-assistants","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/","title":{"rendered":"Hear no evil: Ultrasound attacks on voice assistants"},"content":{"rendered":"\n<p>Regular WeLiveSecurity readers won\u2019t be stunned to read that cyberattacks and their methods keep evolving as bad actors continue to enhance their repertoire. It\u2019s also become a common refrain that as security vulnerabilities are found and patched (alas, sometimes&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2015\/02\/11\/security-terms-explained-zero-day-mean\/\">after being exploited<\/a>), malicious actors find new chinks in the software armor.<\/p>\n\n\n\n<p>Sometimes, however, it is not \u201cjust\u201d a(nother) security loophole that makes the headlines, but a new form of attack. This was also the case recently with a rather unconventional attack method dubbed NUIT. The good news? NUIT was unearthed by academics and there are no reports of anybody exploiting it for pranks or outright cybercrime. That said, it doesn\u2019t hurt to be aware of another way your privacy and security could be at risk \u2013 as well as about the fact that NUIT can actually come in two forms.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How NUIT saw the light of day<\/h2>\n\n\n\n<p>NUIT, or&nbsp;<a href=\"https:\/\/sites.google.com\/view\/nuitattack\/home\">Near-Ultrasound Inaudible Trojan<\/a>, is a class of attack that could be deployed to launch silent and remote takeovers of devices that use or are powered by voice assistants such as Siri, Google Assistant, Cortana, and Amazon Alexa. As a result, any device accepting voice commands \u2013 think your phone, tablet or smart speaker \u2013 could be open season. Ultimately, the attack could have some dire consequences, ranging from a breach of privacy and loss of trust to even the compromise of a company\u2019s infrastructure, which could, in turn, result in hefty monetary losses.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.usenix.org\/system\/files\/sec23fall-prepub-261-xia-qi.pdf\">Described by a team of researchers<\/a>&nbsp;at the University of Texas in San Antonio (UTSA) and the University of Colorado Colorado Springs (UCCS), NUIT is possible because microphones in digital assistants can respond to near-ultrasound waves played from a speaker. While inaudible to you, this sound command would prompt the always-on voice assistant to perform an action \u2013 let\u2019s say, turn off an alarm, or open the front door secured by a smart lock.&nbsp;<\/p>\n\n\n\n<p>To be sure, NUIT isn\u2019t the first acoustic attack to have made waves over the years. Previously, attacks with similarly intriguing names have been described \u2013 think&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2020\/03\/04\/voice-assistants-hacked-ultrasonic-waves\/\">SurfingAttack<\/a>,&nbsp;<a href=\"https:\/\/arxiv.org\/abs\/1708.09537\">DolphinAttack<\/a>,&nbsp;<a href=\"https:\/\/synrg.csl.illinois.edu\/papers\/lipread_nsdi18.pdf\">LipRead<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2013\/09\/10\/silent-audio-could-be-key-to-unlocking-pcs-new-password-beating-start-up-claims\/\">SlickLogin<\/a>, including some other inaudible attacks that that, too, targeted smart-home assistants.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Night, night<\/h2>\n\n\n\n<p>As mentioned, NUIT comes in two forms: They are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>NUIT 1<\/strong>&nbsp;\u2013 This is when the device is both a source and the target of an attack. In such cases, all it takes is a user playing an audio file on their phone that causes the device to perform an&nbsp;action, like sending a text message with its location.<\/li>\n<\/ul>\n\n\n\n<p>VIDEO:&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=TUnPFR35AR4\">NUIT 1 End to End no response Attack<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>NUIT 2<\/strong>&nbsp;\u2013 This attack is launched by a device with a speaker to another device with a microphone, like from your PC to a smart speaker.<\/li>\n<\/ul>\n\n\n\n<p>VIDEO:&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=mFmS4vvL8ko\">NUIT 2 SILENT RESPONSE END TO END ATTACK blurFace<\/a><\/p>\n\n\n\n<p>As an example, let\u2019s say you are watching a webinar on Teams or Zoom. A user could unmute themselves and play a sound, which would then be picked up by your phone, prompting it to visit a dangerous website and compromising the device with malware.<\/p>\n\n\n\n<p>Alternatively, you could be playing YouTube videos on your phone with your loudspeakers, and the phone would then perform an unwarranted action. From the user\u2019s perspective, this attack does not require any specific interaction, which makes it all the worse.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Should NUIT keep you up at night?<\/h2>\n\n\n\n<p>What does it take to perform such an attack? Not much, as for NUIT to work, the speaker from which it is launched needs to be set to above a certain level of volume, with the command lasting less than a second (0.77s).<\/p>\n\n\n\n<p>Moreover, obviously you need to have your voice assistant enabled. According to the researchers, out of the 17 devices tested, only&nbsp;<a href=\"https:\/\/www.utsa.edu\/today\/2023\/03\/story\/chen-nuit-research.html\">Apple Siri-enabled devices were harder to crack<\/a>. This was because a hacker would need to steal your unique voice fingerprint first to get the phone to accept commands.<\/p>\n\n\n\n<p>Which is why everyone should set up their assistants to only work with their own voice. Alternatively, consider switching your voice assistant off when it\u2019s not needed; indeed, keep your cyber-wits about you when using any IoT devices, as all sorts of&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2020\/05\/20\/these-things-may-be-cool-but-are-they-safe\/\">smart gizmos can be easy prey for cybercriminals<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The doctor\u2019s orders<\/h2>\n\n\n\n<p>The researchers, who will also present their NUIT research at the&nbsp;<a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity23\">32<sup>nd<\/sup>&nbsp;USENIX Security Symposium<\/a>, also recommend that users scan their devices for random microphone activations. Both Android and iOS devices display microphone activation, usually with a green dot on Android, and with a brown dot on iOS in the upper part of the screen. In this case, also consider reviewing your app permissions for microphone access, as not every app needs to hear your surroundings.<\/p>\n\n\n\n<p>Likewise, listen to audio using earphones or headsets, as that way, you are less likely to share sound with your surroundings, protecting against an attack of this nature.<\/p>\n\n\n\n<p>This is also a good time to make sure you have the cybersecurity basics covered \u2013&nbsp;&nbsp;keep all your devices and software updated, enable two-factor authentication on all of your online accounts, and use reputable security software across all your devices.&nbsp;<\/p>\n\n\n\n<p><em>RELATED READING:<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/www.welivesecurity.com\/2020\/04\/20\/work-home-should-digital-assistant-be-on-or-off\/\"><em>Work from home: Should your digital assistant be on or off?<\/em><\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.welivesecurity.com\/2023\/02\/09\/alexa-who-else-is-listening\/\"><em>Alexa, who else is listening?<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Regular WeLiveSecurity readers won\u2019t be stunned to read that cyberattacks and their methods keep evolving as bad actors continue to enhance their repertoire. It\u2019s also become a common refrain that as security vulnerabilities are found and patched (alas, sometimes&nbsp;after being exploited), malicious actors find new chinks in the software armor. Sometimes, however, it is not<\/p>\n","protected":false},"author":5,"featured_media":6772,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[148,153,154],"tags":[],"class_list":["post-6771","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-hacking","category-home-user"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hear no evil: Ultrasound attacks on voice assistants - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hear no evil: Ultrasound attacks on voice assistants\" \/>\n<meta property=\"og:description\" content=\"Regular WeLiveSecurity readers won\u2019t be stunned to read that cyberattacks and their methods keep evolving as bad actors continue to enhance their repertoire. It\u2019s also become a common refrain that as security vulnerabilities are found and patched (alas, sometimes&nbsp;after being exploited), malicious actors find new chinks in the software armor. Sometimes, however, it is not\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-07T12:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-24T16:06:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/11\/nuit-ultrasound-attacks.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"755\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/08\\\/07\\\/hear-no-evil-ultrasound-attacks-on-voice-assistants\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/08\\\/07\\\/hear-no-evil-ultrasound-attacks-on-voice-assistants\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Hear no evil: Ultrasound attacks on voice assistants\",\"datePublished\":\"2023-08-07T12:00:00+00:00\",\"dateModified\":\"2023-11-24T16:06:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/08\\\/07\\\/hear-no-evil-ultrasound-attacks-on-voice-assistants\\\/\"},\"wordCount\":894,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/08\\\/07\\\/hear-no-evil-ultrasound-attacks-on-voice-assistants\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/nuit-ultrasound-attacks.jpg\",\"articleSection\":[\"cybersecurity\",\"hacking\",\"home user\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2023\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/08\\\/07\\\/hear-no-evil-ultrasound-attacks-on-voice-assistants\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/08\\\/07\\\/hear-no-evil-ultrasound-attacks-on-voice-assistants\\\/\",\"name\":\"Hear no evil: Ultrasound attacks on voice assistants - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/08\\\/07\\\/hear-no-evil-ultrasound-attacks-on-voice-assistants\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/08\\\/07\\\/hear-no-evil-ultrasound-attacks-on-voice-assistants\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/nuit-ultrasound-attacks.jpg\",\"datePublished\":\"2023-08-07T12:00:00+00:00\",\"dateModified\":\"2023-11-24T16:06:55+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/08\\\/07\\\/hear-no-evil-ultrasound-attacks-on-voice-assistants\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/08\\\/07\\\/hear-no-evil-ultrasound-attacks-on-voice-assistants\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/08\\\/07\\\/hear-no-evil-ultrasound-attacks-on-voice-assistants\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/nuit-ultrasound-attacks.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/nuit-ultrasound-attacks.jpg\",\"width\":755,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/08\\\/07\\\/hear-no-evil-ultrasound-attacks-on-voice-assistants\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hear no evil: Ultrasound attacks on voice assistants\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2023\\\/08\\\/07\\\/hear-no-evil-ultrasound-attacks-on-voice-assistants\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hear no evil: Ultrasound attacks on voice assistants - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/","og_locale":"en_US","og_type":"article","og_title":"Hear no evil: Ultrasound attacks on voice assistants","og_description":"Regular WeLiveSecurity readers won\u2019t be stunned to read that cyberattacks and their methods keep evolving as bad actors continue to enhance their repertoire. It\u2019s also become a common refrain that as security vulnerabilities are found and patched (alas, sometimes&nbsp;after being exploited), malicious actors find new chinks in the software armor. Sometimes, however, it is not","og_url":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2023-08-07T12:00:00+00:00","article_modified_time":"2023-11-24T16:06:55+00:00","og_image":[{"width":755,"height":425,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/11\/nuit-ultrasound-attacks.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Hear no evil: Ultrasound attacks on voice assistants","datePublished":"2023-08-07T12:00:00+00:00","dateModified":"2023-11-24T16:06:55+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/"},"wordCount":894,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/11\/nuit-ultrasound-attacks.jpg","articleSection":["cybersecurity","hacking","home user"],"inLanguage":"en-US","copyrightYear":"2023","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/","url":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/","name":"Hear no evil: Ultrasound attacks on voice assistants - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/11\/nuit-ultrasound-attacks.jpg","datePublished":"2023-08-07T12:00:00+00:00","dateModified":"2023-11-24T16:06:55+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/11\/nuit-ultrasound-attacks.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2023\/11\/nuit-ultrasound-attacks.jpg","width":755,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Hear no evil: Ultrasound attacks on voice assistants"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2023\/08\/07\/hear-no-evil-ultrasound-attacks-on-voice-assistants\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/6771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=6771"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/6771\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/6772"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=6771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=6771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=6771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}