Podcast
Root Causes 332: Acoustic AI-based Key Logging Attack


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
September 14, 2023
Researchers have built an AI model that can interpret keystrokes based on the sound of keyboard use over a phone or video call. Among other things, this technique can be used to steal passwords when the sound of logging in can be overheard. Join us as we learn about this new breed of credential harvesting.
Podcast Transcript
Lightly edited for flow and brevity.
Hi, Tim. Thanks for having me. Hi, Jason.
That's right. So there's been a buzz around the security community over this paper that came out earlier this month and I think it's as fascinating as it is alarming. Researchers have been training AI to decipher passwords from audio. This audio has been recorded on phones and Zoom calls, and they've been testing it. So picture this. Every time your finger hits one of the keys on the keyboard, right, it carries a unique audio signature that's discernible from the other keys that you hit on your keyboard.
That's right. It’s impacted by things like the speed of the key press, the angle, even the previous key you pressed, or whether or not the shift key is pressed. All of these things impact that audio signature, right? So from that phone recording model, these researchers were able to get the AI to decipher passwords with a 95% accuracy and that's without even the use of a language model.
That is right.
Some training, at least a fair amount of content I think is needed for a good degree of accuracy. It’s not going to take a 10 or 12 character password typed on a keyboard out of any context whatsoever and then know what it is but with enough exposure to someone typing, they can learn those audio signatures. And with a key logger, it's very precise. You know exactly which key is being pressed but with something like this, you don't need that kind of precision anymore and it doesn't just have to be snuck onto the system to pull from the mic channel, you can just drop a smartphone on someone's desk and leave it there for a little while and train it that way.
And even without perfect recognition of the password, hackers can simply apply an algorithm to guess the rest.
That’s right.
And it's early days. So it's just going to get more accurate. I mean, this is just starting out.
One of the things I found was interesting was they talked about how one of the things that the algorithm had a tougher time with, not saying that it couldn't get it, but it had a tougher time with, was detecting the release of the shift key. So one of the things they suggested was, if I go shift I and release key that's different than if I go shift I release N, right. Two capital letters in a row, or three capital letters in a row are different from one capital letter in the row and I had a harder time getting that. So one of their recommendations was to mix in more capital letters. The more caps you have, the more likely you're going to foil the algorithm. That seems fine as a recommendation but, it's not solving the problem by any stretch of the imagination.
No. Some have even suggested that the OS add random noises to keystrokes to throw these things off but that's just maybe a temporary Band-Aid. There are far better ways to mitigate this.
That’s it. Just be on the lookout.
Absolutely.

