Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319


Hackers could use audio recordings to create a key to your front door

Image Description

Audio recordings from smartphones could be used by hackers to create a set of keys to your front door, a new research paper has revealed. But don't panic yet, there's still some significant hurdles to be cleared before this becomes reality.

Published by academics from the National University of Singapore, the paper demonstrates how an audio recording of a key turning in a lock can be used to map its shape, size and ridge-pattern - information the eavesdropper could use to create a real-world replica.

The program that analyzed the audio recordings, named SpiKey, is said to be accurate enough to filter a database of 330,000 keys down to three candidates.

Audio analysis

The lock-breaking system works by analyzing the time elapsed between clicks made as the key ridges interact with pins in the lock, allowing the program to discern the key’s unique pattern of ridges.

The inter-ridge distances are used to create a virtual model of the key, which can then be 3D printed for use in real-life scenarios.

“Physical locks are one of the most prevalent mechanisms for securing objects such as doors. While many of these locks are vulnerable to lock-picking, they are still widely used as lock-picking requires specific training with tailored instruments and easily raises suspicions,” wrote the researchers.

“[SpiKey] significantly lowers the bar for an attacker by requiring only the use of a smartphone microphone to infer the shape of the victim’s key, namely bittings (or cut depths) which form the secret of the key.”

The paper does concede that SpiKey is only effective if the attacker has a base knowledge of the type of lock and key (which could be confirmed by inspecting the exterior) and if the speed of key insertion or withdrawal remains constant from start to finish.

In future, the research team plans to explore the possibility that click sounds could be collected by malware installed on a victim’s smartphone or smart watch and whether the same analysis technique could be applied to a recording taken at distance, which would minimize suspicion. 

One simple method of mitigating against attacks of this kind is to attach your front door key to a ring that contains multiple keys, which should create enough noise interference to make effective analysis impossible.

Via The Telegraph


24 Aug 2020



Other Blog

  • The best cheap MacBook deals, sales and prices in April 2021

    We're scouring the web for the best cheap MacBook deals and sales so you can pick up a luxury laptop for less.

    Read More
  • WhatsApp backtracks on threat to ban users that don't accept new privacy policy

    Users that fail to accept WhatsApp's new privacy policy will experience limited functionality when using the app.

    Read More
  • TikTok fixes security flaw that exposed private user data

    Researchers uncovered TikTok vulnerability that could have allowed threat actors to steal users’ private data.

    Read More
  • Many IT decision-makers guilty of keeping cyberattacks secret

    "Weight of responsibility" has made many IT leaders hesitant to share data breach info.

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us