Windows computer’s microphone is accessible to most applications running on the device at all times and completely without security limitations. Therefore, it makes it easy for hackers to take advantage of this vulnerability and remotely spy on your microphone. Information gathered from remotely spy on microphone and recorded audio conversations taking place in the surrounding area of a compromised computer can be used for social engineering, blackmail, or any number of other reasons.
Hackers can use Metasploit to perform a number of different attacks, such as capturing screenshots and keystrokes, stealing passwords, and locating deleted files. In this case, we’ll be showing how a hacker can tap into their victim’s microphone for some easy eavesdropping.
The microphones built into laptop computers can be used by processes and services running on a Windows computer without any security considerations. This allows hackers to easily abuse Windows’ inherent trust in third-party applications and collect audio recordings using the microphone of a compromised computer.
Steps to Remotely Spy on Microphone of a Computer
1: Record Audio without Being Noticed
In order to remotely spy on microphone you can use Metasploit. It has a record_mic module built into the framework which can be used to create audio recordings from a compromised computer. If you want to start using the record_mic module, type the below command.
The available module options can be viewed using the options command.
The DURATION option defines the length of the audio recording captured through the target’s microphone. The set command can be used to configure the duration of the audio in seconds.
set DURATION 30
Next, a SESSION ID will need to be specified in the module options. The sessionscommand can be used to view the available compromised devices.
Set the SESSION ID using the below command.
set SESSION 1
With the options now set, the run command can be used to start recording audio on the target computer.
The msf shell will report the progress of the recording as it’s happening. When complete, the audio file will be automatically saved to the /root/.msf4/loot/ directory using the WAV audio format.
2: Locate the Recorded Audio Files
This is the second step for remotely spy on microphone of a computer. To access a newly created audio recording saved on the VPS, from the msf shell, the cd command can be used to change into the /root/.msf4/loot/ directory.
Use Python3 to create a simple HTTP web server on port 8080, using the below command. The -m argument calls the “http.server” Python3 module, while 8080 is the port opened and used to host the web server.
python3 -m http.server 8080
While the Python3 server is acting as a temporary web server, the msf terminal will not be usable. However, it will then be possible to view audio files from any web browser in the world by entering the IP address of the VPS into a browser search bar and appending the port number (8080) to the VPS’s IP with a colon.
The Python3 web server can be terminated by pressing Ctrl + C on the keyboard.
3: Play the Recorded Audio Files
Most web browsers don’t play WAV audio files by default. So the files will need to be saved locally and listened to using an audio player found in Kali. Audacity is a popular audio player available in the Kali repositories and can be installed by using the below command.
sudo apt-get install audacity
After Audacity is installed, right-clicking on downloaded WAV files. Then opening them with Audacity will allow attackers to hear the recorded audio.
Protect Yourself from being Remotely Spied
As hackers are finding that the cameras and microphones on your devices can provide them with valuable information, You need to know how to secure your microphone from hackers.
Hacked cameras are fairly easy to spot since many have a light that turns on whenever it’s in use. But microphones are much more stealthy. It’s not easy to tell when your microphone is being used.
The best way to secure your gadget’s microphone is to make it non-functional when you’re not using it. This is a really easy process, although it will cost a few dollars to complete.
If your Windows computer has been infested with a backdoor like we’ve done, then you can see how easy it is for hackers to listen to everything you’re saying. While they can’t hear it live, they can listen to the recordings whenever they want. So they can do whatever they want with the recorded audio.
To keep these things from happening take the following steps:
- AppArmor: Use AppArmor Security designed into Linux operating systems can blacklist certain applications from accessing specified parts of the computer. For example opening a malicious PDF when the PDF viewer application doesn’t have access to the microphone may help prevent such attacks.
- Use Qubes: Qubes exercises security by compartmentalization. This allows users to separate the various parts of their digital activities into securely isolated compartments. Qubes is possibly the most secure desktop operating system available. Native Windows users may find it difficult to use at first, but if OS security is a priority, Qubes will prove to be an adequate solution.
- Physically remove the microphone. If the microphone isn’t absolutely required and security is vital, this might be a desirable option.
- Protect your computer against backdoors: While all of the above is helpful when you’re already backdoored, the best thing to do is make sure you’re not exploited in the first place.