Recently, attacks targeting individuals, organizations and even critical voice-activated systems have become widespread one after another. Basically, these are unauthorized access or control of a device using manipulated or synthesized voice commands to attack an identified vulnerability in voice technologies, usually supporting smart assistants and smart speakers. While such attacks are diversifying simultaneously with the regular implementation of voice technologies in daily life, the potential consequences of such attacks also increase their impact in cases where most users and organizations are not sufficiently aware. In this study, various voice-based cyber-attacks, such as voice phishing (vishing), voice command manipulation, attacks using ultrasonic sound waves, hard disk attacks via voice commands and acoustic eavesdropping attacks, their methods (e.g., synthesizing deceptive voice commands, using ultrasonic frequencies to bypass security systems, manipulating devices through inaudible commands, exploiting voice interfaces to access sensitive data on hard drives, capturing private conversations using sound waves) and possible effects are investigated and some legal situations related to these threats are also touched upon in the context of the current cyber security environment in Türkiye. This study aims to increase awareness by providing a comprehensive analysis of voice-based cyber-attacks and to better inform users and cybersecurity professionals about effective prevention and mitigation strategies. It serves as a comprehensive review of existing research in this field.
Cybersecurity cyber-attack data breach voice technologies voice-based attacks
Birincil Dil | İngilizce |
---|---|
Konular | Dijital Adli Tıp, Veri Güvenliği ve Korunması |
Bölüm | Review |
Yazarlar | |
Yayımlanma Tarihi | 30 Haziran 2025 |
Gönderilme Tarihi | 13 Aralık 2024 |
Kabul Tarihi | 27 Mayıs 2025 |
Yayımlandığı Sayı | Yıl 2025 Sayı: 061 |