A team of researchers from the University of California, Irvine, has discovered a security risk right on your desk. It turns out that your high-performance computer mouse, an item you probably trust completely, can be turned into a hidden listening device. This new type of attack is called Mic-E-Mouse, and it has the potential to change our understanding of what computer privacy means.
The idea, which the researchers described as “our computer mouse has big ears” and published on their official Google research site, is an interesting one. It focuses on the highly sensitive optical sensors found in modern gaming and professional mice.
These sensors, which track movement with extreme accuracy (sometimes 20,000 DPI (Dots Per Inch) or even higher), are sensitive enough to detect minute vibrations caused by sound waves travelling through your desk.
Basically, your conversation causes your desk surface to shake just a little bit, and the mouse sensor picks up those tiny tremors. This vulnerability is formally known as a side-channel attack, which means it secretly gathers information through an unintended pathway, in this case, the mouse’s movement data.
Turning Vibrations into Voice
A study (PDF) posted on arXiv on 16 September 2025 by Habib Fakih, Rahul Dharmaji, Youssef Mahmoud, Halima Bouzidi, and Mohammad Abdullah Al Faruque from the Department of Electrical Engineering and Computer Science, University of California, Irvine, explains how the researchers created a process that converts raw, seemingly random mouse movement data into clear audio signals.
The raw data is initially messy and incomplete, a problem the researchers solved with a multi-step “pipeline” that uses advanced signal processing and machine learning. This process filters out noise and pieces together the actual speech.
The team’s experiments showed that they could significantly clean up the audio, achieving an increase of up to +19 dB in signal quality and a speech recognition accuracy between 42% and 61% on common speech datasets.
For your information, this attack does not require a complicated virus or deep system access. An attacker only needs a way to collect the mouse’s packet data, which could be done through common software like video games or creative applications that naturally demand high-speed mouse data.
The whole process of data collection is invisible to the average user because it only captures the device’s normal movement reporting, and all the audio reconstruction can happen remotely on the attacker’s own server.
The research team has demonstrated the attack with a video to encourage manufacturers to implement safeguards that can help prevent this unexpected privacy threat.
The implications of this eavesdropping can be extensive. This research shows that as devices become more advanced, the risk of them being misused also increases. Considering that these high-precision mice have become more common and less expensive, the number of potential targets from businesses to everyday homes will grow.