New Mic-E-Mouse Attack Let Hackers Exfiltrate Sensitive Data by Exploiting Mouse Sensors


A novel and alarming cybersecurity threat has emerged, turning an ordinary computer peripheral into a sophisticated eavesdropping device.

Researchers have detailed a new technique, dubbed the “Mic-E-Mouse” attack, which allows threat actors to exfiltrate sensitive data by exploiting the high-performance optical sensors found in many modern computer mice.

This method can covertly capture and reconstruct user speech, opening a new frontier for auditory surveillance. The vulnerability stems from the ever-increasing sensitivity and polling rates of optical sensors in consumer-grade mice.

These advanced sensors, often found in gaming or high-performance models, can detect minute surface variations thousands of times per second.

The Mic-E-Mouse attack capitalizes on this by using the sensor to pick up microscopic vibrations that travel through a desk or work surface when a person speaks.

In effect, the mouse becomes a makeshift microphone, capturing the acoustic environment around it.

google

The Attack Pipeline

While a mouse sensor can detect these vibrations, the raw signal it produces is of extremely poor quality. A high noise floor, non-uniform sampling, a non-linear frequency response, and extreme quantization heavily distort it.

To overcome these significant challenges, the researchers developed a sophisticated pipeline of signal processing and machine learning techniques.

Mic-E-Mouse Attack Pipeline
Mic-E-Mouse Attack Pipeline

The Mic-E-Mouse pipeline works in several stages. First, malicious software on the victim’s computer collects the high-frequency mouse movement data (Δx, Δy, and Δt).

This data collection process is designed to be invisible to the average user. Once collected, the data can be exfiltrated and processed offline by the attacker.

The pipeline then applies advanced algorithms to filter the noise, correct the distortions, and ultimately reconstruct an intelligible audio waveform from the compromised mouse data.

The effectiveness of this method is striking. When tested against the VCTK and AudioMNIST speech datasets, the pipeline achieved a Signal-to-Interference-plus-Noise Ratio (SI-SNR) increase of +19dB, demonstrating a significant improvement in audio clarity.

Furthermore, automated tests demonstrated an 80% accuracy in speaker recognition, and a human study yielded a Word Error Rate (WER) of 16.79%, indicating that the reconstructed speech is highly comprehensible.

Threat Model and Delivery

The researchers outlined a practical threat model for deploying this attack. The ideal delivery vehicle is open-source software, particularly applications where the collection of high-frequency mouse data is not inherently suspicious.

This makes video games, creative software, and other high-performance, low-latency applications prime targets for injecting the malicious data-gathering code.

Threat Model and Delivery
Threat Model and Delivery

An attacker could compromise such an application, and once it’s running on a victim’s computer, it would begin collecting the mouse sensor data.

Many video games already contain networking code that the exploit can repurpose to exfiltrate the collected data without raising suspicion from security software.

After the initial collection, all subsequent processing and analysis can be performed on the adversary’s own systems at any time.

The growing accessibility and affordability of vulnerable hardware magnifies the threat. High-fidelity mice are already available for under $50, and as technology improves, their prices are expected to drop further.

This trend will lead to the increased use of vulnerable mice by consumers, corporations, and government entities, dramatically expanding the attack surface for this type of surveillance.

Researchers note that most human speech falls within the 200Hz to 2000Hz frequency range, which their pipeline can successfully detect and reconstruct.

This new research demonstrates that auditory surveillance through high-performance optical sensors is not just a theoretical possibility, but an effective and efficient threat.

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

googlenews



Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.