A joint team of American and Israeli researchers demonstrated this sinister capacity by putting a micro-controller inside the battery of a smartphone. The tiny device kept track of the power used by the device.
The data was given to an artificial intelligence (AI), which compared the power flows with certain actions such as keystrokes.
With this technique, hackers could figure out your passwords and the websites you visit the most. They can also learn about the last time you took a photo with your camera or your most recent call you placed.
This hacking method does need the smartphone to be in active use. It also depends on the device being powered by the compromised battery instead of an external power source. (Related: “Tamper-proof” cryptocurrency wallet just backdoored by a 15-year-old self-taught programmer.)
In a recently-presented paper called "Power to Peep-all: Inference Attacks by Malicious Batteries on Mobile Devices," the researchers warned about this hacking threat. The technique is similar to the means by which smart batteries track your phone's power consumption.
Smart batteries keep an eye on the amount of power used by apps and features on the smartphone. They use this data to manage power use, maximizing battery life while ensuring the phone remains responsive.
These batteries are becoming prevalent in the latest smartphones. Now it turns out that hackers can use a similar technique to record the user's activities on the phone.
At the time of the presentation, the researchers admit that there has been no case of such an attack in real life. Hackers need to get their hands on the smartphone in order to replace the standard battery with a "poisoned" unit that contained the micro-controller.
Still, it would not take a suspiciously long time for the switch to be made. The exchange could be performed at any time or place. The researchers cited supply chains, repair stores, and airport security inspections as some of the likeliest places and opportunities.
Furthermore, this method has several advantages over other means of hacking. The microcontroller does not alter the software, so it leaves no hints regarding its presence.
It can keep an eye on the phone's activity without any need to put physical probes in the power charging cable or hacking the network. And the only intrusive alteration of the hardware is the replacement of the battery.
Functions like the camera, an app, or the web browser consume different amounts of power. Hackers can create a detailed log of smartphone activities based on the power usage recorded by the compromised battery.
The researchers also said that software keyboard strokes used a different amount of power from other screen touches. They showed how an AI could tell them apart and identify the particular keystroke on the soft keyboard.
In their experiment, they tested the technique on a Huawei Mate 9 unit and a Samsung Galaxy Note 4 smartphone. They reported tracking and identifying keystrokes made on the Huawei phone's built-in GBoard keyboard and the third-party SwiftKey keyboard.
They were able to pull off the same attack on the Samsung phone's default Samsung keyboard. If combined with battery usage data that indicates the use of a web browser, the hacker can figure out which keystrokes are part of a username or password.
Learn more about devices and methods that are stealing your information at Computing.news.
Sources include:
PETSymposium.org [PDF]