RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Dev & DevSecOpsAugust 8, 2023

Listen up, devs: AI trained to overhear passwords

Deep learning model knows what keys you press — “with 95% accuracy.” The password's days are numbered.

Richi Jennings
Richi Jennings, Independent industry analyst, editor, and content strategist.Richi Jennings
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
computer keyboard with rainbow background

Researchers trained a deep learning model with keypress sounds from all recent Apple laptops. If it can hear you type, it can predict your credentials — with scary accuracy.

And, yes, even over Zoom, Twitch or Slack Huddle. In this week’s Secure Software Blogwatch, we turn up the music.

Your humble blogwatcher curated these bloggy bits for your entertainment. Not to mention: the michael rosurripere.

Sing loudly at login

What’s the craic? Bill Toulas reports — “New acoustic attack steals data from keystrokes”:

“Rapid advancements”

A team of researchers … has trained a deep learning model that can steal data from keyboard keystrokes recorded using a microphone with an accuracy of 95%. When Zoom was used, … the prediction accuracy dropped to 93%, which is still dangerously high.

…

It could leak people's passwords, discussions, messages, or other sensitive information to malicious third parties. … The abundance of microphone-bearing devices … combined with the rapid advancements in machine learning, make sound-based side-channel attacks feasible. … The attack model proved highly effective even against a very silent keyboard, so adding sound dampeners on mechanical keyboards or switching to membrane-based keyboards is unlikely to help.

So, what is likely to help? Aaron Leong adds — “This AI Can Steal Your Password With Alarming Accuracy”:

“Easy to train”

Stay vigilant with how you enter your personal information on your computer. Password managers and biometric authentication … can help minimize the need for manual entry. The paper also suggests frequently changing your password or typing style, which are effective, but less practical methods.

…

The research … proves that acoustic-based attacks are rather easily developed and dangerous if used by nefarious individuals. CoAtNet was relatively easy to train, as it only required the British team to gather data by pressing 36 keys on the MacBook Pro 25 times.

Horse’s mouth? Joshua Harrison, Ehsan Toreini and Maryam Mehrnezhad offer some wordy motivation — “A Practical, Deep Learning-Based, Acoustic Side-Channel Attack on Keyboards”:

“Results outperform previous work”

The ubiquity of keyboard acoustic emanations makes them not only a readily available attack vector, but also prompts victims to underestimate (and therefore not try to hide) their output. … When typing a password, people will regularly hide their screen but will do little to obfuscate their keyboard’s sound.

…

The state-of-the-art CoAt Network … combines more traditional convolutional … deep learning (DL) … models with transformers. … With the recent developments in both the performance of (and access to) both microphones and DL models, the feasibility of an acoustic attack on keyboards begins to look likely [and] a large portion of the population could be at risk.

…

In this paper: … We propose a novel technique to deploy deep learning models featuring self-attention layers for an … acoustic side-channel attack … on a keyboard for the first time. … We propose and implement a practical deep learning-based acoustic side channel attack on keyboards. We use self-attention transformer layers in this attack on keyboards for the first time. … We evaluated our designed attack in real–world attack scenarios [and] our results outperform those of previous work.

Is it a big deal, though? Shaitan thinks it’s pretty big:

That's a pretty big deal: First of all people type passwords and other sensitive things while on teams calls and such all the time.

But an even bigger issue, if you have a microphone enabled device nearby while you work it can be scraping content all day. If it can hear you say, "Hey Google," or, "Hey Siri," then it is listening.

But 95%, while high, is the per-character accuracy. So, many attempts will fail — especially with a long passphrase. SideQuark explains the flaw in that argument:

For each stroke, the most likely key is the top choice. Most models return a probability distribution per key, and it's very likely the other keys are in the top 2 or 3.

Then you simply have the password cracker start trying passwords ordered by probability. … I bet it breaks your sentence within very few tries.

Why not just use a key logger? That’s not the point, says u/luziferius1337:

If you can execute code on the target machine, use a key logger. Easier, more reliable and stealthier data use. This is not the point of this attack vector.

…

Hack into a Zoom meeting, stay silent/undetected, record all audio and decipher all typed text. You may get a random login to a random system, if someone logs in somewhere. You can also use this to target people who voluntarily broadcast their keyboard sounds, like Twitch streamers, etc.

How easy is it? Use the force, Luke90:

Actually applying this as an attack in the wild seems like it would need to overcome a lot of hurdles. … But hey, I'm sure a lot of genuinely dangerous exploits started out with even more abstract proofs of concept than this and it's certainly interesting.

…

Being a terrible typist could be a good defence. … If someone's constantly making and correcting typos … it's going to be harder to work [out] what actual keys were pressed.

When I say, “He say, she say, we say. Make. Some. Noise,” illogicalpremise kills me:

Make some noise! … I read the whole paper … and I'm pretty skeptical of how well this would work outside an experimental setup.

…

If you sit silently in a silent room, doing nothing but typing sensitive text during a video call with untrusted parties on a common/known device then maybe there's a real threat here. But I see no reason for most people to panic.

Is it? u/thispostcouldbemore thinks for themself:

We are going down a slippery slope. My only hope is that … counters will be developed — with counters for the counters that counter the previous counters.

Meanwhile, Logan Naym always — always — gives us more to worry about:

It is not just passwords. They would have access to my snarky comments about how boring the meeting is too.

And Finally:

*click* noice

Previously in And finally


You have been reading Secure Software Blogwatch by Richi Jennings. Richi curates the best bloggy bits, finest forums, and weirdest websites … so you don’t have to. Hate mail may be directed to @RiCHi, @richij or ssbw@richi.uk. Ask your doctor before reading. Your mileage may vary. Past performance is no guarantee of future results. Do not stare into laser with remaining eye. E&OE. 30.

Image sauce: Taiki Ishikawa (via Unsplash; leveled and cropped)

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Dev & DevSecOps

More Blog Posts

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / Twitter
LinkedInLinkedIn
FacebookFacebook
InstagramInstagram
YouTubeYouTube
blueskyBluesky
RSSRSS
Back to Top
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Menu

Lab offers 9 ways to improve MCP security

The Vulnerable MCP Servers Lab delivers integration training, demos, and instruction on attack methods.

Learn More about Lab offers 9 ways to improve MCP security
Lab offers 9 ways to improve MCP security

How AI coding is breathing new life into Rust 

AI tools are making Rust a favorite language of developers — even those maintaining codebases like Microsoft’s.

Learn More about How AI coding is breathing new life into Rust 
How AI coding is breathing new life into Rust 

Anthropic’s PSF investment: Why it matters

Here’s what the $1.5M investment in the Python Software Foundation will mean for AI coding and open-source security.

Learn More about Anthropic’s PSF investment: Why it matters
Anthropic’s PSF investment: Why it matters
Request a demo
Software quality crisis

Software quality's decline: How AI accelerates it

Development is in freefall toward software entropy and insecurity. Can spec-driven development help?

Learn More about Software quality's decline: How AI accelerates it
Software quality's decline: How AI accelerates it
MCP security robot
AI coding new life for Rust
Open-source software (OSS)