Audio Capture

https://attack.mitre.org/techniques/T1123/

ATT&CK ID: T1123

Permissions Required: User

Description

An adversary can leverage a computer's peripheral devices (e.g., microphones and webcams) or applications (e.g., voice and video call services) to capture audio recordings for the purpose of listening into sensitive conversations to gather information.

Malware or scripts may be used to interact with the devices through an available API provided by the operating system or an application to capture audio. Audio files may be written to disk and exfiltrated later.

[Source]

Techniques

Metasploit

Captures audio input from the hosts primary microphone device. the parameter -i specifies the recording interval in seconds.

run sound_recorder -i 300 -l /home/kali

Mitigation

  • Monitor executed commands and arguments for actions that can leverage a computer’s peripheral devices (e.g., microphones and webcams) or applications (e.g., voice and video call services) to capture audio recordings for the purpose of listening into sensitive conversations to gather information.

  • Disconnect devices capable of audio input, muting is less preferable unless the device is governed by a physical switch.

Further Reading

Last updated