Types of cyber-attacks with using voice
Abstract
Recently, attacks targeting individuals, organizations and even critical voice-activated systems have become widespread one after another. Basically, these are unauthorized access or control of a device using manipulated or synthesized voice commands to attack an identified vulnerability in voice technologies, usually supporting smart assistants and smart speakers. While such attacks are diversifying simultaneously with the regular implementation of voice technologies in daily life, the potential consequences of such attacks also increase their impact in cases where most users and organizations are not sufficiently aware. In this study, various voice-based cyber-attacks, such as voice phishing (vishing), voice command manipulation, attacks using ultrasonic sound waves, hard disk attacks via voice commands and acoustic eavesdropping attacks, their methods (e.g., synthesizing deceptive voice commands, using ultrasonic frequencies to bypass security systems, manipulating devices through inaudible commands, exploiting voice interfaces to access sensitive data on hard drives, capturing private conversations using sound waves) and possible effects are investigated and some legal situations related to these threats are also touched upon in the context of the current cyber security environment in Türkiye. This study aims to increase awareness by providing a comprehensive analysis of voice-based cyber-attacks and to better inform users and cybersecurity professionals about effective prevention and mitigation strategies. It serves as a comprehensive review of existing research in this field.
Keywords
References
- [1] T. D. Rossing, F. R. Moore, and P. A. Wheeler, The Science of Sound, 3rd ed. SF, USA: Addison Wesley, 2002.
- [2] B. Mulgrew, P. Grant, and J. Thompson, Digital Signal Processing: Concepts and Applications. London, 1st ed. U.K.: Palgrave HE UK, 1999.
- [3] B. Naqvi, K. Perova, A. Farooq, I. Makhdoom, S. Oyedeji and J. Porras, “Mitigation strategies against phishing attacks: A systematic literature review,” Comput. & Security, vol. 132, p. 103387, 2023, doi: 10.1016/j.cose.2023.103387.
- [4] W. Stallings, Network Security Essentials: Applications and Standards, 6th ed. Upper Saddle River, NJ, USA: Pearson, 2016.
- [5] A. Saxena. “What is cybersecurity and why is it important?” Sprinto.com. https://sprinto.com/blog/importance-of-cyber-security/ (accessed Nov. 11, 2024).
- [6] R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. Hoboken, NJ, USA: Wiley, 2021.
- [7] M. E. Whitman and H. J. Mattord, Management of Information Security, 6th ed. Boston, MA, USA: Cengage Learning, 2018.
- [8] V Malik, A. Khanna, N. Sharma, and S. Nalluri, (2024). Trends in Ransomware Attacks: Analysis and Future Predictions. International Journal of Global Innovations and Solutions (IJGIS). doi:10.21428/e90189c8.f2996624.
Details
Primary Language
English
Subjects
Digital Forensics, Data Security and Protection
Journal Section
Review
Publication Date
June 30, 2025
Submission Date
December 13, 2024
Acceptance Date
May 27, 2025
Published in Issue
Year 2025 Number: 061
APA
Yalçın, N., & Lale, B. (2025). Types of cyber-attacks with using voice. Journal of Scientific Reports-A, 061, 137-165. https://doi.org/10.59313/jsr-a.1600934
AMA
1.Yalçın N, Lale B. Types of cyber-attacks with using voice. JSR-A. 2025;(061):137-165. doi:10.59313/jsr-a.1600934
Chicago
Yalçın, Nursel, and Bilge Lale. 2025. “Types of Cyber-Attacks With Using Voice”. Journal of Scientific Reports-A, nos. 061: 137-65. https://doi.org/10.59313/jsr-a.1600934.
EndNote
Yalçın N, Lale B (June 1, 2025) Types of cyber-attacks with using voice. Journal of Scientific Reports-A 061 137–165.
IEEE
[1]N. Yalçın and B. Lale, “Types of cyber-attacks with using voice”, JSR-A, no. 061, pp. 137–165, June 2025, doi: 10.59313/jsr-a.1600934.
ISNAD
Yalçın, Nursel - Lale, Bilge. “Types of Cyber-Attacks With Using Voice”. Journal of Scientific Reports-A. 061 (June 1, 2025): 137-165. https://doi.org/10.59313/jsr-a.1600934.
JAMA
1.Yalçın N, Lale B. Types of cyber-attacks with using voice. JSR-A. 2025;:137–165.
MLA
Yalçın, Nursel, and Bilge Lale. “Types of Cyber-Attacks With Using Voice”. Journal of Scientific Reports-A, no. 061, June 2025, pp. 137-65, doi:10.59313/jsr-a.1600934.
Vancouver
1.Nursel Yalçın, Bilge Lale. Types of cyber-attacks with using voice. JSR-A. 2025 Jun. 1;(061):137-65. doi:10.59313/jsr-a.1600934
Cited By
A Deep-Reinforcement Learning Approach to Mitigate Vishing Attacks and Data Theft in Voice over Internet Protocol Calls
Journal of High-Frequency Communication Technologies
https://doi.org/10.58399/VCCV8138