Review

Types of cyber-attacks with using voice

Number: 061 June 30, 2025

Types of cyber-attacks with using voice

Abstract

Recently, attacks targeting individuals, organizations and even critical voice-activated systems have become widespread one after another. Basically, these are unauthorized access or control of a device using manipulated or synthesized voice commands to attack an identified vulnerability in voice technologies, usually supporting smart assistants and smart speakers. While such attacks are diversifying simultaneously with the regular implementation of voice technologies in daily life, the potential consequences of such attacks also increase their impact in cases where most users and organizations are not sufficiently aware. In this study, various voice-based cyber-attacks, such as voice phishing (vishing), voice command manipulation, attacks using ultrasonic sound waves, hard disk attacks via voice commands and acoustic eavesdropping attacks, their methods (e.g., synthesizing deceptive voice commands, using ultrasonic frequencies to bypass security systems, manipulating devices through inaudible commands, exploiting voice interfaces to access sensitive data on hard drives, capturing private conversations using sound waves) and possible effects are investigated and some legal situations related to these threats are also touched upon in the context of the current cyber security environment in Türkiye. This study aims to increase awareness by providing a comprehensive analysis of voice-based cyber-attacks and to better inform users and cybersecurity professionals about effective prevention and mitigation strategies. It serves as a comprehensive review of existing research in this field.

Keywords

References

  1. [1] T. D. Rossing, F. R. Moore, and P. A. Wheeler, The Science of Sound, 3rd ed. SF, USA: Addison Wesley, 2002.
  2. [2] B. Mulgrew, P. Grant, and J. Thompson, Digital Signal Processing: Concepts and Applications. London, 1st ed. U.K.: Palgrave HE UK, 1999.
  3. [3] B. Naqvi, K. Perova, A. Farooq, I. Makhdoom, S. Oyedeji and J. Porras, “Mitigation strategies against phishing attacks: A systematic literature review,” Comput. & Security, vol. 132, p. 103387, 2023, doi: 10.1016/j.cose.2023.103387.
  4. [4] W. Stallings, Network Security Essentials: Applications and Standards, 6th ed. Upper Saddle River, NJ, USA: Pearson, 2016.
  5. [5] A. Saxena. “What is cybersecurity and why is it important?” Sprinto.com. https://sprinto.com/blog/importance-of-cyber-security/ (accessed Nov. 11, 2024).
  6. [6] R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. Hoboken, NJ, USA: Wiley, 2021.
  7. [7] M. E. Whitman and H. J. Mattord, Management of Information Security, 6th ed. Boston, MA, USA: Cengage Learning, 2018.
  8. [8] V Malik, A. Khanna, N. Sharma, and S. Nalluri, (2024). Trends in Ransomware Attacks: Analysis and Future Predictions. International Journal of Global Innovations and Solutions (IJGIS). doi:10.21428/e90189c8.f2996624.

Details

Primary Language

English

Subjects

Digital Forensics, Data Security and Protection

Journal Section

Review

Publication Date

June 30, 2025

Submission Date

December 13, 2024

Acceptance Date

May 27, 2025

Published in Issue

Year 2025 Number: 061

APA
Yalçın, N., & Lale, B. (2025). Types of cyber-attacks with using voice. Journal of Scientific Reports-A, 061, 137-165. https://doi.org/10.59313/jsr-a.1600934
AMA
1.Yalçın N, Lale B. Types of cyber-attacks with using voice. JSR-A. 2025;(061):137-165. doi:10.59313/jsr-a.1600934
Chicago
Yalçın, Nursel, and Bilge Lale. 2025. “Types of Cyber-Attacks With Using Voice”. Journal of Scientific Reports-A, nos. 061: 137-65. https://doi.org/10.59313/jsr-a.1600934.
EndNote
Yalçın N, Lale B (June 1, 2025) Types of cyber-attacks with using voice. Journal of Scientific Reports-A 061 137–165.
IEEE
[1]N. Yalçın and B. Lale, “Types of cyber-attacks with using voice”, JSR-A, no. 061, pp. 137–165, June 2025, doi: 10.59313/jsr-a.1600934.
ISNAD
Yalçın, Nursel - Lale, Bilge. “Types of Cyber-Attacks With Using Voice”. Journal of Scientific Reports-A. 061 (June 1, 2025): 137-165. https://doi.org/10.59313/jsr-a.1600934.
JAMA
1.Yalçın N, Lale B. Types of cyber-attacks with using voice. JSR-A. 2025;:137–165.
MLA
Yalçın, Nursel, and Bilge Lale. “Types of Cyber-Attacks With Using Voice”. Journal of Scientific Reports-A, no. 061, June 2025, pp. 137-65, doi:10.59313/jsr-a.1600934.
Vancouver
1.Nursel Yalçın, Bilge Lale. Types of cyber-attacks with using voice. JSR-A. 2025 Jun. 1;(061):137-65. doi:10.59313/jsr-a.1600934

Cited By