{"id":20353,"date":"2018-05-30T11:37:23","date_gmt":"2018-05-30T15:37:23","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/smart-watch-research\/20353\/"},"modified":"2019-11-15T13:34:16","modified_gmt":"2019-11-15T11:34:16","slug":"smart-watch-research","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/smart-watch-research\/20353\/","title":{"rendered":"Experiment: How easy is it to spy on a smartwatch wearer?"},"content":{"rendered":"<p>Can a smartwatch be used to spy on its owner? Sure, and we already know lots of ways. But here\u2019s another: A spying app installed on a smartphone can send data from the built-in motion sensors (namely, accelerometer and gyroscope) to a remote server, and that data can be used to piece together the wearer\u2019s actions \u2014 walking, sitting, typing, and so on.<\/p>\n<p>How extensive is the threat in practice, and what data can really be siphoned off? We decided to investigate.<\/p>\n<p><strong><\/strong><\/p>\n<h2>Experiment: Can smartwatch movements reveal a password?<\/h2>\n<p><\/p>\n<p>We started with an Android-based smartwatch, wrote a no-frills app to process and transmit accelerometer data, and analyzed what we could get from this data. For more details, see <a target=\"_blank\" href=\"https:\/\/securelist.com\/trojan-watch\/85376\/\" rel=\"noopener noreferrer\">our full report<\/a>.<\/p>\n<p>The data can indeed be used to work out if the wearer is walking or sitting. Moreover, it\u2019s possible to dig deeper and figure out if the person is out for a stroll or changing subway trains \u2014 the accelerometer patterns differ slightly; that\u2019s also how fitness trackers differentiate between, say, walking and cycling.<\/p>\n<p>It\u2019s also easy to see when a person is typing on a computer. But working out <em><em>what<\/em><\/em> they are typing is way more complex. Everyone has a specific way of typing: the ten-finger method, the one- or two-digit keyboard stab, or something in-between. Basically, different people typing the same phrase can produce very different accelerometer signals \u2014 although one person entering a password several times in a row will produce pretty similar graphs.<\/p>\n<p>So, a neural network trained to recognize how a particular individual enters text could make out what that person types. And if this neural network happens to be schooled in <em>your<\/em> particular way of typing, the accelerometer data from the smartwatch on your wrist could be used to recognize a password based on your hand movements.<\/p>\n<p>However, the training process would require the neural network to track you for quite a long time. The processors in modern portable gadgets are not powerful enough to run a neural network directly, so the data has to be sent to a server.<\/p>\n<p>And therein lies trouble for a would-be spy: The constant upload of accelerometer readings consumes a fair bit of Internet traffic and zaps the smartwatch battery in a matter of hours (six, to be precise, in our case). Both of those telltale signs are easy to spot, alerting the wearer that something is wrong. Both, however, are easily minimized by scooping up data selectively, for example when the target arrives at work, a likely time for password entry.<\/p>\n<p>In short, your smartwatch can be used to identify what you\u2019re typing. But it\u2019s hard, and accurate recovery relies on repeat text entry. In our experiment, we were able to recover a computer password with 96% accuracy and a PIN code entered at an ATM with 87% accuracy.<a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2018\/05\/30174004\/spying-smartwatch-research-app.jpg\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-20356\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2018\/05\/30174004\/spying-smartwatch-research-app.jpg\" alt=\"\" width=\"1460\" height=\"975\"><\/a><\/p>\n<p><strong><\/strong><\/p>\n<h3>It could be worse<\/h3>\n<p><\/p>\n<p>For cybercriminals, however, such data is not all that useful. To use it, they\u2019d still need access to your computer or credit card. The task of determining a card number or CVC code is way trickier.<\/p>\n<p>Here\u2019s why. On returning to the workplace, first thing the smartwatch owner types is almost certainly a password to unlock their computer. That is, the accelerometer graph indicates first walking, then typing. Based on data obtained just for this brief period, it\u2019s possible to recover the password.<\/p>\n<p>But the person won\u2019t enter a credit card number as soon as they sit down \u2014 or get up and walk away immediately after entering that data. What\u2019s more, no one will ever enter this information several times in short succession.<\/p>\n<p>To steal data-entry information from a smartwatch, attackers need predictable activity followed by data entered several times. The latter part, incidentally, is yet another reason not to use the same password for different services.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/LefBfeKvIfw?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p><strong><\/strong><\/p>\n<h3>Who should worry about smartwatches?<\/h3>\n<p><\/p>\n<p>Our research has shown that data obtained from a smartwatch acceleration sensor can be used to recover information about the wearer: movements, habits, some typed information (for example, a laptop password).<\/p>\n<p>Infecting a smartwatch with data-siphoning <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/malware\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">malware <\/a>that lets cybercriminals recover this information is quite straightforward. They just need to create an app (say, a trendy clockface or fitness tracker), add a function to read accelerometer data, and upload it to Google Play. In theory, such an app will pass the malware screening, since there is nothing outwardly malicious in what it does.<\/p>\n<p>Should you worry about being spied on by someone using this technique? Only if that someone has a strong motivation to spy on you, specifically. The average cybercrook is after easy pickings and won\u2019t have much to gain.<\/p>\n<p>But if your computer password or route to the office is of value to someone, a smartwatch is a viable tracking tool. In this case, our advice is:<\/p>\n<ul>\n<li>Take note if your smartwatch is overly traffic-hungry or the battery drains quickly.<\/li>\n<li>Don\u2019t give apps too many <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/android-permissions-guide\/14014\/\" rel=\"noopener noreferrer nofollow\">permissions<\/a>. In particular, watch out for apps that want to retrieve account info and geographical coordinates. Without this data, intruders will struggle to ascertain that it\u2019s your smartwatch they\u2019ve infected.<\/li>\n<li>Install a <a href=\"https:\/\/www.kaspersky.co.za\/mobile-security?icid=en-za_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____f1e79fd4d11f58d1\" target=\"_blank\" rel=\"noopener\">security solution<\/a> on your smartphone that can help detect spyware before it starts spying.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n","protected":false},"excerpt":{"rendered":"<p>We investigate intercepting smartwatch motion-sensor data to monitor people and steal information.<\/p>\n","protected":false},"author":2279,"featured_media":20354,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788,2671,2670],"tags":[2924,854,794,43,732,2925,768],"class_list":{"0":"post-20353","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-special-projects","9":"category-threats","10":"tag-cyberphysical-devices","11":"tag-fitness-trackers","12":"tag-iot","13":"tag-privacy","14":"tag-research","15":"tag-smartwatch","16":"tag-surveillance"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/smart-watch-research\/20353\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/smart-watch-research\/13422\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/smart-watch-research\/11198\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/smart-watch-research\/15477\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/smart-watch-research\/13746\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/smart-watch-research\/13025\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/smart-watch-research\/16260\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/smart-watch-research\/15789\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/smart-watch-research\/20661\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/smart-watch-research\/4983\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/smart-watch-research\/22536\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/smart-watch-research\/10590\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/smart-watch-research\/10384\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/smart-watch-research\/9261\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/smart-watch-research\/16896\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/smart-watch-research\/20522\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/smart-watch-research\/16639\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/smart-watch-research\/20358\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/smartwatch\/","name":"smartwatch"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/20353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/2279"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=20353"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/20353\/revisions"}],"predecessor-version":[{"id":23902,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/20353\/revisions\/23902"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/20354"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=20353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=20353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=20353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}