Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Researchers find a way to use a computer mouse for eavesdropping

0
Low
Vulnerability
Published: Thu Oct 23 2025 (10/23/2025, 19:34:47 UTC)
Source: Kaspersky Security Blog

Description

Mic-E-Mouse: a theoretical attack that could allow eavesdropping on conversations in a room through a computer mouse's optical sensor.

AI-Powered Analysis

AILast updated: 10/23/2025, 19:46:05 UTC

Technical Analysis

The Mic-E-Mouse attack is a novel theoretical side-channel eavesdropping technique demonstrated by researchers at the University of California, Irvine. It leverages the extreme sensitivity of optical sensors in certain high-end computer mice, which function as low-resolution cameras capturing surface images at very high frame rates. These mice, with resolutions of 10,000 DPI or higher and polling rates of 4000Hz or more, can detect minute vibrations on the desk surface caused by sound waves from human speech. The attack scenario involves malware installed on a PC that intercepts raw mouse sensor data, which is then transmitted to an attacker’s server. There, signal processing techniques including Wiener filtering and machine learning-based noise reduction reconstruct the audio signal from the noisy data. Although the reconstructed audio is imperfect, it can reveal intelligible speech content. However, the attack faces significant practical constraints: only a limited number of gaming mice currently meet the required specifications; typical office mice lack sufficient resolution and polling rates. The attack requires malware capable of accessing detailed mouse sensor data, which is uncommon and may require custom or modified software. Additionally, the experimental setup used artificial sound sources placed extremely close to the mouse sensor, and real-world conditions such as thick tabletops and ambient noise drastically reduce effectiveness. The researchers suggest that as sensor technology advances, such attacks could become more feasible in the future. They recommend organizational policies banning high-resolution mice in sensitive areas, use of vibration-dampening mousepads, and robust malware defenses to mitigate this unconventional espionage vector.

Potential Impact

For European organizations, the Mic-E-Mouse attack represents a low-probability but novel espionage threat that exploits hardware side channels rather than traditional network or software vulnerabilities. Confidentiality is the primary concern, as attackers could potentially eavesdrop on sensitive conversations in secure rooms without physical microphones or network interception. Integrity and availability impacts are minimal. The attack bypasses many conventional security controls since it leverages legitimate hardware data and requires no special privileges to access mouse movement data, making detection challenging. However, the limited availability of suitable mice and the requirement for malware presence reduce immediate risk. Organizations with high-security environments, such as government agencies, defense contractors, or critical infrastructure operators, may find this threat more relevant as it could circumvent traditional acoustic security measures. The attack also underscores the need to consider unconventional hardware-based attack vectors in threat models and endpoint security strategies.

Mitigation Recommendations

1. Implement organizational policies to prohibit or restrict the use of high-DPI (≥10,000) and high-polling-rate (≥4000Hz) mice, especially in sensitive or secure environments. 2. Maintain an approved hardware inventory and blocklist unauthorized or high-specification gaming mice via endpoint management tools. 3. Deploy vibration-dampening mousepads or desk mats to reduce transmission of acoustic vibrations to mouse sensors. 4. Enhance endpoint security to detect and prevent malware that accesses raw mouse sensor data or unusual input device telemetry. 5. Monitor and audit software that accesses detailed mouse data streams, flagging anomalous or unauthorized usage. 6. Educate security teams about hardware side-channel threats to broaden threat detection capabilities. 7. For highly sensitive environments, consider physical security controls such as isolating or removing peripheral devices capable of such side-channel data capture. 8. Collaborate with hardware vendors to understand sensor capabilities and advocate for firmware or driver-level mitigations that limit raw sensor data exposure. 9. Regularly review and update security policies to include emerging unconventional attack vectors like Mic-E-Mouse.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/mic-e-mouse-attack/54659/","fetched":true,"fetchedAt":"2025-10-23T19:45:52.594Z","wordCount":1699}

Threat ID: 68fa85f0a3a2e7083d940ea3

Added to database: 10/23/2025, 7:45:52 PM

Last enriched: 10/23/2025, 7:46:05 PM

Last updated: 10/30/2025, 1:24:36 PM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats