{"id":29810,"date":"2019-10-20T19:00:05","date_gmt":"2019-10-20T19:00:05","guid":{"rendered":"http:\/\/e0469a02-3c84-46a2-a87a-febddcd6235c"},"modified":"2019-10-20T19:00:05","modified_gmt":"2019-10-20T19:00:05","slug":"alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/","title":{"rendered":"Alexa and Google Home devices leveraged to phish and eavesdrop on users, again"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/03\/19\/aabefdf6-776e-4769-bbaf-7deecf766d6e\/b1d7b13bf99c960be8d5d4027e6179fa\/alexa-speaker.jpg\" class alt=\"alexa-speaker.jpg\"><\/span><\/p>\n<p>Hackers can abuse Amazon Alexa and Google Home smart assistants to eavesdrop on user conversations without users&#8217; knowledge, or trick users into handing over sensitive information.<\/p>\n<p>The attacks aren&#8217;t technically new. Security researchers have previously found similar phishing and eavesdropping vectors impacting Amazon Alexa <a href=\"https:\/\/info.checkmarx.com\/wp-alexa\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">in April 2018<\/a>; Alexa and Google Home devices <a href=\"https:\/\/arxiv.org\/pdf\/1805.01525.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">in May 2018<\/a>; and again Alexa devices <a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity18\/sec18-kumar.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">in August 2018<\/a>.<\/p>\n<p>Both Amazon and Google have deployed countermeasures every time, yet newer ways to exploit smart assistants have continued to surface.<\/p>\n<p>The latest ones were disclosed today, after being identified earlier this year by Luise Frerichs and Fabian Br\u00e4unlein, two security researchers at Security Research Labs (SRLabs), who shared <a href=\"https:\/\/srlabs.de\/?post_type=bites&amp;p=593\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">their findings<\/a> with ZDNet last week.<\/p>\n<p>Both the phishing and eavesdropping vectors are exploitable via the backend that Amazon and Google provide to developers of Alexa or Google Home custom apps.<\/p>\n<p>These backends provide access to functions that developers can use to customize the commands to which a smart assistant responds, and the way the assistant replies.<\/p>\n<p>The SRLabs team discovered that by adding the &#8220;\ufffd. &#8221; (U+D801, dot, space) character sequence to various locations inside the backend of a normal Alexa\/Google Home app, they could induce long periods of silence during which the assistant remains active.<\/p>\n<h3>Phishing personal data<\/h3>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The two demos embedded below show how an attacker could carry out a phishing attack on both devices.<\/p>\n<p>The idea is to tell the user that an app has failed, insert the &#8220;\ufffd. &#8221; to induce a long pause, and then prompt the user with the phishing message after a few minutes, tricking the target into believing the phishing message has nothing to do with the previous app with which they just interacted.<\/p>\n<p>For example, in the videos below, a horoscope app triggers an error, but then remains active, and eventually asks the user for their Amazon\/Google password while faking an update message from Amazon\/Google itself.<\/p>\n<p>Notice in the first video how Alexa&#8217;s blue status light remains active and never shuts off, a clear indicator that the previous app is still active and busy interpreting a long seriesof &#8220;\ufffd. &#8221; character sequences.<\/p>\n<section class=\"shortcode media-source\">\n<p><iframe loading=\"lazy\" width=\"500\" height=\"282\" allowfullscreen title=\"YouTube content\" id=\"iframe_youtube\" src=\"https:\/\/www.youtube.com\/embed\/Wh2uexUAy7k\">[embedded content]<\/iframe><\/p>\n<\/section>\n<section class=\"shortcode media-source\">\n<p><iframe loading=\"lazy\" width=\"500\" height=\"282\" allowfullscreen title=\"YouTube content\" id=\"iframe_youtube\" src=\"https:\/\/www.youtube.com\/embed\/HliuWtVW4vY\">[embedded content]<\/iframe><\/p>\n<\/section>\n<h3>Eavesdropping on unsuspecting users<\/h3>\n<p>The &#8220;\ufffd. &#8221; can also be used in a similar fashion for eavesdropping attacks. However, this time, the character sequence is used after the malicious app has responded to a user&#8217;s command.<\/p>\n<p>The character sequence is used to keep the device active and record a user&#8217;s conversation, which is recorded in logs, and sent to an attacker&#8217;s server for processing.<\/p>\n<section class=\"shortcode media-source\">\n<p><iframe loading=\"lazy\" width=\"500\" height=\"282\" allowfullscreen title=\"YouTube content\" id=\"iframe_youtube\" src=\"https:\/\/www.youtube.com\/embed\/A3n-0AbXznc\">[embedded content]<\/iframe><\/p>\n<\/section>\n<section class=\"shortcode media-source\">\n<p><iframe loading=\"lazy\" width=\"500\" height=\"282\" allowfullscreen title=\"YouTube content\" id=\"iframe_youtube\" src=\"https:\/\/www.youtube.com\/embed\/X2gddqD1wUI\">[embedded content]<\/iframe><\/p>\n<\/section>\n<p>Both of these attacks exploit the fact that while Amazon and Google verify and vet Alexa and Google Home apps when they are submitted, they do not do the same for subsequent app updates.<\/p>\n<p>In an email to ZDNet, the SRLabs team said they reported the issue to both vendors earlier this year, yet the companies have failed to address the issue.<\/p>\n<p>&#8220;Finding and banning unexpected behavior such as long pauses should be relatively straight-forward,&#8221; the SRLabs team told ZDNet. &#8220;We are surprised that this hasn&#8217;t happened since reporting the vulnerabilities several months ago.&#8221;<\/p>\n<p>Amazon did not respond to a request for comment from ZDNet prior to this article&#8217;s publication.<\/p>\n<p>A Google spokesperson provided the following message:<\/p>\n<p>&#8220;All Actions on Google are required to follow our developer <a href=\"https:\/\/developers.google.com\/assistant\/console\/policies\/general-policies\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">policies<\/a>, and we prohibit and remove any Action that violates these policies. We have review processes to detect the type of behavior described in this report, and we removed the Actions that we found from these researchers. We are putting additional mechanisms in place to prevent these issues from occurring in the future.&#8221;<\/p>\n<p>Google also wanted Home assistant owners to know that their device will never ask them for the account password.<\/p>\n<p><em>Article updated with comment from Google at 3:00pm ET, October 20.<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Amazon, Google fail to address security loopholes in Alexa and Home devices more than a year after first reports.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29811,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-29810","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Alexa and Google Home devices leveraged to phish and eavesdrop on users, again 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Alexa and Google Home devices leveraged to phish and eavesdrop on users, again 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-20T19:00:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Alexa and Google Home devices leveraged to phish and eavesdrop on users, again\",\"datePublished\":\"2019-10-20T19:00:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\\\/\"},\"wordCount\":650,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\\\/\",\"name\":\"Alexa and Google Home devices leveraged to phish and eavesdrop on users, again 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again.jpg\",\"datePublished\":\"2019-10-20T19:00:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again.jpg\",\"width\":950,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alexa and Google Home devices leveraged to phish and eavesdrop on users, again\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Alexa and Google Home devices leveraged to phish and eavesdrop on users, again 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/","og_locale":"en_US","og_type":"article","og_title":"Alexa and Google Home devices leveraged to phish and eavesdrop on users, again 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-20T19:00:05+00:00","og_image":[{"width":950,"height":534,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Alexa and Google Home devices leveraged to phish and eavesdrop on users, again","datePublished":"2019-10-20T19:00:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/"},"wordCount":650,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/","url":"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/","name":"Alexa and Google Home devices leveraged to phish and eavesdrop on users, again 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again.jpg","datePublished":"2019-10-20T19:00:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again.jpg","width":950,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/alexa-and-google-home-devices-leveraged-to-phish-and-eavesdrop-on-users-again\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Alexa and Google Home devices leveraged to phish and eavesdrop on users, again"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29810"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29810\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29811"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}