Smart devices, indeed!

Once compromised, the devices could wake themselves up and start executing commands issued by the remote attacker.

The researchers tested the attack mechanism successfully on both third- and fourth-generation Echo Dot devices.

A smart tablet sitting next to a white Amazon Echo device on a table.

Waldemar Brandt / Unsplash

Interestingly, this hack doesn’t depend on rogue speakers, which further reduces the complexity of the attack.

Moreover, the researchers note that the exploitation process is rather simple.

In one, the attacker would need a smartphone or laptop within the speakers' Bluetooth-pairing range.

An activated Amazon Echo Dot sitting atop a stack of books.

Andres Urena / Unsplash

The researchers note this method involves tricking the targeted user into downloading a malicious Alexa skill to the Echo.

However,Amazon saysall submitted skills are vetted before going live on the Alexa skills store.

After compromising an AP, the attackers would either hunt around for more details or just conduct outward-facing attacks.

Schell isn’t surprised.