Vulnerability News

New Mic-E-Mouse Attack Let Hackers Exfiltrate Sensitive Data by Exploiting Mouse Sensors

A novel and alarming cybersecurity threat has emerged, turning an ordinary computer peripheral into a sophisticated eavesdropping device.

Researchers have detailed a new technique, dubbed the “Mic-E-Mouse” attack, which allows threat actors to exfiltrate sensitive data by exploiting the high-performance optical sensors found in many modern computer mice.

This method can covertly capture and reconstruct user speech, opening a new frontier for auditory surveillance. The vulnerability stems from the ever-increasing sensitivity and polling rates of optical sensors in consumer-grade mice.

These advanced sensors, often found in gaming or high-performance models, can detect minute surface variations thousands of times per second.

The Mic-E-Mouse attack capitalizes on this by using the sensor to pick up microscopic vibrations that travel through a desk or work surface when a person speaks.

In effect, the mouse becomes a makeshift microphone, capturing the acoustic environment around it.

The Attack Pipeline

While a mouse sensor can detect these vibrations, the raw signal it produces is of extremely poor quality. A high noise floor, non-uniform sampling, a non-linear frequency response, and extreme quantization heavily distort it.

To overcome these significant challenges, the researchers developed a sophisticated pipeline of signal processing and machine learning techniques.

Mic-E-Mouse Attack Pipeline

The Mic-E-Mouse pipeline works in several stages. First, malicious software on the victim’s computer collects the high-frequency mouse movement data (Δx, Δy, and Δt).

This data collection process is designed to be invisible to the average user. Once collected, the data can be exfiltrated and processed offline by the attacker.

The pipeline then applies advanced algorithms to filter the noise, correct the distortions, and ultimately reconstruct an intelligible audio waveform from the compromised mouse data.

The effectiveness of this method is striking. When tested against the VCTK and AudioMNIST speech datasets, the pipeline achieved a Signal-to-Interference-plus-Noise Ratio (SI-SNR) increase of +19dB, demonstrating a significant improvement in audio clarity.

Furthermore, automated tests demonstrated an 80% accuracy in speaker recognition, and a human study yielded a Word Error Rate (WER) of 16.79%, indicating that the reconstructed speech is highly comprehensible.

Threat Model and Delivery

The researchers outlined a practical threat model for deploying this attack. The ideal delivery vehicle is open-source software, particularly applications where the collection of high-frequency mouse data is not inherently suspicious.

This makes video games, creative software, and other high-performance, low-latency applications prime targets for injecting the malicious data-gathering code.

Threat Model and Delivery

An attacker could compromise such an application, and once it’s running on a victim’s computer, it would begin collecting the mouse sensor data.

Many video games already contain networking code that the exploit can repurpose to exfiltrate the collected data without raising suspicion from security software.

After the initial collection, all subsequent processing and analysis can be performed on the adversary’s own systems at any time.

The growing accessibility and affordability of vulnerable hardware magnifies the threat. High-fidelity mice are already available for under $50, and as technology improves, their prices are expected to drop further.

This trend will lead to the increased use of vulnerable mice by consumers, corporations, and government entities, dramatically expanding the attack surface for this type of surveillance.

Researchers note that most human speech falls within the 200Hz to 2000Hz frequency range, which their pipeline can successfully detect and reconstruct.

This new research demonstrates that auditory surveillance through high-performance optical sensors is not just a theoretical possibility, but an effective and efficient threat.

Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware

Microsoft has issued a warning that both cybercriminals and state-sponsored threat actors are increasingly abusing…

57 minutes ago

Why Threat Prioritization Is the Key SOC Performance Driver

CISOs face a paradox in their SOCs every day: more data and detections than ever…

1 hour ago

BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data

BK Technologies Corporation, a provider of communications equipment for public safety and government agencies, has…

1 hour ago

INE Security Releases Industry Benchmark Report: “Wired Together: The Case for Cross-Training in Networking and Cybersecurity”

Raleigh, United States, October 7th, 2025, CyberNewsWire Report Shows Cross-Training as Strategic Solution to Operational…

3 hours ago

Ransomware Gangs Leverage Remote Access Tools to Gain Persistence and Evade Defenses

Ransomware operators have shifted from opportunistic malware distribution to highly targeted campaigns that exploit legitimate…

4 hours ago

Researchers Reversed Asgard Malware Protector to Uncover it’s Antivirus Bypass Techniques

In recent months, security researchers have turned their attention to Asgard Protector, a sophisticated crypter…

5 hours ago