Home » today » Technology » Hackers Can Spy and Control Meta’s VR Headsets through ‘Inception Attack’, Study Finds

Hackers Can Spy and Control Meta’s VR Headsets through ‘Inception Attack’, Study Finds




Researchers Expose Potential Security Vulnerability in Meta’s VR Headsets

A new study reveals a concerning “Inception Attack” with Meta Quest

A Meta worker uses a Meta Quest VR headset at the Meta showroom in Brussels on December 07, 2022.

KENZO TRIBOUILLARD/AFP/Getty Images

Researchers uncover potential security flaw in Meta’s VR headsets

Researchers have exposed a potentially major security vulnerability with Meta’s virtual reality headsets, according to a new study. A team of researchers from the University of Chicago discovered a way to hack into Meta Quest headsets and gain control of the user’s VR environment, enabling the ability to steal information and manipulate user interactions.

An “Inception Attack” allows attackers to compromise users

The strategy employed in this attack is referred to as an “inception attack.” In this attack, the hacker gains control of the user’s interaction with their VR environment by trapping them inside a malicious VR application that masquerades as the full VR system. The implications of this attack are highly concerning, as users may unknowingly fall victim to unauthorized access of their personal data or manipulative VR experiences.

The study raises concerns amidst ongoing competition in the VR industry

This study comes at a time when Meta CEO, Mark Zuckerberg, continues to criticize Apple’s competing VR product, the Vision Pro. The in-depth analysis of Meta’s vulnerabilities serves as an important reminder that even leading VR technologies are not immune to potentially serious security risks.

Attack process requires WiFi connection and developer mode

To carry out the “inception attack,” the hackers must be connected to the same WiFi network as the Meta Quest user. Additionally, the user’s headset must be in developer mode, a common configuration among Meta Quest users seeking to access third-party apps, adjust resolution, and capture screenshots.

Researchers successfully experiment with “inception attack” process

The researchers successfully executed the “inception attack” process by hacking into VR headsets and planting malware that allowed them to install a fake home screen. This simulated world looked identical to the user’s original VR environment, capturing all their actions and potentially altering their experience without detection.

Inception attack raises concerns over information security

By recreating Meta Quest’s browser and VRChat app, the researchers were able to spy on users as they logged into sensitive accounts, such as their banking or email. In a particularly alarming scenario, the researchers illustrated the ability to manipulate financial transactions.

Users often fail to notice the attack

Real-world testing involved 27 study participants interacting with VR headsets while subjected to the “inception attack.” Astonishingly, the study revealed that only a third of the users noticed the attack when their sessions were hijacked, with most participants falsely attributing the glitches to typical performance issues.

Meta has yet to provide an official statement, but a spokesperson indicated they would review the study. The company actively collaborates with academic researchers as part of their bug bounty program and other initiatives.


Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.