Single voice command exposes humanoid robots to hijacking
The compromised robot used short-range wireless signals to infect another robot that was offline and not connected to any network.
Menu
Front Page Breaking News Comments Flagged Comments Recently Flagged User Blogs Write a Blog Entry Create a Poll Edit Account Weekly Digest Stats Page RSS Feed Back Page
Subscriptions
Read the Retort using RSS.
RSS Feed
Author Info
lamplighter
Joined 2013/04/13Visited 2025/12/28
Status: user
MORE STORIES
Judge Lifts Trump Limits on Lawmaker Visits to ICE Jails (3 comments) ...
Congress Looks to Reclaim Relevance After Ceding Power to WH (2 comments) ...
Single voice command exposes humanoid robots to hijacking (1 comments) ...
Living Here Means Breathing in Doughnuts All Day (2 comments) ...
Congress Says Russia, China Are Targeting Europe (23 comments) ...
Alternate links: Google News | Twitter
Admin's note: Participants in this discussion must follow the site's moderation policy. Profanity will be filtered. Abusive conduct is not allowed.
More from the article ...
... Commercial robots are far more vulnerable to hacking than many users realise, with cybersecurity experts warning that some machines can be taken over in minutes. Now, Chinese developers have demonstrated how flaws in humanoid and quadruped robots allow attackers to seize full control through voice commands or wireless links, turning the machines into tools for physical disruption. At recent security tests and hacking competitions held at GEEKCon in Shanghai, compromised robots were shown spreading attacks to other units, raising fresh concerns over safety, regulation, and the rapid deployment of internet-connected robots in public and industrial spaces. In October, researchers revealed a Bluetooth flaw in Unitree robots that allows wireless root access, allowing a compromised machine to spread attacks to nearby robots and form a dangerous botnet. Robots turned weapons Cybersecurity specialists from the research group DARKNAVY have demonstrated how modern humanoid robots can be compromised and weaponised through weaknesses in their AI-driven control systems. ...
Commercial robots are far more vulnerable to hacking than many users realise, with cybersecurity experts warning that some machines can be taken over in minutes.
Now, Chinese developers have demonstrated how flaws in humanoid and quadruped robots allow attackers to seize full control through voice commands or wireless links, turning the machines into tools for physical disruption.
At recent security tests and hacking competitions held at GEEKCon in Shanghai, compromised robots were shown spreading attacks to other units, raising fresh concerns over safety, regulation, and the rapid deployment of internet-connected robots in public and industrial spaces.
In October, researchers revealed a Bluetooth flaw in Unitree robots that allows wireless root access, allowing a compromised machine to spread attacks to nearby robots and form a dangerous botnet.
Robots turned weapons
Cybersecurity specialists from the research group DARKNAVY have demonstrated how modern humanoid robots can be compromised and weaponised through weaknesses in their AI-driven control systems. ...
#1 | Posted by LampLighter at 2025-12-28 02:24 PM | Reply
Post a comment The following HTML tags are allowed in comments: a href, b, i, p, br, ul, ol, li and blockquote. Others will be stripped out. Participants in this discussion must follow the site's moderation policy. Profanity will be filtered. Abusive conduct is not allowed. Anyone can join this site and make comments. To post this comment, you must sign it with your Drudge Retort username. If you can't remember your username or password, use the lost password form to request it. Username: Password: Home | Breaking News | Comments | User Blogs | Stats | Back Page | RSS Feed | RSS Spec | DMCA Compliance | Privacy
The following HTML tags are allowed in comments: a href, b, i, p, br, ul, ol, li and blockquote. Others will be stripped out. Participants in this discussion must follow the site's moderation policy. Profanity will be filtered. Abusive conduct is not allowed.
Home | Breaking News | Comments | User Blogs | Stats | Back Page | RSS Feed | RSS Spec | DMCA Compliance | Privacy