Hackers can now clone your keys just by listening to them with a smartphone

Oh yeah, and your so-called smart doorbell could be a part of the problem.
 By 
Jack Morse
 on 
Hackers can now clone your keys just by listening to them with a smartphone

Every time you unlock your front door, your key whispers a small, but audible, secret. Hackers finally learned how to listen.

Researchers at the National University of Singapore published a paper earlier this year detailing how, using only a smartphone microphone and a program they designed, a hacker can clone your key. What's more, if a thief was able to install malware on your smartphone, smartwatch, or smart doorbell to record the audio from afar, they wouldn't even need to be physically nearby to pull off the attack.

The key (ahem) to the attack, dubbed SpiKey, is the sound made by the lock pins as they move over a typical key's ridges.

"When a victim inserts a key into the door lock, an attacker walking by records the sound with a smartphone microphone," describes the paper written by Soundarya Ramesh, Harini Ramprasad, and Jun Han.

With that recording, the thief is able to use the time between the audible clicks to determine distance between the ridges along the key. Using this information, a bad actor could then compute and then produce a series of likely keys.

"[On] average, SpiKey is able to provide 5.10 candidate keys guaranteeing inclusion of the correct victim key from a total of 330,424 keys, with 3 candidate keys being the most frequent case," reads the study.

In other words, instead of fooling around with lock-picking tools, a thief could simply try a few pre-made keys and then stroll right through the victim's door.

Of course, there are some limitations in the real world. For staters, the attacker would need to know what type of lock the victim has. That information can be figured out by simply looking at the exterior of the lock, though.

Second, the speed at which the key is placed into the lock is assumed to be constant. But the researchers have thought of that, too.

"This assumption may not always hold in [the] real-world, hence, we plan to explore the possibility of combining information across multiple insertions," they explain.

It's worth noting that at present this is a relatively easy attack to defeat. Simply make sure no one is around you, recording, when you put your key into a lock. However, that won't always be the case.

"We may exploit other approaches of collecting click sounds such as installing malware on a victim’s smartphone or smartwatch, or from door sensors that contain microphones to obtain a recording with higher signal-to-noise ratio," explain the study authors. "We may also exploit long distance microphones to reduce suspicion. Furthermore, we may increase the scalability of SpiKey by installing one microphone in an office corridor and collect recordings for multiple doors."

SEE ALSO: Police used ‘smart streetlights’ to surveil protesters, just as privacy groups warned

In other words, they're already thinking about ways to make this attack easier to pull off. And, sorry, so-called smart locks just present their own security issues. Amazon's Ring security cameras, remember, are hacked all the time. And as the researchers postulate, a hacker could, in theory, use the microphone embedded in such a camera to capture the sounds your key makes and then use the SpiKey technique to produce physical keys to your home.

However, if a hacker got access to your Ring, there are easier ways to clone your key than listening to it. Even so, maybe make a little noise when unlocking your door going forward. Your neighbors may think you're a tad weird, but at least they won't be able to use SpiKey to break into your place.

Topics Cybersecurity

Mashable Image
Jack Morse

Professionally paranoid. Covering privacy, security, and all things cryptocurrency and blockchain from San Francisco.

Mashable Potato

Recommended For You
Iran-linked hackers launch cyberattack against U.S. medtech company Stryker
Stryker logo on medical equipment

How hackers are stealing millions from ATMs, FBI warns
a card being inserted into an atm

CES 2026: Solver adds configurable haptic buttons to your smartphone
Solver at CES 2026

Audible launches Read & Listen, allowing you to follow along with your audiobook
A smartphone showing the Read & Listen feature on  Audible

Apple surpasses Samsung to become the world's number one smartphone maker
Apple iPhone 16e

More in Tech
California just launched the country's largest public broadband network
Newsom stands behind a teen on a computer. A group of people cheer and clap behind them.

The Shark FlexStyle is our favorite Dyson Airwrap dupe, and it's $160 off at Amazon right now
The Shark FlexStyle Air Styling & Drying System against a colorful background.

Amazon's sister site is having a one-day sale, and this Bissell TurboClean deal is too good to skip
A woman using the Bissell TurboClean Cordless Hard Floor Cleaner Mop and Lightweight Wet/Dry Vacuum.

The best smartwatch you've never heard of is on sale for less than $50
Nothing CMF Watch 3 Pro in light green with blue and green abstract background

Reddit r/all takes another step into the grave
Reddit logo on phone screen

Trending on Mashable
NYT Connections hints today: Clues, answers for April 3, 2026
Connections game on a smartphone

Wordle today: Answer, hints for April 3, 2026
Wordle game on a smartphone

Google launches Gemma 4, a new open-source model: How to try it
Google Gemma

What's new to streaming this week? (April 3, 2026)
A composite of images from film and TV streaming this week.

NYT Connections hints today: Clues, answers for April 2, 2026
Connections game on a smartphone
The biggest stories of the day delivered to your inbox.
These newsletters may contain advertising, deals, or affiliate links. By clicking Subscribe, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.
Thanks for signing up. See you at your inbox!