Flaw in Google Fast Pair devices allows hackers to eavesdrop

Security researchers have uncovered a vulnerability called WhisperPair in 17 audio devices using Google's Fast Pair protocol, enabling hackers to access microphones and track locations within Bluetooth range. The flaw affects products from 10 manufacturers, including Sony and Google, and stems from improper implementation of the pairing standard. Google has collaborated with researchers to address the issue, though full fixes depend on hardware partners.

A team of researchers from Belgium's KU Leuven University revealed the WhisperPair vulnerability on January 15, 2026, affecting 17 headphone and speaker models certified for Google's Fast Pair protocol. This one-tap pairing feature, designed to simplify Bluetooth connections, has been improperly implemented by some hardware partners, allowing unauthorized pairings even outside pairing mode.

The attack requires a hacker to be within Bluetooth range—up to 14 meters—and know the device's model number, which is easily obtainable. It takes a median of 10 seconds, or less than 15 in some cases, to hijack the device. As KU Leuven researcher Sayon Duttagupta explained to Wired, "You're walking down the street with your headphones on, you're listening to some music. In less than 15 seconds, we can hijack your device. Which means that I can turn on the microphone and listen to your ambient sound. I can inject audio. I can track your location."

Once connected, attackers can interrupt audio streams, play their own sounds, eavesdrop via the microphone, or use Google's Find Hub to track the device's location. The vulnerability applies even to non-Android users if the device hasn't been linked to a Google account, potentially allowing hackers to bind it to their own account.

Researchers notified Google in August 2025, prompting collaboration through the company's Vulnerability Rewards Program. Google provided fixes to partners in September 2025 and updated its Find Hub network, but the team quickly found a workaround. A Google spokesperson stated, "We appreciate collaborating with security researchers... We worked with these researchers to fix these vulnerabilities, and we have not seen evidence of any exploitation outside of this report's lab setting. As a best security practice, we recommend users check their headphones for the latest firmware updates."

Affected manufacturers include Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech, and Google. Google's Pixel Buds have received patches, while OnePlus is investigating. The flaw cannot be disabled, and many users may remain vulnerable without installing manufacturer apps for updates. Researchers advise regular firmware checks and factory resets if compromise is suspected, noting no known real-world exploits to date.

Verwandte Artikel

Realistic illustration of a user experiencing Google's live translation feature via headphones on Android, with multilingual speech bubbles in an airport setting.
Bild generiert von KI

Google expands live translation to any headphones

Von KI berichtet Bild generiert von KI

Google is updating its Translate app to allow real-time speech-to-speech translations using any connected headphones on Android devices. The beta feature, powered by Gemini AI, supports more than 70 languages and improves handling of idioms and slang. It rolls out initially in the US, Mexico, and India, with iOS support planned for later.

Security researchers, first reporting via TechRadar in December 2025, warn WhatsApp's 3 billion users of GhostPairing—a technique tricking victims into linking attackers' browsers to their accounts, enabling full access without breaching passwords or end-to-end encryption.

Von KI berichtet

Hackers are targeting WhatsApp users with a new GhostPairing scam that allows full account access without cracking passwords or encryption safeguards. The scam bypasses traditional authentication methods, posing a significant risk to user privacy and security. Users are advised to check the Linked Devices section to detect any compromises.

Amazon is offering the Google Pixel Buds Pro 2 wireless earbuds for $165, a 28 percent discount from the original price. This deal applies specifically to the hazel colorway, while other colors are available for around $179. The earbuds are praised for their comfort and audio quality, especially for users in the Pixel ecosystem.

Von KI berichtet

A leak reported by TechRadar suggests that OpenAI, the creator of ChatGPT, is developing an earbud-style wearable device. The device reportedly includes a surprising twist in its design. The story was published on January 15, 2026.

A new leak suggests that Nothing is preparing to launch additional budget-focused headphones. The report highlights the potential for these affordable 'cans' to incorporate traits from other low-cost models.

Von KI berichtet

Apple is reportedly developing a small AI-enabled wearable device resembling a pin, similar in size to an AirTag but slightly thicker. The device features cameras, microphones, and a speaker to interact with AI models. It could launch as early as 2027 amid competition from OpenAI and Meta.

Montag, 02. Februar 2026, 00:15 Uhr

Report uncovers data leaks in android ai apps

Dienstag, 27. Januar 2026, 23:57 Uhr

Google Pixel 10 users face Wi-Fi and Bluetooth issues after update

Mittwoch, 21. Januar 2026, 06:53 Uhr

Sony unveils clip-on earbuds joining growing trend

Samstag, 17. Januar 2026, 07:54 Uhr

How to pair AirPods with various devices explained

Freitag, 02. Januar 2026, 10:04 Uhr

Next generation of noise-canceling tech advances in labs

Mittwoch, 24. Dezember 2025, 15:34 Uhr

Tech enthusiast at 37 questions gadget frustrations

Samstag, 20. Dezember 2025, 06:12 Uhr

Bluetooth 6.0 enhances wireless connectivity for headphones

Donnerstag, 18. Dezember 2025, 17:42 Uhr

Headphone conversation awareness modes enhance daily interactions

Dienstag, 16. Dezember 2025, 12:11 Uhr

Meta updates smart glasses with conversation focus and Spotify AI

Dienstag, 16. Dezember 2025, 11:30 Uhr

Silent Whisper vulnerability exposes WhatsApp users to secret tracking

 

 

 

Diese Website verwendet Cookies

Wir verwenden Cookies für Analysen, um unsere Website zu verbessern. Lesen Sie unsere Datenschutzrichtlinie für weitere Informationen.
Ablehnen