New Mic-E-Mouse Attack Shows Computer Mice Can Capture Conversations
Security researchers at UC Irvine reveal the 'Mic-E-Mouse' attack, showing how high-DPI optical sensors in modern mice can detect desk vibrations and reconstruct user speech with high accuracy. Learn how this side-channel vulnerability affects your privacy.

Your computer mouse is usually one of the first things you touch when you start a new day, but what if that familiar device could also eavesdrop on your conversations? A recent study from the University of California, Irvine has uncovered a startling side‑channel attack that turns high‑performance gaming mice into covert microphones. The researchers call it **Mic‑E‑Mouse**. By leveraging the ultra‑sensitive optical sensors found in modern high‑DPI mice, the team showed that the tiny vibrations of a desk surface can be translated into acoustic signals. When a person speaks near the mouse, the sound waves ripple through the desk and cause minuscule movements of the mouse’s sensor. The sensor, designed to detect sub‑millimetre displacement for precision tracking, captures those movements with enough fidelity that the researchers were able to reconstruct the spoken words with high accuracy. In laboratory conditions, the attack succeeded on a range of everyday microphones, from cheap USB units to more sophisticated office models, and even on smart devices that rely on internal microphones. The results suggest that any computer that is routinely used in close proximity to a desk—laptops, desktops, and even tablets—could be compromised if it has an optical mouse attached. The implications for privacy are significant. An attacker could potentially listen in on private conversations or sensitive business discussions without triggering any conventional audio‑capture alarms. Because the attack relies on a physical vibration channel rather than network traffic, it bypasses many existing security controls. So, what can users do? The research team recommends a few practical mitigations. First, avoid placing the mouse on a solid, acoustically conductive surface; a padded mouse pad can dampen vibrations. Second, keep the mouse away from the main desk where conversations typically happen. Third, consider disabling or physically removing the mouse when not in use. Finally, be aware that the same principle could apply to other desk‑mounted peripherals—printers, keyboards, or even power strips can serve as unintended acoustic channels. While the attack is still in the experimental stage, it serves as a sobering reminder that security threats can come from the most unexpected corners of our everyday tech. In an era where privacy is increasingly fragile, even the humble computer mouse may need to be treated as a potential eavesdropper. (Source: HackRead)