Google smart speaker can be used by attacker to listen in to your private convos

The information needed to hack the Nest Mini would include the name of the device, the certificate, and the Cloud ID. With this info, the hacker can send a request to Google's server requesting a link to the smart speaker allowing the device to be used to make online transactions, control smart appliances, unlock the front door, and more. The hacker could also have the speaker call his phone allowing him to listen in to a conversation taking place around the home using the speaker's microphone.
The researcher was able to make this happen by creating a malicious routine that included the "call [phone number]" command. This activated the microphone at a specified time, calling the attacker's phone (as we mentioned in the above paragraph) allowing him to listen in via the microphone on the smart speaker. Kunze recorded a video showing how the Nest Mini's microphone can send conversations to a smartphone, which in this case would be in the possession of the bad actor.

The malicious setting which allows the smart speaker to capture audio from the speaker's microphone
The issue was discovered by Kunze in January 2021 and Google fixed it in April 2021. Anyone running the latest firmware should not be concerned with this issue.ncG1vNJzZmivp6x7sbTOp5yaqpWjrm%2BvzqZmp52nqHyou86go55lmKS6pnnSqZyao5WneqStzWaqqbFdpLtuwdKeqayXmZl%2BdYCUb2o%3D