Close Menu
Westside People
    Facebook X (Twitter) Instagram
    Westside People
    Subscribe
    • Home
    • Top News
    • World
    • Economy
    • science
    • Tech
    • sport
    • entertainment
    • Contact Form
    Westside People
    Home»Tech»Meta VR headsets can trap users in an illusory environment: study
    Tech

    Meta VR headsets can trap users in an illusory environment: study

    Avery KensingtonBy Avery KensingtonMarch 13, 2024No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    Meta VR headsets can trap users in an illusory environment: study
    Share
    Facebook Twitter Pinterest Reddit WhatsApp Email

    A Meta worker uses the Meta Quest VR headset at a Meta showroom in Brussels on December 7, 2022.
    Kenzo Tripouillard/AFP/Getty Images

    • A new study has revealed that researchers have uncovered a potential security vulnerability in Meta's VR headset.
    • The so-called “priming attack” allows an attacker to spy on and control the user's virtual reality environment.
    • Only a third of study participants noticed the glitch when their session was hacked.

    Researchers have uncovered a potentially major security flaw in Meta's virtual reality headsets, according to a new study.

    A team of researchers from the University of Chicago said they have discovered a way to hack Meta Quest headsets without the user's knowledge, allowing them to control the user's virtual reality environment, steal information, and even manipulate interactions between users.

    The researchers called this strategy a “priming attack,” which they defined as “an attacker-controlled attack that manipulates a user’s interaction with their VR environment, by trapping the user within a single malicious VR application that masquerades as the full VR system.”

    This study comes as Meta CEO Mark Zuckerberg continues to dump the Apple Vision Pro, his biggest competitor in the field. Last week, Zuckerberg said Apple's virtual reality headset was “worse in most ways.”

    the Stadywhich was first reported by MIT Technology Reviewhas not yet been peer-reviewed.

    In order to carry out the attack, the hackers had to be connected to the same WiFi network as the Quest user, according to the study. The headset must also be in developer mode, which researchers said many Meta Quest users keep enabled to get third-party apps, adjust resolution, and take screenshots.

    From there, the researchers were able to plant malware on the headphones, allowing them to install a fake home screen that looked identical to the user's original screen, but that the researchers could control.

    This duplicate home screen is essentially a simulation within a simulation.

    “While the user believes they are interacting normally with various VR applications, they are actually interacting within a simulated world, where everything they see and hear is intercepted, transmitted, and possibly altered by the attacker,” the researchers wrote in the study. .

    The researchers created cloned versions of the Meta Quest Browser app and the VRChat app. Once the replica of the browser app was running, the researchers were able to spy on users as they logged into sensitive accounts, such as their bank or email.

    They were able to not only see what the user was doing, but also manipulate what the user was seeing.

    For example, researchers described a situation in which a user transfers money. While the user is trying to transfer $1 to someone, the attacker can change the amount to $5 on the backend. Meanwhile, it still appears as $1 to the user, including on the confirmation screen, so the user is unaware of what happened.

    To test the initial attack process with real people, the researchers asked 27 study participants to interact with virtual reality headsets while carrying out the attack. The study said that only a third of users noticed the flaw when their session was hijacked, and all but one user attributed it to a normal performance issue.

    Meta did not immediately respond to a request for comment from Business Insider, but an MIT Technology Review spokesperson said they would review the study, adding: “We continually work with academic researchers as part of our bug bounty program and other initiatives.”

    Avery Kensington
    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleLeonid Volkov: Navalny ally blames Putin's followers for attack in Lithuania
    Next Article Saquon Barkley terminated 3-year contract with Eagles – NBC Sports Philadelphia

    Related Posts

    Samsung and Google Expand Galaxy XR Capabilities With Major Android XR Update

    April 10, 2026

    Android May Expand Its Edge Over iOS With New “Notification Rules” Feature

    April 3, 2026

    Google Prepares Screenless Fitbit Band to Challenge Whoop and Oura

    April 1, 2026

    Android Malware Steals Payment Card Data Using Never-Before-Seen Technique

    August 24, 2024

    Amazon is killing off a key feature on its $160 Echo after one year

    August 23, 2024

    Animal Crossing: Pocket Camp Will End Online Service in November

    August 23, 2024
    Add A Comment
    Leave A Reply Cancel Reply

    Navigate
    • Home
    • Top News
    • World
    • Economy
    • science
    • Tech
    • sport
    • entertainment
    • Contact Form
    Pages
    • Home
    • Privacy Policy
    • Editorial Policy
    • DMCA
    • About Us
    Facebook X (Twitter) Instagram Pinterest
    © © 2026 WestsidePeopleMag.com. Independent stories, culture, and community coverage. All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.