The team created a rogue echo by removing a flash memory chip from the device, changing the firmware to access the root and soldering it back to the PCB. Then the group put the speaker on the same WiFi network as untouched Echos. The researchers used Amazon's comprehensive communications protocol in addition to the Alexa interface errors (including addressing, encryption scripting and web encryption downgrades) to get full control over victims' speakers, including audio recordings and play any sound they like.
Amazon has already solved the associated internet problems. As it is said, the likelihood of a reality attack was a little bit. Any random eavesdropper would have to know how to disassemble the echo, identify (and connect) a network with other Echos and chain more exploits. This would be most useful in hotels and other places where a hacker could both expect smart speakers and relax without dragging too much attention. If there is more concern, it is that this shows that it is possible to sneak out of it, no matter how small it may be.