Close ad

For years, it seemed that computers disconnected from the Internet were better protected from hackers than those connected to the Internet via WiFi or cable. However, security experts from Israel's Ben Gulion University discovered it in recent years a number of options, to get even on offline devices thanks to ways that resemble a sci-fi movie. Another named is added to the list of more than ten solutions BRIGHTNESS. Because hackers can get to sensitive data by changing the brightness of the screen.

A trio of experts Mordechai Guri, Dima Bykhovsky and Yuval Elovici discovereda an unsecured channel in the screen sending system that allows hackers to send sensitive data using brightness modulation. The malware essentially turns the display into a morse code that hides the "0" and "1" signals into the screen's refresh rate. Therefore, the user has no chance to know that the computer has been hacked. A hacker then only needs to have a view of the display using a recording device such as a security or mobile camera. Then just t is enoughalet the data be analyzed by software and thus obtain a copy of the data stored on the computer.

The researchers who discovered the error were able to send a completely error-free revision of the fairy tale Medvíd in an experimentek Pú and achieved transmissionsé speedi 10 bits per second. However, the hacker must first get malware into the computer, which is also not a problem for the hackers from Ben Gurion University. Their portfolio of discoveries includes the following forms of hacking:

  • Air Hopper – Hackers turn the graphics card into an FM transmitter, it mainly serves as a keylogger
  • they then get the data from the signals sent through the cable to the screen.
  • AIR Jumper – Allows you to capture sensitive data using infrared waves captured by night vision security cameras
  • BeatCoins – It allows you to get the encryption keys of disconnected cryptocurrency wallets by electromagnetic waves.
  • BitWhisper – Enables passwords and security keys to be shared by thermally swapping two disconnected PCs
  • DiskFiltration – Allows data to be transmitted using the sounds generated by the recording needleou na hard disk
  • fansmitter – Transmits data using fan noise.
  • GSM – Allows data to be obtained by jamming telecommunication waves using signals between the CPU and RAM
  • HDD – Allows you to hack a computer thanks to the magnetic waves generated by hard drives in laptops
  • MAGNETO – Allows you to jailbreak your smartphone using the processor's magnetic waves
  • MOSQUITO – Allows data to be shared offline using ultrasonic waves
  • ODIN – Allows you to jailbreak a computer using the processor's magnetic waves
  • powerhammer – Allows you to extract data from your computer using a power cable
  • RADIoT – Uses radio signals generated by IoT devices
  • USBee – Allows you to export data using radio frequencies transmitted by the USB connectory

To protect against this kind of hack, researchers recommend additional measures such as security foils on the display or changing the position of security cameras so that hackers cannot have a view of the screensu.

Source: The Hacker News; TechSpot

.