Cyber security news for all

More

    Brightness of screen based hacker method leads to stolen data with an air gap

    Experts analyzed and presented new method of stealing data through air gap computers. This method is based on small changes in the brightness settings of an LCD screen. Changes are not visible to the eye, but can be recognized by video feeds using algorithmic methods. Scientists have described this original method of data theft, but stressed that there is no serious cause for concern as it is not an attack that anyone can easily achieve. It is designed for air gap settings where the computers are kept separate without access to the internet.

    screen based hacker method

    Air gap computers are commonly used in government systems or business networks that store highly confidential documents and personal information from customers. Experienced and creative hackers can find ways to infect these systems. For example, you can use an attached USB that is connected to them. However, stealing data from computers with air gaps is a difficult task. Scientists in Israel have attempted this. In recent years, they have been exploring ways to extract data from previously infected computers with air gaps.

    The Brightness Attack Is Extremely Slow

    However, exporting data in this way is extremely slow. In fact, it is the slowest technique of data theft from air gap computers that has never been introduced. However, it can be effective if the attacker wants to steal a very small amount of data. An encryption key for example. Certainly not a suitable method to steal a lot of data.

    Data from the infected computer is obtained by encrypting the information and transmitting it using changes in screen brightness in a sequential pattern very similar to how the code works. The only other requirement for this is that a camera points to the device display that can either record or stream the transmitted pattern. Once the pattern has been received, it can be converted back into meaningful data.

    Recent Articles

    Maze leaks data on its own platform

    The Maze ransomware has been up to almost a year and a half. This week, security experts warned about the actions of the cyber...

    Emotet to spread the malware behind email archives

    If you find an attached pack to an email these days, you should be particularly careful: the highly developed malware Emotet could be lurking...

    500,000 Activision accounts have been leaked

    Activision has taken a position on the alleged leak. According to the publisher, there has never been a data leak. In some cases it is...

    Judge issues injunction against WeChat

    The US government wanted to take action against the app WeChat. A judge stood sideways. The app should disappear from the platforms in the...

    Mail provider Tutanota becomes target of cyber attacks

    Over the weekend, ongoing DDoS attacks and an infrastructure problem resulted in downtime for hundreds of users. While some were able to mitigate most...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox