Cyber security news for all

More

    Brightness of screen based hacker method leads to stolen data with an air gap

    Experts analyzed and presented new method of stealing data through air gap computers. This method is based on small changes in the brightness settings of an LCD screen. Changes are not visible to the eye, but can be recognized by video feeds using algorithmic methods. Scientists have described this original method of data theft, but stressed that there is no serious cause for concern as it is not an attack that anyone can easily achieve. It is designed for air gap settings where the computers are kept separate without access to the internet.

    screen based hacker method

    Air gap computers are commonly used in government systems or business networks that store highly confidential documents and personal information from customers. Experienced and creative hackers can find ways to infect these systems. For example, you can use an attached USB that is connected to them. However, stealing data from computers with air gaps is a difficult task. Scientists in Israel have attempted this. In recent years, they have been exploring ways to extract data from previously infected computers with air gaps.

    The Brightness Attack Is Extremely Slow

    However, exporting data in this way is extremely slow. In fact, it is the slowest technique of data theft from air gap computers that has never been introduced. However, it can be effective if the attacker wants to steal a very small amount of data. An encryption key for example. Certainly not a suitable method to steal a lot of data.

    Data from the infected computer is obtained by encrypting the information and transmitting it using changes in screen brightness in a sequential pattern very similar to how the code works. The only other requirement for this is that a camera points to the device display that can either record or stream the transmitted pattern. Once the pattern has been received, it can be converted back into meaningful data.

    Recent Articles

    macOS Trojans: Traces lead to Vietnam

    Security researchers have discovered a new macOS Trojans. Behind this could be a well known hacker group that has spied on Vietnamese dissidents in...

    Court forces Tutanota to perform a surveillance function

    Tutanota email only stores its user mails in encrypted form and cannot read them itself. Tutanota is one of the few email providers that...

    Manchester United have been blackmailed by cyber attackers

    The Premier League club Manchester UnitedĀ fell victim to a cyber attack according to the Daily Mail. The cyber criminals are apparently demanding ransom in...

    TikTok has fixed a serious security gap issue

    TikTok accounts paid a researcher a reward of 4000 dollars after he reported two vulnerabilities as part of a disclosure. A combination of both...

    Passwords should be changed for Fortinet VPNs

    Administrators should change the access for Fortinet VPNs in use. Log-in information for almost 50,000 VPN networks has appeared in various cyber blogs. A security...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox