InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: New PIXHELL attack exploits LCD screen noise to steal data from isolated computers
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > New PIXHELL attack exploits LCD screen noise to steal data from isolated computers
Technology

New PIXHELL attack exploits LCD screen noise to steal data from isolated computers

September 11, 2024 6 Min Read
Share
PIXHELL Attack
SHARE
 

New side-channel attacks pixel The vulnerability could be exploited to target air-gapped computers by using noise generated by the pixels on an LCD screen to penetrate the “audio gap” and extract sensitive information.

“Malware in air-gapped and audio-gapped computers generates crafted pixel patterns that generate noise in the frequency range of 0-22 kHz,” Dr. Mordechai Guri, director of the Offensive Cyber ​​Research Lab at the School of Software and Information Systems Engineering at Ben-Gurion University of the Negev in Israel, said in the newly published paper.

“Malicious code harnesses the sound generated by the coil and capacitor to control the frequency emitted by the screen. The acoustic signal can then be encoded and transmitted as sensitive information.”

This attack is notable in that it does not require any special audio hardware, speakers or built-in speakers on the compromised computer, but rather utilizes the LCD screen to generate the acoustic signal.

Air-gapping is an important security measure designed to protect mission-critical environments from potential security threats by physically and logically isolating them from external networks (such as the Internet), typically accomplished by disconnecting network cables, disabling wireless interfaces, and disabling USB connections.

 

However, such defenses can be circumvented by an insider or a compromised hardware or software supply chain. Another scenario could be an unsuspecting employee plugging in an infected USB drive, deploying malware that can launch a covert data exfiltration channel.

“Phishing, malicious insider and other social engineering techniques may be used to trick individuals with access to air-gapped systems into taking actions that compromise security, such as clicking on malicious links or downloading infected files,” Dr. Guri said.

See also  Lazarus Group uses fake coding tests to spread malware

“Attackers may also use software supply chain attacks, targeting software application dependencies and third-party libraries. Compromising these dependencies can introduce vulnerabilities or malicious code that goes unnoticed during development and testing.”

Similar to the recently demonstrated RAMBO attack, PIXHELL utilizes malware deployed on a compromised host to create an acoustic channel to exfiltrate information from audio-gapped systems.

This is possible because LCD screens contain inductors and capacitors as part of their internal components and power supply, which vibrate at audible frequencies and create high-frequency noise as electricity passes through their coils (a phenomenon known as coil whine).

Specifically, changes in power consumption induce mechanical vibrations of capacitors and/or piezoelectric effects, resulting in audible noise.An important factor influencing the consumption pattern is the number of lit pixels and their distribution across the screen, since white pixels require more power to display than dark pixels.

“Also, when an alternating current (AC) is passed through the screen capacitor, it vibrates at a specific frequency,” Dr Guri said. “The acoustic radiation is generated by the internal electrical components of the LCD screen, and its characteristics are affected by the actual bitmap, pattern and intensity of the pixels projected on the screen.”

https://www.youtube.com/watch?v=TtybA7C47SU

“By carefully controlling the pixel patterns that appear on the screen, our technology produces specific sound waves at specific frequencies from the LCD screen.”

Thus, an attacker can use this technique to exfiltrate data in the form of an acoustic signal, modulate it and send it to a nearby Windows or Android device, and then demodulate the packets to extract the information.

See also  Trump missed that moment, but he is in a better place right now than he was in 2016 or 2020.

That being said, it should be noted that the power and quality of the emitted acoustic signal will depend on factors such as the particular screen construction, internal power supply, and the position of the coil and capacitor.

Another important point to highlight is that the PIXHELL attack displays a bitmap pattern consisting of alternating black and white rows, and is therefore visible by default to users looking at an LCD screen.

“Attackers may use strategies that involve transmissions when users are absent in order to maintain secrecy,” Dr. Guri said. “For example, so-called ‘nighttime attacks’ on covert channels can be maintained during off hours, reducing the risk of exposure.”

However, this attack turns into a stealth attack during working hours by lowering the pixel colors to very low values ​​before transmission (i.e. using RGB levels (1,1,1), (3,3,3), (7,7,7), (15,15,15)), giving the user the impression that the screen is black.

However, doing so has the side effect of “significantly” reducing sound production levels, and the approach is not foolproof, as users may still notice unusual patterns if they look “carefully” at the screen.

This is not the first time that the AudioGap limitation has been overcome with a laboratory setup: previous studies by Dr. Guri and colleagues have used sounds generated by computer fans (Fansmitter), hard disk drives (Diskfiltrate), CD/DVD drives (CD-LEAK), power supply units (POWER-SUPPLaY) and inkjet printers (Inkfiltrate).

Recommended countermeasures include using acoustic jamming devices to neutralize transmissions, monitoring the audio spectrum for anomalous or unusual signals, limiting physical access to authorized personnel only, banning the use of smart phones, and using external cameras to detect unusual modulated screen patterns.

See also  Blade Ball Code

Share This Article
Twitter Copy Link
Previous Article Warhammer 40k Space Marines surges on Steam thanks to sequel success Warhammer 40k Space Marines surges on Steam thanks to sequel success
Next Article The abortion issue has quickly become a flashpoint between Harris and Trump The abortion issue has quickly become a flashpoint between Harris and Trump
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

The Solution is Cyber ​​Hygiene

The Solution is Cyber ​​Hygiene

Cybersecurity in healthcare has never been more urgent. As the…

September 19, 2024
mm

Enterprise LLM API: A top choice for powering LLM applications in 2024

Some big recent news stories have escalated the race for…

September 19, 2024
Authentication Bypass

GitLab fixes critical SAML authentication bypass vulnerability in CE and EE editions

GitLab has released a patch to address a critical flaw…

September 19, 2024
Chinese engineer indicted in US for years of cyberespionage targeting NASA and military

Chinese engineer indicted in US for years of cyberespionage targeting NASA and military

A Chinese national has been indicted in the United States…

September 19, 2024
IoT Botnet

New “Raptor Train” IoT Botnet Compromises Over 200,000 Devices Worldwide

Cybersecurity researchers have discovered a never-before-seen botnet made up of…

September 18, 2024

You Might Also Like

mm
Technology

Reflection 70B: LLM with Self-Correcting Cognition and Initiative Performance

11 Min Read
Boiling Point: Why he skipped the presidential debate and went to a baseball game
Politics

Boiling Point: Why he skipped the presidential debate and went to a baseball game

23 Min Read
HTTP Headers for Credential Theft
Technology

Cybercriminals exploit HTTP headers to steal credentials through mass phishing attacks

7 Min Read
mm
Technology

Searching smarter: How OpenAI’s SearchGPT is changing the game

9 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?