dearJulius.com

It's Possible To 'Steal' Data By Manipulating Screen Brightness

© Ben-Gurion University of the Negev/Engadget   Researchers figured out a way to steal information from an isolated computer not connected to the internet. It has to do with manipulating screen brightness.

By Courtney Linder, Popular Mechanics

  • Researchers from Ben-Gurion University of the Negev in Israel have figured out a way to steal information from an isolated computer not connected to the internet.
  • By taking advantage of small changes in color and brightness on LCD monitors, bad actors could use cameras to "see through" the ordinary screen's content, revealing vulnerable data.
  • Although this kind of attack would be complicated to pull off, it's an example of ways that researchers are trying to stay one step ahead of the hackers.

Hackers know some insidious ways to siphon data, so scientists have to think up as many scenarios as possible to keep abreast of the bad actors. Mordechai Guri, head of research and development for the Advanced Cyber-Security Research Lab at Ben-Gurion University of the Negev in Israel, is on the case.

Guri figured out that by exploiting small changes to the RGB values in a PC's liquid crystal display—RGB being a color model used in computing to create a wide range of tones from just red, green, and blue—it's possible to pull information from someone else's screen, even if the computer is "air-gapped" and not connected to the internet. In other words, changes to the computer screen's brightness can create vulnerabilities that hackers can take advantage of with some effort.

"In the proposed modulation, the RGB color component of each pixel is slightly changed," Guri explains in a new scientific paper published to the preprint server arXiv. "These changes are invisible, since they are relatively small and occur fast, up to the screen refresh rate."

Here's what's going on: As the pixels change color, a small portion of each voxel is altered. So for instance, a pixel that's ordinarily pinkish can be changed ever-so-slightly to a more red hue. This is all done through an "image brightness encoder," which modifies the brightness of the pixels according to each bit (labeled in binary code with a "1" or "0").

"The small changes in the brightness are invisible to humans but can be recovered from video streams taken by cameras such as a local security camera, smartphone camera or a webcam," Guri says.

© Ben-Gurion University of the Negev   How to Hack Data by Manipulating Screen Brightness

Using recording devices to both access and capture imperceptible data is called display-to-camera communication. It's a class of hacking that doesn't really require a computer to be connected to the internet—and in this case, that's exactly the kind of limitation that the researchers wanted to explore. All that's needed is surveillance equipment pointed at a computer screen infected with malware.

Specifically, malware installed on a compromised computer can modulate sensitive information like encryption keys or passwords inside the brightness of the screen, Guri explains. So this is quite a dangerous hack, as it can all happen right beneath the computer user's nose.

To be fair, this looks pretty damn difficult to pull off. Who leaves a security camera pointed at a computer that's intentionally disconnected from the internet for data safety reasons? And hey, good luck installing malware on that computer—you'll need to physically infect the device, like through a USB stick, since it's not connected to the internet.

Still. Pretty sinister stuff!

|Featured Content_$type=three$c=3$l=0$m=0$s=hide$rm=0


A Part of Julius LLC
Made with in NYC by Julius Choudhury
Name

AI,6,Amazon Prime,1,Android,31,Apple,44,Apps,35,Browsers,3,Camera,18,Chrome,2,Computing,17,Electronics,11,Electronics and Gadgets,12,Email,2,Entertainment,3,Facebook,3,Featured,13,Features,110,Fintech,1,Firefox,1,Gadgets,90,Games,123,Google,51,Industry,5,Instagram,4,Internet,29,iOS,2,iPad,9,iPhone,53,Laptops,19,Mac,1,Messenger,1,Metaverse,1,Microsoft,8,Mobile,24,News,1,Operating Systems,3,Portable Media,14,Printer,2,Security,30,Smartphone,90,Snapchat,2,Social Media,59,Spotify,1,Tech Advice,12,Tech Education,8,Tech Hacks,40,Tech Updates,3,Tutorials,56,TV,2,Twitter,4,Virtual Reality,1,VPN,2,Web & Social,17,WhatsApp,2,Wi-Fi,7,Windows,3,YouTube,7,
ltr
item
Tech Magazine: It's Possible To 'Steal' Data By Manipulating Screen Brightness
It's Possible To 'Steal' Data By Manipulating Screen Brightness
You know ... if you wanted to.
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjnV9mspCJXreyrYwMMsO7rG6G8U_hl4G10GRs18DZJ4BZASuVb_iRegpquZEHypDbg_Gk8PEB6fNCwYLH_5M86DErcNl0FY9xRaweLWmpzePgt2UER5lGOeCM5uKM0up8LsucvdNjbh8/s1600/1.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjnV9mspCJXreyrYwMMsO7rG6G8U_hl4G10GRs18DZJ4BZASuVb_iRegpquZEHypDbg_Gk8PEB6fNCwYLH_5M86DErcNl0FY9xRaweLWmpzePgt2UER5lGOeCM5uKM0up8LsucvdNjbh8/s72-c/1.jpg
Tech Magazine
https://tech.dearjulius.com/2020/02/its-possible-to-steal-data-by-manipulating-screen-brightness.html
https://tech.dearjulius.com/
https://tech.dearjulius.com/
https://tech.dearjulius.com/2020/02/its-possible-to-steal-data-by-manipulating-screen-brightness.html
true
5526239608669527925
UTF-8
Loaded All Posts Not found any posts VIEW ALL Read More Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content