Wednesday, April 30, 2025
HomeComputer SecurityHackers Can Exfiltrate & Transfer the Sensitive Data using Smart Bulbs Lights

Hackers Can Exfiltrate & Transfer the Sensitive Data using Smart Bulbs Lights

Published on

SIEM as a Service

Follow Us on Google News

A new research reveals that hackers can exfiltrate the sensitive data from the Smart Bulbs using lights as a channel and transfer the data from the compromised devices.

Smart bulbs are now widely available as home-based appliances that connected to the Internet and allow users to changes the color, remotely control it and users can schedule on and off times.

Few Months before In a similar research that connected smart light can be used as a covert-channel to exfiltrate the user’s private data by taking advantage of light emitted by modern smart bulbs.

- Advertisement - Google News

Researchers tested the industries leading smart bulbs and take a look on Magic Blue smart bulb that available very less price in the market.

These bulbs are manufacturing by the Chinese company  Zengge and it is connected with a mobile application in order to users control the smart bulb.

In this case, researchers using different types of hardware and the main goal was to sniff the communication in between Bulb and the paired mobile application.

Sniffing & Exfiltrate the Data using Smart bulbs

Initially, Team of researchers paired the mobile phone with the right app and there are 4 hardware involved in this process of sniffing operation including 3 Ubertooth (aka uberteeth), Smart Bulb, Mobile Phone, Laptop.

Later they started changing the colors and meanwhile they also they connected 3 ubertooth dongles to their Linux machine where they getting the traffic and analyze them using Wireshark network analysis tool.

Under the process of reversing the mobile application, researchers used the adb tool to download the Android application and used jadx to analyze it to make sure changing colors are same as they found in sniffing apps.

According to checkmarxm, The main plan for exfiltration was to use light as a channel to transfer information from a compromised device to the attacker. Light can achieve longer distances, which was our goal. Imagine the following attack scenario: a BLE device (smartphone) gets compromised with malware. The malware steals the user’s credentials. The stolen information is sent to an attacker using a BLE light bulb nearby.

In this case, attackers receive an exfiltrated data using a smartphone and it will be connected to telescope in order to visible it widely.

Researchers created two apps, One for sending the exfiltrate the data and another one will receive the data.

Here the first app has 2 modes, normal and stealthy. Normal mode allows smart bulb exfiltration app which is visible to the human eye that helps to App scans for the vulnerable bulbs, sending the Payload and stealthy mode which helps to scan the vulnerable bulbs and Starts the loop of exfiltration data.

Researchers demonstrate the proof-of-concept in below Video:

“These methods will work on every smart bulb that allows control by an attacker. In the future, we would like to create a better proof of concept that allows us to test a database of vulnerable bulbs and even implement AI to learn and implement new bulbs along the way. “Researchers said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Microsoft Telnet Server Flaw Lets Attackers Bypass Guest Login Restrictions

A newly disclosed vulnerability in Microsoft’s Telnet Server component is making headlines after researchers...

Firefox 138 Launches with Patches for Several High-Severity Flaws

Mozilla has officially released Firefox 138, marking a significant update focused on user security....

Anthropic Report Reveals Growing Risks from Misuse of Generative AI Misuse

A recent threat report from Anthropic, titled “Detecting and Countering Malicious Uses of Claude:...

Link11 brings three brands together on one platform with new branding

Link11 has fully integrated DOSarrest and Reblaze to become one of Europe's leading providers...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

INDOHAXSEC Hacker Group Allegedly Breaches Malaysia’s National Tuberculosis Registry

The Indonesian hacker group "INDOHAXSEC" has allegedly breached the National Tuberculosis Registry (NTBR) of...

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

Firefox 133.0 Released with Multiple Security Updates – What’s New!

Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical...