Saturday, April 5, 2025
Homecyber securityResearchers Details How Hackers Can Steal Passwords via HDMI Cables

Researchers Details How Hackers Can Steal Passwords via HDMI Cables

Published on

SIEM as a Service

Follow Us on Google News

Security researchers have found a new way for hackers to steal sensitive information like passwords by eavesdropping on HDMI cables. This is a worrying development for computer users.

‘Researchers at Universidad de la República in Uruguay discovered that hackers can use artificial intelligence (AI) to decode signals from HDMI cables and see what’s displayed on a computer screen.

They found they could capture the electromagnetic signals from HDMI cables using readily available radio equipment.

By using deep learning AI to analyze these signals, they could reconstruct text and images from the screen with about 70% accuracy.

proposed system
proposed system

Lead researcher Federico Larroca explained that this accuracy level is often enough for attackers to read passwords, sensitive data, or even encrypted messages on a screen.

How to Build a Security Framework With Limited Resources IT Security Team (PDF) - Free Guide

Their AI system significantly improved the success rate of such eavesdropping attacks, reducing errors by over 60 percentage points.

While it was previously known that older CRT monitors had similar vulnerabilities, modern HDMI connections were thought to be more secure due to their complex digital signals.

However, this new research shows that AI can bypass these security measures, potentially putting millions of computer users at risk.

Enumeration Setup
Enumeration Setup

The good news is that such an attack requires advanced technical skills and specialized equipment. Average home users are unlikely to be targeted.

However, government agencies and large corporations could be more vulnerable to sophisticated attackers.

Federico Larroca warned that advanced hackers or state-level actors might already use similar techniques. An attacker could capture HDMI signals outside a building using hidden equipment, such as in a nearby vehicle.

To protect against this threat, cybersecurity experts recommend being cautious when handling sensitive information, especially near windows or public places.

Using encrypted connections and avoiding showing passwords on external monitors connected via HDMI can also help reduce risks.

The researchers have shared their findings openly to help improve defense measures. This discovery reminds us of the importance of being aware of new digital privacy and security threats.

Are you from SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Free Access

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...