Wednesday, September 11, 2024
Homecyber securityResearchers Details How Hackers Can Steal Passwords via HDMI Cables

Researchers Details How Hackers Can Steal Passwords via HDMI Cables

Published on

Security researchers have found a new way for hackers to steal sensitive information like passwords by eavesdropping on HDMI cables. This is a worrying development for computer users.

‘Researchers at Universidad de la República in Uruguay discovered that hackers can use artificial intelligence (AI) to decode signals from HDMI cables and see what’s displayed on a computer screen.

They found they could capture the electromagnetic signals from HDMI cables using readily available radio equipment.

- Advertisement - EHA

By using deep learning AI to analyze these signals, they could reconstruct text and images from the screen with about 70% accuracy.

proposed system
proposed system

Lead researcher Federico Larroca explained that this accuracy level is often enough for attackers to read passwords, sensitive data, or even encrypted messages on a screen.

How to Build a Security Framework With Limited Resources IT Security Team (PDF) - Free Guide

Their AI system significantly improved the success rate of such eavesdropping attacks, reducing errors by over 60 percentage points.

While it was previously known that older CRT monitors had similar vulnerabilities, modern HDMI connections were thought to be more secure due to their complex digital signals.

However, this new research shows that AI can bypass these security measures, potentially putting millions of computer users at risk.

Enumeration Setup
Enumeration Setup

The good news is that such an attack requires advanced technical skills and specialized equipment. Average home users are unlikely to be targeted.

However, government agencies and large corporations could be more vulnerable to sophisticated attackers.

Federico Larroca warned that advanced hackers or state-level actors might already use similar techniques. An attacker could capture HDMI signals outside a building using hidden equipment, such as in a nearby vehicle.

To protect against this threat, cybersecurity experts recommend being cautious when handling sensitive information, especially near windows or public places.

Using encrypted connections and avoiding showing passwords on external monitors connected via HDMI can also help reduce risks.

The researchers have shared their findings openly to help improve defense measures. This discovery reminds us of the importance of being aware of new digital privacy and security threats.

Are you from SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Free Access

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

CAMO, or Commercial Applications, Malicious Operations, highlights attackers' increasing reliance on legitimate IT tools...

Researchers Hacked Car EV Chargers To Execute Arbitrary Code

Researchers discovered flaws in the Autel MaxiCharger EV charger that make it potential to...

Siemens Industrial Edge Management Vulnerable to Authorization Bypass Attacks

Siemens ProductCERT has disclosed a critical vulnerability in its Industrial Edge Management systems.The...

New RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDR

RansomHub has recently employed a novel attack method utilizing TDSSKiller and LaZagne, where TDSSKiller,...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks

CAMO, or Commercial Applications, Malicious Operations, highlights attackers' increasing reliance on legitimate IT tools...

Researchers Hacked Car EV Chargers To Execute Arbitrary Code

Researchers discovered flaws in the Autel MaxiCharger EV charger that make it potential to...

Siemens Industrial Edge Management Vulnerable to Authorization Bypass Attacks

Siemens ProductCERT has disclosed a critical vulnerability in its Industrial Edge Management systems.The...