Hackers Use Washing Machines To Steal Your Computer Files

0
Hackers Use Washing Machines To Steal Your Computer Files
WikiImages / Pixabay

A group of security researchers have revealed frightening new ways in which criminals can steal data from computer systems.

Instead of breaking into the computer network via the Internet, hackers can simply infect an office printer and turn it into a radio using a piece of software. It sounds strange, but a Manhattan startup has demonstrated that it is certainly possible, writes Jose Pagliery for CNN Money.

21st Century Investing with The Investment Integration Project’s William Burckart

Yarra Square Investing Greenhaven Road CapitalValueWalk's Raul Panganiban interviews William Burckart, The Investment Integration Project’s President and COO, and discuss his recent book that he co-authored, “21st Century Investing: Redirecting Financial Strategies to Drive System Change”. Q1 2021 hedge fund letters, conferences and more The following is a computer generated transcript and may contain some errors.


New cybersecurity weakness exposed

The team is able to make devices such as printers, washing machines and air-conditioning units broadcast invisible, inaudible signals which can be picked up for miles around. Their method could lead to a new era for hackers.

Currently the cyber security industry is focused on preventing unauthorized access to computer networks. Despite advances in protective measures, hackers keep finding new loopholes to exploit.

Ang Cui and his team at Red Balloon Security may have opened up an entirely new cyber battlefield. Their method allows data to be stolen without setting off any warnings from cybersecurity systems, and can even pull data from computers that are not connected to the Internet, such as those at nuclear facilities.

The team demonstrated their method by infecting a Pantum laser printer and modifying its circuits so that it emitted electromagnetic radiation. By quickly switching the energy output back and forth, the printer can be made to emit radio waves that can transmit information.

Computer security breach can be detected using AM radio

The stream of information emitted by the printer is slow, at around one letter per second, but this rate is increased by the presence of thick server cables. The cables amplify the information stream, meaning it can steal more information from huge computer rooms which contain lots of data.

“You have network detection, firewalls… but this transmits data in a way that none of those things are monitoring,” Cui said. “This fundamentally challenges how certain we can be of our network security.”

One of the few methods of detecting a hack of this kind is decidedly retro. By walking around your devices with an AM radio in hand, you can monitor whether the radio static is interspersed by a loud beeping noise. If so, the device is secretly transmitting radio signals.

Cui and his team at Red Balloon are set to present their research at the Black Hat hacking conference this week. The implications for cyber security could be huge.

Previous article Massimo Fuggetta: Moat vs. Margin Of Safety
Next article Seth Klarman: It Hurts So Good
While studying economics, Brendan found himself comfortably falling down the rabbit hole of restaurant work, ultimately opening a consulting business and working as a private wine buyer. On a whim, he moved to China, and in his first week following a triumphant pub quiz victory, he found himself bleeding on the floor based on his arrogance. The same man who put him there offered him a job lecturing for the University of Wales in various sister universities throughout the Middle Kingdom. While primarily lecturing in descriptive and comparative statistics, Brendan simultaneously earned an Msc in Banking and International Finance from the University of Wales-Bangor. He's presently doing something he hates, respecting French people. Well, two, his wife and her mother in the lovely town of Antigua, Guatemala. <i>To contact Brendan or give him an exclusive, please contact him at [email protected]</i>

No posts to display