Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » A new PIXHELL attack uses screen noise to extract data from air-gapped computers
Global Security

A new PIXHELL attack uses screen noise to extract data from air-gapped computers

AdminBy AdminSeptember 10, 2024No Comments5 Mins Read
PIXHELL Attack
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


PIXHELL attack

Duplicated new side channel attack PIXHEL can be abused to target air-gapped computers, breaking the “sound gap” and stealing sensitive information by taking advantage of the noise created by the pixels on the screen.

“Malware in airgap and audiogap computers creates engineered pixel patterns that produce noise in the 0-22kHz frequency range,” Dr. Mordechai Gurihead of the Offensive Cyber ​​Research Laboratory at the Department of Software Development and Information Systems at Ben-Gurion University of the Negev in Israel, said in a newly published newspaper.

“The malicious code uses the sound created by the coils and capacitors to control the frequencies coming from the screen. Acoustic signals can encode and transmit sensitive information.’

The attack is unique in that it does not require special audio equipment, a loudspeaker, or an internal speaker on the compromised computer, instead using an LCD screen to generate audio signals.

An air gap is a critical security measure designed to protect critical environments from potential security threats by physically and logically isolating them from external networks (such as the Internet). This is usually achieved by disconnecting network cables, disabling wireless interfaces, and disconnecting USB connections.

Cyber ​​security

However, such protection can be bypassed using fake insiders or hacking the hardware or software supply chain. Another scenario could involve an unsuspecting employee plugging in an infected USB drive to deploy malware capable of launching a hidden data theft channel.

“Phishing, malicious insiders, or other social engineering techniques may be used to trick people who have access to an air-gapped system into taking actions that compromise security, such as clicking on malicious links or downloading infected files,” — Dr. Guri said.

“Attackers can also use attacks in the software supply chain, targeting software application dependencies or third-party libraries. By compromising these dependencies, they can introduce vulnerabilities or malicious code that may go undetected during development and testing.”

As recently demonstrated Rambo’s attackPIXHELL uses malware deployed on a compromised host to create an audio channel to leak information from audio-gapped systems.

This is made possible by the fact that LCD screens contain inductors and capacitors as part of their internal components and power supply, causing them to vibrate at an audible frequency that creates a shrill noise when electricity passes through the coils, a phenomenon called the coil whines.

In particular, changes in power consumption can cause mechanical vibrations or piezoelectric effects in capacitors, creating audible noise. An important aspect that affects the structure of consumption is the number of illuminated pixels and their distribution on the screen, since white pixels require more energy to display than dark ones.

“Furthermore, when alternating current (AC) passes through the screen capacitors, they vibrate at certain frequencies,” said Dr. Guri. “Acoustic radiation is created by the internal electrical part of the LCD screen. Its characteristics are affected by the actual bitmap, pattern and intensity of the pixels projected onto the screen.”

“By carefully controlling the pixel patterns displayed on our screen, our technique generates specific sound waves at specific frequencies from LCD screens.”

Therefore, an attacker can use this technique to steal data in the form of audio signals, which are then modulated and transmitted to a nearby Windows or Android device, which can then demodulate the packets and extract the information.

Having said that, it should be noted that the power and quality of the emitted acoustic signal depends on the specific structure of the screen, its internal power source, as well as the location of the coil and capacitor, among other factors.

Another important thing to emphasize is that the PIXHELL attack is by default visible to users looking at an LCD screen, given that it involves reflection bitmap pattern consisting of alternating black and white rows.

Cyber ​​security

“To stay hidden, attackers can use a transmission strategy while the user is away,” said Dr. Guri. “For example, a so-called ‘night attack’ on covert channels is carried out during non-working hours, which reduces the risk of being discovered and exposed.”

The attack, however, could be made stealthy at runtime by reducing the pixel colors to very low values ​​before transmission – ie, using the RGB levels (1,1,1), (3,3,3) , (7, 7,7) and (15,15,15) — thus creating the user the impression that the screen is black.

But this has the side effect of “significantly” reducing the level of sound production. Nor is this approach foolproof, as the user can still see anomalous patterns if they look “carefully” at the screen.

This is not the first time audio gap limitations were overcome in an experimental setup. Previous studies by Dr. Guri have used sounds produced by computer fans (Fansmitter), hard drives (Diskfiltration), CD/DVD drives (CD-LEAK), power supplies (POWER-SUPPLaY) and inkjet printers (Inkfiltration ). .

As countermeasures, it is recommended to use an acoustic barrier to neutralize the transmission, monitor the audio spectrum for unusual or unusual signals, limit physical access to authorized personnel, prohibit the use of smartphones, and use an external camera to detect unusual modulated images on the screen.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025

AI AI agents work on secret accounts – learn how to fasten them in this webinar

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.