Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Device Hack. Show all posts

Hackers Can Spy on Screens Using HDMI Radiation and AI Models

 

You may feel safe behind your screen, but it turns out that privacy might be more of an illusion than a fact. New research reveals that hackers have found an alarming way to peek at what’s happening on your display—without ever touching your computer. By tapping into the faint electromagnetic radiation that HDMI cables emit, they can now “listen in” on your screen and reconstruct what’s being shown with startling accuracy. 

Here’s how it works: when digital signals travel through HDMI cables from your computer to a monitor, they unintentionally give off tiny bursts of radiation. These signals, invisible to the naked eye, can be picked up using radio antennas or small, discreet devices planted nearby. Once captured, advanced AI tools get to work, decoding the radiation into readable screen content. 

The results? Up to 70% accuracy in reconstructing text—meaning everything from passwords and emails to private messages could be exposed. This new technique represents a serious leap in digital espionage. It doesn’t rely on malware or breaking into a network. Instead, it simply listens to the electronic “whispers” your hardware makes. It’s silent, stealthy, and completely undetectable to the average user. 

Worryingly, this method is already reportedly in use against high-profile targets like government agencies and critical infrastructure sites. These organizations often store and manage sensitive data that, if leaked, could cause major damage. While some have implemented shielding to block these emissions, not all are fully protected. And because this form of surveillance leaves virtually no trace, many attacks could be flying under the radar entirely. 

Hackers can go about this in two main ways: one, by sneaking a signal-collecting device into a location; or two, by using specialized antennas from nearby—like the building next door. Either way, they can eavesdrop on what’s displayed without ever getting physically close to the device. This new threat underscores the need for stronger physical and digital protections. 

As cyberattacks become more innovative, simply securing your data with passwords and firewalls isn’t enough. Shielding cables and securing workspaces might soon be as important as having good antivirus software. The digital age has brought us many conveniences—but with it comes a new breed of invisible spies.

Multiple Critical Bugs Identified in SonicWall SMA 100 Appliances

 

Rapid7 researcher has presented additional details regarding the SonicWall bug in its Secure Mobile Access 100 network security devices that permit unauthenticated remote code execution (RCE) on compromised devices. 

Last year in October, Rapid7 researcher Jake Baines uncovered five vulnerabilities in Sonic Wall’s Secure Mobile Access (SMA) 100 series of devices, which includes SMA 200, 210, 400, 410, and 500v.

The SMA 100 line was designed to offer end-to-end safe distant accessibility to corporate assets, be they hosted on-premise, in the cloud, or in hybrid data facilities. It also provides policy-enforced access control to apps immediately after creating user and device identity and trust.

The most severe of the flaws is CVE-2021-20038, with a rating of 9.8 on the Common Vulnerability Severity Scale (CVSS). It’s a stack buffer overflow bug allowing a threat actor to secure complete control of a device running SonicWall’s NAC solution. 

According to the researcher, the bug is spotted in the manner the appliance handles Apache httpd calls. When the cgi_build_command function is called, the stack-based buffer can be overloaded and allow attackers to load up commands. 

“The most prominent is the stored return address, the memory address at which execution should continue once the current function is finished executing,” Baines explained in the blog post. “The attacker can overwrite this value with some memory address to which the attacker also has to write access, into which they place arbitrary code to be run with the full privileges of the vulnerable program.”

The other bugs discovered include CVE-2021-20039, a command injection vulnerability with a rating of 7.2; CVE-2021-20040, a relative path traversal vulnerability with a rating of 6.5; CVE-2021-20041, an infinite loop flaw, and CVE-2021-20042, an unintended proxy or intermediary also known as a “confused deputy” vulnerability with a rating of 6.5.

In his analysis, Baines examined the SMA 500v firmware variations 9…11-31sv and 10.2.1.1-19sv discovering that CVE-2021-20038 and CVE-2021-20040 affect only equipment functioning version 10.2.x, though the remaining issues influence both firmware variations. 

Raaid7 reported the five vulnerabilities to SonicWall on Oct. 18. On December 7, SonicWall released a security advisory and updates fixing the pbugs Baines had discovered.