How your washing machine can steal computer files

Discussion in 'Computer Questions, Issues & Security' started by kanesimicart Tran, Aug 11, 2015.

  1. kanesimicart Tran

    kanesimicart Tran
    uix_expand uix_collapse
    New Member

    Joined:
    Jul 13, 2015
    Messages:
    12
    Likes Received:
    1
    [​IMG]
    This is Red Balloon Security chief scientist Ang Cui. His hacked printer now emits radio waves to his antennae.

    Imagine hackers stealing top secret files from a military base. Except they don't need the Internet to pull data out of the facility's computers. Instead, they can just infect an office printer and -- with software alone -- turn it into a radio.

    This sounds like sci-fi, but it's now possible. Security researchers at a Manhattan startup have discovered how to make any modern device -- printer, washing machine, air conditioner -- broadcast invisible, inaudible signals for miles.

    Keep out the hackers! Wait, they got in? Limit access! Wait, they grabbed the files? Don't let them escape!

    That's where Ang Cui and his team of bright researchers come in. They found a way to sneak data out of a computer network without setting off any alarms. It's groundbreaking research, because it also hints at the ability to steal data from computers that aren't even connected to the Internet, like those at nuclear facilities.

    Last week, the team at Red Balloon Security demonstrated how it works to several news reporters.

    They infected a Pantum laser printer and toyed with its circuits, making it do something it was never meant to. By quickly switching a chip's energy output back and forth, the printer emits electromagnetic radiation.

    Do it real slow? You can actually hear a funky tune. Crank it way up? You get radio waves. Highs and lows become 1s and 0s -- computer code.

    The Red Balloon team calls it a "funtenna."

    It's an incredibly slow stream of information. Think a single letter per second. But thick cables -- like those attached to servers in massive computer rooms -- serve as a sort of amplifier. That means, perversely, this theft is most effective at pulling data out of computers that house lots of it.

    "You have network detection, firewalls... but this transmits data in a way that none of those things are monitoring," Cui said. "This fundamentally challenges how certain we can be of our network security."

    In fact, one of the only ways to detect this highly advanced tactic is by walking around with an AM radio. If you get near a device and the radio static is interrupted by loud beeping, it's secretly transmitting radio signals.

    Cui will present his findings at the Black Hat hacker conference in Las Vegas on Wednesday.
    [​IMG]
    This is what a hacker sees when stealing information using a "funtenna." The dashes at the bottom is the incoming data, 1s and 0s.

    CNNMoney
     
  2. Adler Stewart

    Adler Stewart
    uix_expand uix_collapse
    New Member

    Joined:
    Jul 11, 2015
    Messages:
    9
    Likes Received:
    0
    Nice Information! Unbelivable.
     
  3. Frennemeister

    Frennemeister
    uix_expand uix_collapse
    New Member

    Joined:
    Aug 16, 2015
    Messages:
    16
    Likes Received:
    0
    As a computer geek, this is damn cool but still very scary. Imagine that your washing machine is stealing your data and sending it to a hacker. That's pretty damn creepy.
     
  4. kaian

    kaian
    uix_expand uix_collapse
    Member

    Joined:
    Jul 4, 2015
    Messages:
    119
    Likes Received:
    11
    I can not understand how they will be able to do that but I do believe that this is really possible. I would not be surprised in the future these tech people will be able to receive my brainwaves , map it and process it into a useful data. Good job
     
  5. m0n2k

    m0n2k
    uix_expand uix_collapse
    Member

    Joined:
    Jun 23, 2015
    Messages:
    74
    Likes Received:
    4
    That's really good someone exposed this technology. I knew there might be some way these hackers would try to break into computers. I just hope they would come out with some new way to stop these criminals. I'm glad I read this. Now I will be checking every device in my house.
     
  6. Andy Rubin

    Andy Rubin
    uix_expand uix_collapse
    New Member

    Joined:
    Aug 1, 2015
    Messages:
    14
    Likes Received:
    0
    Well that's AWKWARD
     

Share This Page