Connect with us

Tech

That washing machine can steal computer files

Published

on

Imagine hackers stealing top secret files from a military base. Except they don’t need the Internet to pull data out of the facility’s computers. Instead, they can just infect an office printer and — with software alone — turn it into a radio.
This sounds like sci-fi, but it’s now possible. Security researchers at a Manhattan startup have discovered how to make any modern device — printer, washing machine, air conditioner — broadcast invisible, inaudible signals for miles.

That’s a game changer — and a huge step forward for hackers.
The rapidly expanding $77 billion cybersecurity industry is all about guarding computer networks. Companies and governments buy products to stay protected. But they keep running out of effective defensive options.
Keep out the hackers! Wait, they got in? Limit access! Wait, they grabbed the files? Don’t let them escape!
That’s where Ang Cui and his team of bright researchers come in. They found a way to sneak data out of a computer network without setting off any alarms. It’s groundbreaking research, because it also hints at the ability to steal data from computers that aren’t even connected to the Internet, like those at nuclear facilities.
Last week, the team at Red Balloon Security demonstrated how it works to several news reporters.

Read also: Worries as hackers breach US spies’ records

They infected a Pantum laser printer and toyed with its circuits, making it do something it was never meant to. By quickly switching a chip’s energy output back and forth, the printer emits electromagnetic radiation.
Do it real slow? You can actually hear a funky tune. Crank it way up? You get radio waves. Highs and lows become 1s and 0s — computer code.
The Red Balloon team calls it a “funtenna.”
It’s an incredibly slow stream of information. Think a single letter per second. But thick cables — like those attached to servers in massive computer rooms — serve as a sort of amplifier. That means, perversely, this theft is most effective at pulling data out of computers that house lots of it.
“You have network detection, firewalls… but this transmits data in a way that none of those things are monitoring,” Cui said. “This fundamentally challenges how certain we can be of our network security.”
In fact, one of the only ways to detect this highly advanced tactic is by walking around with an AM radio. If you get near a device and the radio static is interrupted by loud beeping, it’s secretly transmitting radio signals.

– credit  – CNN

RipplesNigeria… without borders, without fears

Join the conversation

Opinions

Support Ripples Nigeria, hold up solutions journalism

Balanced, fearless journalism driven by data comes at huge financial costs.

As a media platform, we hold leadership accountable and will not trade the right to press freedom and free speech for a piece of cake.

If you like what we do, and are ready to uphold solutions journalism, kindly donate to the Ripples Nigeria cause.

Your support would help to ensure that citizens and institutions continue to have free access to credible and reliable information for societal development.

Donate Now

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

3 × one =