July 30th, 2024

Hackers can wirelessly watch your screen via HDMI radiation

Researchers in Uruguay developed "Deep-TEMPEST," a technique using AI to wirelessly intercept HDMI video signals via electromagnetic radiation, raising security concerns for sensitive data protection against potential espionage.

Read original articleLink Icon
Hackers can wirelessly watch your screen via HDMI radiation

Researchers from the University of the Republic in Montevideo, Uruguay, have developed a technique that allows hackers to wirelessly intercept and interpret video signals from HDMI cables using electromagnetic radiation. This method, referred to as "Deep-TEMPEST," combines wireless electromagnetic monitoring with AI algorithms to read text displayed on a victim's screen. The researchers found that even though HDMI is a wired standard typically encrypted with HDCP, enough electromagnetic radiation is emitted to be detected without direct access to the cable.

The AI model can process these electromagnetic fluctuations and, when paired with text recognition software, can achieve up to 70 percent accuracy in interpreting the data. This represents a significant improvement over previous methods, making it feasible for attackers to capture sensitive information, such as passwords, from a distance, potentially even from outside a building under optimal conditions.

While the concept of intercepting electromagnetic signals for surveillance is not new, the application of AI in this context raises serious security concerns. The researchers suggest that this technique is already being utilized by state-level spies and industrial espionage agents. Although the complexity of the method may limit its use to high-stakes targets, organizations with sensitive data, particularly government agencies and large companies, should consider implementing electromagnetic shielding measures to protect against such vulnerabilities.

Related

Confidentiality in the Face of Pervasive Surveillance

Confidentiality in the Face of Pervasive Surveillance

RFC 7624 addresses confidentiality threats post-2013 surveillance revelations. It defines attacker models, vulnerabilities, and encryption's role in protecting against eavesdropping, emphasizing Internet security enhancements against pervasive surveillance.

'Skeleton Key' attack unlocks the worst of AI, says Microsoft

'Skeleton Key' attack unlocks the worst of AI, says Microsoft

Microsoft warns of "Skeleton Key" attack exploiting AI models to generate harmful content. Mark Russinovich stresses the need for model-makers to address vulnerabilities. Advanced attacks like BEAST pose significant risks. Microsoft introduces AI security tools.

Firmware Update Hides a Device's Bluetooth Fingerprint

Firmware Update Hides a Device's Bluetooth Fingerprint

Researchers at UC San Diego created a firmware update to conceal Bluetooth fingerprints, hindering device tracking. The update, presented at a security conference, reduces tracking accuracy, requiring prolonged observation for identification. Industry collaboration is sought.

Reverse-Engineering an IP Camera (2019)

Reverse-Engineering an IP Camera (2019)

The author replaced an old IP camera with a new P2P camera, concerned about security. They reverse-engineered the camera, discovering its network behavior, connections to servers, and data transmission methods. The author aims to access the camera's Linux system for enhanced control.

OpenCV and the Wild Kingdom

OpenCV and the Wild Kingdom

The author used a thermal camera and OpenCV for motion detection, initially aiming at the sky but later focusing on security. Python's speed issues led to transitioning to C++. Identified culprits stealing cat food prompted adjustments for security.

Link Icon 3 comments
By @zactato - 3 months
This sounds similar to https://en.wikipedia.org/wiki/Van_Eck_phreaking which is a concept that's been around for a while, but would probably be way easier with a well tuned AI model