Hackers can steal your data even if you are offline

Hackers can steal your data even if you are offline

Once a computer is infected with a virus or Trojan, most people will first think of "disconnecting the network cable first" to prevent confidential data from being stolen through the Internet. However, according to research by security experts, even if the network cable is disconnected, hackers can still use electromagnetic waves and other technologies to steal data "throughout the air."

Security researchers at Israel's Ben-Gurion University have studied and implemented a method of stealing computer data using FM radio waves. They successfully used the computer monitor as an exit channel for the stolen data, and a mobile phone with FM reception function acted as the receiver.

In the researchers' experiment, they pre-implanted a hacker program called AirHopper on a computer that was not connected to any network cable. This program can use the computer monitor to send out FM waves, and the stolen data will be transmitted in the form of FM waves.

On a smartphone with FM wave reception and processing capabilities, the researchers reportedly recreated the history of computer users' keyboard strokes in real time.

It is reported that this is not the first time that FM waves have been used as a means of information transmission to steal data. In the past, the theft method used speakers connected to the computer as a device to output signals, but this time the researchers used the computer display as a signal output method, which is more covert.

However, it should be pointed out that the above-mentioned data theft relying on the FM frequency modulation wave of the display screen has a distance limitation. The distance between the receiver and the computer cannot exceed seven meters. In addition, the data theft rate is very slow, and only a few bytes of information can be transmitted per second, but this is enough to transmit passwords or key text information.

The Ben-Gurion University researchers have reportedly produced a video reproducing their use of FM waves to steal data, and they have also written a detailed paper describing the technical principles involved, which will be presented at the Malcon 2014 security industry conference this week.

According to a report by the American technology news website "Enjoyed Technology" at the end of last year, experts from the Fraunhofer Institute for Communications Research in Germany once developed a malicious attack program for proof-of-concept. Multiple malicious programs installed on different computers can use speakers and microphones to "communicate data" with each other. These computers do not need to exist in the same local area network and can communicate with each other only need to be no more than 20 meters apart.

As a winner of Toutiao's Qingyun Plan and Baijiahao's Bai+ Plan, the 2019 Baidu Digital Author of the Year, the Baijiahao's Most Popular Author in the Technology Field, the 2019 Sogou Technology and Culture Author, and the 2021 Baijiahao Quarterly Influential Creator, he has won many awards, including the 2013 Sohu Best Industry Media Person, the 2015 China New Media Entrepreneurship Competition Beijing Third Place, the 2015 Guangmang Experience Award, the 2015 China New Media Entrepreneurship Competition Finals Third Place, and the 2018 Baidu Dynamic Annual Powerful Celebrity.

<<:  The $40 billion chip empire died in the womb. Why did Nvidia's acquisition of ARM lead to a global blockade?

>>:  Xiaomi's loan broke Alibaba's record

Recommend

A guide to the counter-trend growth of self-media in 2018!

2018 has passed so quickly that the New Year’s Da...

IFBB Sports Nutrition Lin Daowei Carbohydrate Cycling Diet

IFBB Sports Nutrition Lin Daowei Carbohydrate Cyc...

Talk about how to make money using Zhihu traffic

How to make money using Zhihu? This is a topic th...

What kind of apps get recommended on the App Store?

This is a very broad question, and the editor'...

Will money be deducted if the WeChat payment code is photographed?

Now WeChat payment has become an indispensable pa...

Practical overseas advertising promotion: Where are your Google ads?

Where are your Google ads? Exploring “Ads that di...

ASO trends in App promotion in 2019!

The promotion war between Baidu and Toutiao for t...