It turns out this is how hackers attack your computer through the main screen
We all know hackers can attack computers at any time but hackers take advantage of computer screens to infiltrate the system screen, not everyone can expect. Ang Cui, a scientist and founder of Red Balloon Security, which specializes in securing embedded devices, shared a video showing how he entered the user's computer through the main screen, creating a hole. on computers to steal personal information. In this way, the hacker can even change the amount of money in the user's bank account.
- The most basic insights to becoming a Hacker - Part 1
- Basic Hack Techniques - Part I
This is how hackers work:
Ang Cui said, most users do not believe that they can be fooled by their own computer screen. But in fact hackers can create a fake web and change the content on the screen in a flash that makes users enter personal information. This causes hackers to know everything that computer users are observing.
Ang Cui did an experiment with fake Paypal website on the screen on a Dell 24 inch screen computer (Dell U2410). In fact there is a rear screen that is responsible for displaying pixels and input information, which is controlled by the "Monitor" display on the surface. When attacking, hackers can transfer users to a website that looks like a money transfer site or bank homepage, then hide the SSL key on this browser. They can change the information currently displayed as a bank account using the main screen. For example, instead of having $ 100, users can see on the screen up to $ 1 million. Hacker only interacts via this computer to the other screen so users are easily fooled.
According to Ang Cui's calculations, there are at least one billion computer screens in the world that are vulnerable to this type of attack, called "A Monitor Darkly".
After being informed of this vulnerability, Dell Computer advised users to update the screen to U2415 version.
See more:
- The handler for hackers attacking the corporate network is the company's employees
- Former NSA hacker turned Kaspersky antivirus software into a spy tool
- Here's how I hack 40 websites in 7 minutes
You should read it
- Detecting APT attack campaign on important national infrastructure on Tet holiday
- Hide malicious code in Windows logs file to attack computers, new ways of attack by hackers
- Hackers can use Ransomware to attack and control robots
- Filipino hackers attack the Vietnamese web, retaliating that many users' Facebook accounts are 'hacked' by Vietnamese people
- This is how hackers attack your Bitcoin wallet online
- Hackers publish Windows attack code
- Test knowledge about hacking
- What is SS7 attack? What can hackers use it for?
- How do hackers attack your Facebok account and how to prevent this process?
- Hackers attack gas stations, stealing more than 2300 liters of gasoline in the US
- Top 10 brilliant hackers
- Hackers attack the casino through a hole in the smart thermometer of the aquarium
Maybe you are interested
Leaked images of Lenovo's first roll-up screen laptop
How to use split screen on Mac with Split View
8 Android Apps to Write Notes Directly on the Home Screen
How to share screen video with ChatGPT Voice
How to Take a Screenshot on Android When the App Doesn't Allow It
How to record computer screen video with sound