It turns out this is how hackers attack your computer through the main screen
We all know hackers can attack computers at any time but hackers take advantage of computer screens to infiltrate the system screen, not everyone can expect. Ang Cui, a scientist and founder of Red Balloon Security, which specializes in securing embedded devices, shared a video showing how he entered the user's computer through the main screen, creating a hole. on computers to steal personal information. In this way, the hacker can even change the amount of money in the user's bank account.
- The most basic insights to becoming a Hacker - Part 1
- Basic Hack Techniques - Part I
This is how hackers work:
Ang Cui said, most users do not believe that they can be fooled by their own computer screen. But in fact hackers can create a fake web and change the content on the screen in a flash that makes users enter personal information. This causes hackers to know everything that computer users are observing.
Ang Cui did an experiment with fake Paypal website on the screen on a Dell 24 inch screen computer (Dell U2410). In fact there is a rear screen that is responsible for displaying pixels and input information, which is controlled by the "Monitor" display on the surface. When attacking, hackers can transfer users to a website that looks like a money transfer site or bank homepage, then hide the SSL key on this browser. They can change the information currently displayed as a bank account using the main screen. For example, instead of having $ 100, users can see on the screen up to $ 1 million. Hacker only interacts via this computer to the other screen so users are easily fooled.
According to Ang Cui's calculations, there are at least one billion computer screens in the world that are vulnerable to this type of attack, called "A Monitor Darkly".
After being informed of this vulnerability, Dell Computer advised users to update the screen to U2415 version.
See more:
- The handler for hackers attacking the corporate network is the company's employees
- Former NSA hacker turned Kaspersky antivirus software into a spy tool
- Here's how I hack 40 websites in 7 minutes
You should read it
- Hackers can use Ransomware to attack and control robots
- Filipino hackers attack the Vietnamese web, retaliating that many users' Facebook accounts are 'hacked' by Vietnamese people
- This is how hackers attack your Bitcoin wallet online
- Hackers publish Windows attack code
- Test knowledge about hacking
- What is SS7 attack? What can hackers use it for?
- How do hackers attack your Facebok account and how to prevent this process?
- Hackers attack gas stations, stealing more than 2300 liters of gasoline in the US
May be interested
- Windows 10 vulnerability from Cortana helps hackers open unauthorized malicious websites and how to fix themby default, cortana will always listen to users' requests, even if the lock screen on windows 10, this is the hole that gives hackers the opportunity to manipulate the device and install malicious code. in computer.
- Hackers can use Ransomware to attack and control robotsioactive, an american security consulting firm, recently launched an attack to prove that hackers can not only use ransomware to attack computers to make ransom, but also attack complex robot systems. are being used in many areas.
- Warning: 5 million Samsung, OPPO, Vivo smartphones ... are infected with malware and this is how to check and removea large-scale malware distribution campaign has just been discovered and it is affecting nearly 5 million smartphones of major brands worldwide including honor, huawei, xiaomi, oppo, vivo, samsung and gionee.
- Plugins on well-known editing tools can give hackers prioritythese tools are often extended with third-party plugins, but they often bring unpredictable dangers.
- Using HotSpot Shield for security or Facebook access? Your IP is at risk of being exposedand not only the hotspot shield alone, but also the purevpn and zenmate.
- The CredSSP vulnerability in the RDP protocol affects all versions of Windowsa serious vulnerability just found on the credssp protocol affects all versions of windows, allowing attackers to exploit rdp and winrm to steal data or run malicious code.