2 min read

Your LCD Screen Noise Can Hand your Data to a Thief with Newly Discovered 'PIXHELL' Attack

Vlad CONSTANTINESCU

September 11, 2024

Promo Protect all your devices, without slowing them down.
Free 30-day trial
Your LCD Screen Noise Can Hand your Data to a Thief with Newly Discovered 'PIXHELL' Attack

Researchers unveiled a groundbreaking acoustic attack that could pose a major threat to the security of air-gapped and audio-gapped systems.

Dr. Mordechai Guri of Ben-Gurion University of the Negev, who orchestrated the discovery, dubbed the attack PIXHELL. The technique involves manipulating pixel patterns on LCD monitors to produce acoustic emissions that are impossible to detect by the naked ear and could leak encoded data.

Air-gapped and Audio-gapped Systems Explained

Air-gapped systems are computers or networks that are isolated from the internet and any other unsecured networks to prevent unauthorized access and data breaches.

Audio-gapping takes things a step further, removing loudspeakers and other forms of audio hardware that could potentially leak data via audio transmission. This physical isolation provides a high level of security.

Short-range, Slow Attack That Could Exfiltrate Data From Gapped Systems

Using this novel technique, a threat actor could exfiltrate sensitive information, such as encryption keys and keystrokes. However, the attacker would need to be within two meters of the device, and there’s another caveat: the attack can transfer data at a slow rate of 20 bits per second.

Subtlety and stealth are two characteristics that set PIXHELL apart from other attacks. The technique relies on modulation techniques—On-Off Keying, Frequency Shift Keying, and Amplitude Shift Keying—to turn benign screen pixels into covert data transmitters.

PIXHELL Could Exfiltrate Data From Multiple Devices Simultaneously

The resulting acoustic signals are virtually impossible to pick up by the human ear but can be captured by smartphones, laptops or other devices nearby.

Furthermore, PIXHELL could simultaneously extract data from multiple systems, adding a layer of complexity to its already intricate nature.

Mitigation And Implications

To counter the attack, researchers suggest robust defensive strategies including the exclusion of microphone-equipped devices from secure areas, deploying acoustic jamming technologies to corrupt signal clarity and continuous monitoring for unusual pixel patterns that could indicate a breach.

The detailed insights into PIXHELL and its implications are detailed in Dr. Guri’s technical paper, "PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via ‘Singing Pixels’", providing a comprehensive guide to understanding and mitigating this new cyber threat.

While PIXHELL could spell disaster for the security of data on air- and audio-gapped devices, such sophisticated attacks are less likely to be used in typical cyberattack scenarios. Most threat actors continue to rely on more traditional and less complex attack vectors that exploit common security weaknesses, such as malware infections or phishing.

Defending Against Advanced and Common Cyber Threats

This gap between possible and probable makes it crucial for individuals and organizations alike to prepare for high-tech threats like PIXHELL but also strengthen their defenses against more likely risks.

Implementing robust security solutions like Bitdefender Ultimate Security can shield against viruses, Trojans, worms, spyware, ransomware, zero-day exploits and other digital intrusions. It packs advanced features such as complete real-time data protection, network threat prevention, behavioral detection, and a multi-layer ransomware protection module to shield you from both conventional and advanced threats.

tags


Author


Vlad CONSTANTINESCU

Vlad's love for technology and writing created rich soil for his interest in cybersecurity to sprout into a full-on passion. Before becoming a Security Analyst, he covered tech and security topics.

View all posts

You might also like

Bookmarks


loader