• CerebralHawks@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    36
    arrow-down
    1
    ·
    18 hours ago

    Lightning cables, as in the cables that charged proprietary Apple charging ports, ran a stripped-down version of iOS. Ran. Software. On a tiny chip. Someone got DOOM running on a Lightning-to-HDMI cable. A MacBook was used to flash the code to the cable, and a monitor was used at the other end to display the output, but apparently the game itself was running on the cable alone.

    A mouse is much bigger.

    Chips can be a lot smaller than people think.

    • Lorem Ipsum dolor sit amet@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      ·
      edit-2
      9 hours ago

      This is some Tumblr level reading comprehension.

      Literally the first sentence: “Researchers at the University of California, Irvine, have shown that the sensors in high-resolution optical computer mice can detect tiny desk vibrations and translate them into speech.”

      The poll rate of mice has become good enough that miniscule movements can be detected and turned back into sound, there aren’t any secret chips inside of the mouse to make that possible.

  • Alphane Moon@lemmy.worldOPM
    link
    fedilink
    English
    arrow-up
    27
    arrow-down
    1
    ·
    21 hours ago

    At first I thought this was a curious proof of concept exploit that is fun to read about, but not really relevant.

    This kind of compromise doesn’t require elaborate malware installations. Any application, such as a game or creative software, that legitimately requests high-frequency mouse data could be exploited if compromised. Once captured, the data can be transmitted off-site for analysis, allowing sensitive conversations to be intercepted without any obvious sign to the victim.

    But lo and behold, turns out this method is actually not just purely theoretical. Sure, you would have deploy a malware application or exploit another app, but this is still very much within the realms of viability.

    • NaibofTabr@infosec.pub
      link
      fedilink
      English
      arrow-up
      20
      ·
      20 hours ago

      Sure, you would have deploy a malware application

      Like an application for customizing the RGB on your super cool gamer mouse?

  • dbtng@eviltoast.org
    link
    fedilink
    English
    arrow-up
    14
    ·
    19 hours ago

    Remember the blinking light on the CD tray on your old PC? Early ones would leak data that way, the light could be decoded. While I was searching for that, I found a more recent attack where the light is repurposed to actually just transmit data. And I found another proof of concept that uses the RAM cycles to transmit data through the air.

    Its a good thing I don’t have any secrets.

    • x00z@lemmy.world
      link
      fedilink
      English
      arrow-up
      18
      arrow-down
      1
      ·
      17 hours ago

      Its a good thing I don’t have any secrets.

      Keep in mind that this argument can get abused. Your privacy is always secret. Just because you have nothing to hide doesn’t mean you shouldn’t be keeping it hidden.

  • CallMeAnAI@lemmy.world
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    4
    ·
    19 hours ago

    I always love these absolutely worthless hacks. And I mean that. My favorite was the one that broke encryption by using power draw on the CPU.

    • krooklochurm@lemmy.ca
      link
      fedilink
      English
      arrow-up
      16
      ·
      18 hours ago

      This really isn’t worthless.

      The chances someone may use it against you may be low but a committed attacker against a secure target will rely on stuff like this.

      It’s more in the realm of espionage than stealing your credit card number but this shit happens.

      • CallMeAnAI@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        18 hours ago

        How many times you think a state government uses this vs the thousands of cameras, warrants, a well placed USB stick on the desk, and monitoring the war thunder forums?

        I get what you’re saying, but in the grand scene of things, even at the state level, these are not how state agencies are spying on you in practical terms.

        The effort to just get this executable running undetected in the background for such a low value attack just doesn’t make sense to spend resources on.

        • idiomaddict@lemmy.world
          link
          fedilink
          English
          arrow-up
          7
          ·
          18 hours ago

          I think they meant international espionage, not spying on the population. That’s at least what I would expect for this.

          • CallMeAnAI@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            edit-2
            18 hours ago

            And everything I said applies. Especially war thunder forums.

            There are higher success rates with more common and easy to achieve tactics.

            This might be used on 1 or 2 people. Might.

            • krooklochurm@lemmy.ca
              link
              fedilink
              English
              arrow-up
              4
              ·
              16 hours ago

              This kind of stuff is SIGNIFICANTLY more alluring when you’re dealing with an air gapped pc.

              Interdict the mouse and modify so that it drops the usb, pair with an sdr and a specially modified usb plug to exfiltrate any data picked up, the user is none the wiser, you’ve grabbed whatever info you’re after, and you never even need to physically access the air gapped pc.

              It’s elaborate but if you’re targeting an air gapped pc or network then elaborate is necessarily going to be the name of the game.

                • krooklochurm@lemmy.ca
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  10 hours ago

                  If you’re looking for something amiss you’d notice a microphone. Unless you really, really, really knew your shit something like this could be essentially invisible even if you disassembled it.

        • x00z@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          17 hours ago

          I’m not sure you’re right.

          As soon as this kind of stuff gets a simple binary that an attacker can drop on the system, they could definitely add it to their arsenal.

          There’s many different state actors working on this kind of stuff. I’m sure there’s a separation between teams that make tools such as these and the ones using them.

        • Not a newt@piefed.ca
          link
          fedilink
          English
          arrow-up
          2
          ·
          17 hours ago

          How many times you think a state government uses this vs the thousands of cameras, warrants, a well placed USB stick on the desk, and monitoring the war thunder forums?

          Very often. Software supply chain attacks are the most common method of infiltration these days, and even in environments with compliance requirements people are very laissez-faire about what they install.

        • rumschlumpel@feddit.org
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          18 hours ago

          This is potentially much cheaper than cameras or going somewhere in person, especially if you can do the a lot of the data processing on site and only upload transcripts. If the official driver manufacturer is in on it or even the initiator, it doesn’t even take much criminal energy. And for international espionage? Pure gold.

          • CallMeAnAI@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            17 hours ago

            I know, I know, another program mass sending telemetry that somehow every security researcher has missed.

        • krooklochurm@lemmy.ca
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          18 hours ago

          I’d agree with the broad thrust of your comment that this isn’t exactly screaming “panic now, the end is nigh”.

          Being aware of vulnerabilities like this is important nonetheless.

          The nature of side channel attacks like this are that they’re incredibly difficult to spot and mitigate. This one does seem rather elaborate in that it requires software running on a pc but the attack you mentioned with the processor is decidedly stealthier. Just like timing attacks with fans, tempest style attacks - this stuff happens, and from a consumer pov if someone can interdict a package you order from Amazon and alter it then you’d never even know anything was even happening.

          Is this happening a lot? Probably exceedingly rarely. Is it a risk most people have to worry about? No. Is it a risk nonetheless? Yes.

          All I’m saying is that it’s important to be aware of the risks if you care about security.

          • CallMeAnAI@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            edit-2
            17 hours ago

            I said I love them didn’t I?

            But I think you forget most people have limited attention spans and don’t care about this. They don’t need to know. It’s the equivalent of Windows UAC. Folks get a headline each week, Google is selling your info, malware this, Alexa it’s listening! And they have just tuned it all out. It’s counter productive unless you’re interested in the topic.

            The privacy and security security could use a good lesson in messaging. They’ve largely made themselves irrelevant to the general public.

            • krooklochurm@lemmy.ca
              link
              fedilink
              English
              arrow-up
              2
              ·
              17 hours ago

              No arguments.

              I would add that people’s unwillingness to understand or care about security risks does nothing to alter the importance of being aware of them, but I’m well aware that expecting anyone to give a shit about cybersecurity is pissing into the wind.