PIXHELL: New Acoustic Attack Leaks Data from Air-Gapped Systems via LCD Screens

by | Sep 11, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A novel acoustic attack called PIXHELL can exfiltrate sensitive data from air-gapped and audio-gapped systems by exploiting the LCD monitors connected to them.

Attack Methodology

The PIXHELL attack works by modulating pixel patterns on the screen to generate acoustic noise in the 0-22 kHz frequency range, which carries encoded signals. Nearby devices, such as smartphones or compromised laptops, can capture these signals and decode them.

PIXHELL attack settingPIXHELL attack setting
Source: Arxiv.org

Tests have shown that the attack can transmit data at a rate of 20 bits per second (bps) over a maximum distance of 2 meters (6.5 ft). While this data rate is slow, it is sufficient for real-time keylogging and small text file exfiltration, including passwords and encryption keys.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Covert Audio Channel Exploitation

PIXHELL was developed by Dr. Mordechai Guri from Ben-Gurion University of the Negev, known for his research into data exfiltration from air-gapped systems. The method capitalizes on unintended acoustic emissions from LCD screens, caused by coil whine, capacitor noise, or intrinsic vibrations.

Attackers can use malware to encode data into the acoustic signals using modulation schemes such as:

  • On-Off Keying (OOK): Data is encoded by turning sound on and off.
  • Frequency Shift Keying (FSK): Data is encoded by switching between frequencies.
  • Amplitude Shift Keying (ASK): Data is encoded by altering the sound’s amplitude (volume).

Modulating acoustic signalsModulating acoustic signals at various frequences
Source: Arxiv.org

These signals are transmitted through the LCD screen by changing pixel patterns, which generates the necessary sound. A nearby microphone-equipped device can capture these signals for later transmission to an attacker for decoding.

Spectrogram of acoustic signal received by a nearby microphoneSpectrogram of acoustic signal received by a nearby microphone
Source: Arxiv.org

Stealthy and Efficient

The frequencies used in PIXHELL attacks are typically in the 0-22 kHz range, which is mostly inaudible to humans. At the same time, the pixel patterns used in the attack are low-brightness or invisible to the user, making the attack extremely stealthy.

In a setting with multiple infected air-gapped systems, PIXHELL can exfiltrate data from all of them simultaneously.




Mitigation Strategies

Several defense mechanisms can be employed against PIXHELL and other acoustic-based side-channel attacks, such as:

  • Banning microphones in sensitive areas to prevent data capture.
  • Jamming or introducing background noise to disrupt acoustic signals.
  • Monitoring screen buffers with a camera to detect unusual pixel activity.

Complete technical details of the PIXHELL attack and suggested countermeasures are available in the research paper titled “PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via ‘Singing Pixels’.”

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This