Guide: Legend has it that the employee pulled out the net at the last minute to barely keep the “underpants”. This “pulling the net” approach seems to cure all the diseases. However, as long as the network can ensure that the information on a computer rest assured?
Sony was hacked by North Korea in 2014, and almost all of its confidential information was swept away. Legend has it that the employee pulled out the net at the last minute to barely keep the “underpants”. This “pulling the net” approach seems to cure all the diseases. However, as long as the network can ensure that the information on a computer rest assured?
All along, to get a computer key, there are three ways:
1, directly to get this computer, and then enter the Trojan virus to steal. (The risk of this slightly LowB method is that if the computer owner is “caught in bed” and alerted in anger, the hacker will need to have some escape skills.
2, through the Internet intrusion target computer, remote installation of Trojan virus, stealing keys. (Most hackers use this approach while keeping themselves in the way and personally)
3. If the target computer is not connected to the internet, you need to send a virus into the target computer through media that have access to the Internet (e.g. a USB stick). (This method is highly technically difficult because of its forced ness, and only a few success stories, such as the U.S. attack on Iran’s nuclear power plants, are detected))
Starting today, these methods are weak.
Israel’s White Hat Hacker (Security Researcher) has developed a high-powered play that simply puts a large “stethoscope” next to you and captures your password information based on the electromagnetic waves emitted when your computer is working.
The counter-daily nature of this method of attack is:
1, the speed is strangely fast, only a few seconds, the key to hand.
2, does not involve password deciphering, but directly capture the password clear text. The so-called partition wall has ears, bag-taking.
3, do not need computer networking, also do not need to contact the “victim computer.” No offer has been seen, victory has been decided.
It costs only $3,000 to make this device. It accurately captures electromagnetic waves when the surrounding computer is working and amplifies the analysis.
So what exactly can this eavesdropper hear?
The computer being monitored
The researchers tried to send an encrypted message to the computer victim. During the process of the computer opening the message, the background was decrypted. And it is this short seconds of decryption process, the electromagnetic waves emitted carry the “secret seliacity of the universe.” The eavesdropper analyzed the electromagnetic waves for a few seconds and found that every time a narrow frequency signal appeared, it marked the decryption of a password. After putting these narrow frequency signals together for analysis, the dense message is so easily “flowed” out.
The researchers went through a 15-centimetre-thick wall and captured 66 decryptions. It took only 3.3 seconds to finally get the key.
The fluctuation of electromagnetic waves, marked at a narrow frequency signal
The experiment was tantamount to discovering the “gravitational waves” of the hacker world, opening up new brain holes for hackers. This marks the computer at work will talk to themselves, as long as you can understand what the computer is saying, then this computer in front of you there is no secret. Using the same principles, you can even analyze other information generated in computer work, such as bank card passwords and private chats.
“This method of attack is likely to quickly go out of the lab and become a popular method of attack, ” said Tromer, a researcher. Hackers will develop cheaper devices that will further reduce the cost of attacks. “However, if hackers want to make their own devices, one big hurdle needs to be overcome by filtering out background noise. Analyzing what was being caused by computer work in countless electromagnetic waves, like hearing a girl whisper on a raucous party. Reaching this posture requires a fairly strong physical basis, which is not something that a traditional dead house program can do.
If this kind of attack will become the hacker’s “standard” in the future, it is really very frightening. Traditional means of attack, need to be through the Internet, hackers can easily leave traces in your computer, these traces can be used as evidence of their sins, and electromagnetic waves are eavesdropped, but no means can be detected, so it is almost impossible to know that they are “listening.”
As Tromer says:
Our computers are protected by a lot of authorities in the online world, but they are almost naked in the physical world.
Hackers have already looked through your skin and bones while you’re still tangles about what kind of mosaic. In the face of this down-to-face attack, each of us is more vulnerable to privacy. Even to the point of “to be unknown, unless you do.”
After careful consideration, in order to prevent information from being stolen by hackers, the correct use of the computer is as follows: