{"id":196105,"date":"2024-09-13T03:04:11","date_gmt":"2024-09-13T08:04:11","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2024\/09\/new-pixhell-acoustic-attack-leaks-secrets-from-lcd-screen-noise"},"modified":"2024-09-13T03:04:11","modified_gmt":"2024-09-13T08:04:11","slug":"new-pixhell-acoustic-attack-leaks-secrets-from-lcd-screen-noise","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2024\/09\/new-pixhell-acoustic-attack-leaks-secrets-from-lcd-screen-noise","title":{"rendered":"New PIXHELL acoustic attack leaks secrets from LCD screen noise"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/new-pixhell-acoustic-attack-leaks-secrets-from-lcd-screen-noise2.jpg\"><\/a><\/p>\n<p>A novel acoustic attack named \u2018PIXHELL\u2019 can leak secrets from air-gapped and audio-gapped systems, and without requiring speakers, through the LCD monitors they connect to.<\/p>\n<p>In a PIXHELL attack, malware modulates the pixel patterns on LCD screens to induce noise in the frequency range of 0\u201322 kHz, carrying encoded signals within those acoustic waves that can be captured by nearby devices such as smartphones.<\/p>\n<p>The researchers\u2019 tests showed that data exfiltration is possible at a maximum distance of 2 meters (6.5 ft), achieving a data rate of 20 bits per second (bps).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A novel acoustic attack named \u2018PIXHELL\u2019 can leak secrets from air-gapped and audio-gapped systems, and without requiring speakers, through the LCD monitors they connect to. In a PIXHELL attack, malware modulates the pixel patterns on LCD screens to induce noise in the frequency range of 0\u201322 kHz, carrying encoded signals within those acoustic waves that [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1512],"tags":[],"class_list":["post-196105","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-mobile-phones"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/196105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=196105"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/196105\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=196105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=196105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=196105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}