Skip to main content

90% Of Smart TVs Are Easily Hackable Via Malicious TV Signals


SmartTV-Attack1-scheel
Do you know that your televisions can be easily hacked and used as a spying weapon by an attacker or government. A security researcher recently demonstrated a method that used rogue TV signals, DVB-T to be precise, to gain root access to smart TVs. Moreover, this attack is almost impossible to detect due to the uni-directional nature of TV signals.

When we wrote about the massive WikiLeaks’ release of  CIA’s hacking tools, we told you about a tool called Weeping Angel, which had the potential to control Samsung smart TVs and turn them into spying devices. But, to infect such TVs, CIA needed physical access to install the spyware.
Now, Rafael Scheel, a security researcher working with OneConsult, has developed his own smart TV attack that allows a hacker to use rogue DVB-T (Digital Video Broadcasting-Terrestrial) signals to get root access on the smart TVs. Getting root access means that the attacker would be able to use the device for all kinds of spying and notorious activities.
Scheel’s method was recently presented at a security conference. He showed that the attacker can execute the attack from a remote location without any user interaction. The attack operates in the background, which means that users won’t be able to notice the attack, according to Bleeping computer.
Scheel says that the center of this attack is Hybrid Broadcast Broadband TV (HbbTV). It’s an industry standard that supported by most TV manufacturers and cable providers. Different TV transmission technologies, like DVB-T, support HbbTV.
SmartTV-Attack1-scheel
Image: Rafael Scheel
Interestingly, any TV connects to a stronger signal. As the cable providers transmit signals from hundreds of miles away, the rogue DVB-T signals can be transmitted from a nearby house or city. The HbbTV standard helps the attacker send a command that instructs a smart TV to load a malicious website in the background.
Scheel developed two exploits for taking over a device. The first exploit was based on CVE-2015-3090, a zero-day leaked by Hacking Team in 2015. The second exploit helped him gain access to the user’s firmware.
Scheel also says that as DVB-T transmission method for HbbTV commands is uni-directional, which means data flows from attacker to TV only, the discovery of attack is tough. So, the attacker can only be caught transmitting the signals in real-time.
Also, any backdoor created using this technique is almost impossible to remove. In Scheel’s testing, the factory reset operation didn’t help.
You can see the video of the Scheel’s presentation here:
Did you find this remote TV hacking attack interesting? Don’t forget to share your views with us.

Comments

Follow Us

WHAT'S HOT

Fedora Project Finally Releases Fedora 27 Beta And “Rock Solid” FreeBSD 10.4

After a few hiccups and delays, the Fedora Project has finally shipped the beta release for Fedora 27 Linux distro. This is a major milestone before the final version ships later this year in

How To Connect Android or iOS Phone To Windows 10

The  Continue on PC  feature is currently available to Windows Insiders, but it’ll arrive for regular users once the update starts landing on their PCs. If you’re running an Insider build, you can use the steps mentioned in this post to connect your phone to Windows 10 PC.

Android Oreo Update Will Arrive On All Nokia Android Smartphones

While there seems to be a suspense regarding  which devices would get the Android Oeo update , HMD Global has raised the curtain from their fleet of smartphones.

Extratorrent Brought Back From The Dead By Fans, Now Running On A New Domain

I t was merely a couple of days back when the shutdown of the torrent website  Extratorrent.cc was announced . Now, a group of uploaders and Extratorrent admins claim to have revived the torrent site on a new domain  Extratorrent.cd .