Skip to main content

Giving Your Phone To Repair Shop? A Hacker Can Implant A Secret Hardware In Replacement Parts To Completely Leak User Data


When your smartphone faces a critical problem, or it suffers cracking of screen, what do you do? You might try some hacks and perform some failed attempts, but in most cases, you end up visiting some repair shop and risking the integrity of your device.

This threat has been highlighted in a new research that shows how notorious repair shops can use a specially crafted replacement screen to log keyboard input and take control of your device. It can also be used to install apps full of malware, record patterns, take pictures, and email data to the attacker.
It’s worth noting that when a phone is serviced in a third-party repair shop, the “trust boundary” is broken. There’s no way to certify that the replacement parts haven’t been modified. At 2017 Usenix Workshop on Offensive Technologies, the researchers from the Ben-Gurion University of the Negev presented a paper on the same issue, according to Ars Technica.
The research also shows that the compromised screens and parts, which cost less than $10, can exploit OS flaws and bypass the security protection mechanisms built into the smartphones. As one would expect, the replacement parts can’t be distinguished from the original parts.
Showcasing this risk, the researchers implanted a chip in a regular screen to manipulate the communication bus. By simulating a “chip-in-the-middle” attack, the data transfer from hardware to software drivers is monitored and modified.
To keep the attack hidden, the chip can also power off the display and perform different tasks like taking pictures, logging patterns, etc. One should note that while this demonstration was performed using an Android phone, there’s no reason why this exploit won’t work on iOS devices.
Did you find this article on the chip-in-the-middle attack using a fake display interesting? Don’t forget to share your views.

Comments

Follow Us

WHAT'S HOT

Virtual and Augmented Reality: Transforming The Way We Look At The Internet and Data Security

Virtual and Augmented Reality have redefined every aspect of our modern world ranging from gaming, music, and pop culture, to business, human interaction, and development. However, ‘with great power comes great responsibility’. When it comes to a technology slowly becoming a part of some of our most sensitive aspects in our lives (finances, identity, and health), ensuring its safety is highly important. Despite this, many companies have certainly not done their part to ensure the better virtual reality security and, in turn,

Twin sisters CONJOINED at abdomen, liver and umbilical cord die soon after birth (photo)

> The Siamese twins who were born in Zambia a few days ago passed away > They were joined at the chest > The babies shared one abdomen, liver and umbilical cord The conjoined twins who had been born at KITWE Central Hospital in Zambia a few days ago, have passed away. The Siamese girls were delivered by a 19-year-old woman. They were joined by the chest, sharing one abdomen, liver and umbilical cord.

Which Is The Best Linux Distro For Beginners? — 2017 Edition

Are you looking for  a Linux distro that’s suitable for new users who are willing to start   an exciting Linux journey? Well, you’re at the right place. These days, Linux Mint is giving a tough competition to Ubuntu as it’s very beginner-friendly. Our other top recommendations are Zorin OS (which looks a lot like Windows operating system) and lightweight Linux Lite.

Google’s Open Source DIY Kit Turns Your Raspberry Pi Into An AI Assistant

The latest edition of the MagPi magazine includes a DIY kit created by Google that can be used to create a custom Google Home device powered by Raspberry Pi. A user can take advantage of the Google Assistant SDK and Google Cloud Speech API to enable voice control in their projects.