Don't Get Hacked! These 5 PC Accessories are Sneaky Security Risks
When it comes to your digital security, it's not just your PC that you have to worry about. Almost all of your PC's peripherals are hackable too. If not susceptible to being taken over entirely, they can at least be used to transmit malware. Security firms highlight the vulnerability of peripherals all the time by conducting proof-of-concept attacks, which simulate how hackers would gain access to them.
Although these devices don't run an operating system, most have firmware that can be updated with unsigned code and malware. That malware can hide out in these devices and remain undetected by your security software, which means you may never know it's there.
The Webcams You Never Knew Could Be Hacked
Webcam hacks are some of the more publicized device breaches. Hackers use Remote Access Trojans (RATs) and social engineering (or as is quite often the case, a combination of both) to take control of victims' webcams remotely – known as camfecting.
Social engineering scams for camfecting attacks often come under the guise of "technical support," where the cybercriminal claims to want to help the victim fix something wrong with their PC or webcam. Once in, the crims then go about stealing images and / or videos and using these assets to either extort or exploit the victims, usually for financial gain.
While malware is a main tool of webcam hackers, researchers have shown that there are also thousands of webcams out there that don't even need to be properly hacked with malware for cybercriminals to gain access to them. These webcams are vulnerable in other ways… some are being used over unsecured peer-to-peer networks and others just have weak or default passwords that can easily be breached.
The Humble Headphones: A Surprising Security Risk
Even your headphones can be hacked, as a team at Ben-Gurion University in Israel recently proved. They created a proof-of-concept attack on a headphone by turning it into a microphone. That's despite the device not even being equipped with a microphone.
The researchers used an espionage-grade malware known as SPEAK(a)R to switch the headset's audio ports, turning the output port into an input port. Once this was done, the researchers then recorded user conversations and posted them to the internet as proof of their feat.
The hacked headphones had RealTek audio chips onboard, which can be found in a whole host of audio devices, from speakers to PC motherboards. In targeting devices with RealTek chips, the researchers highlighted the large number of devices vulnerable to an attack of this kind.
USB Hubs: The Bridge Between Your PC and Malware
USB hubs are certainly useful devices since they expand the capabilities of your PC or laptop. But as a bridge between your PC and other devices, they are also ideal for hackers to target and use for their own nefarious purposes.
These devices don't usually come with any kind of firewall or security protection. In fact, most provide a free and open direct line of access to your devices, so hackers can successfully use them as conduits to spread malware.
USB hubs can also be used to intercept data. This is usually achieved when the cybercriminals physically plug a malicious USB flash drive containing malware into the hub that can intercept, download, and sometimes even remotely transmit data.
The Sneaky USB Cable
The humble USB cable is the last thing you'd expect to have to worry about from a security point of view, but the truth is that even these seemingly benign devices can be used to hack your PC and steal your data and / or credentials.
How do we know this? We recently covered the story of Lumafield's research into the O.MG cable – a well-known "hacked USB cable" built for covert field use and research. Lumafield, employed 2D and 3D scanning techniques to uncover hidden hacker hardware located inside the O.MG cable's connector.
It revealed a chip stacked on top of the cable's microcontroller, which could be used by hackers to intercept data and transmit it remotely.
The Hidden Security Flaws in Your Printer
Most HP printer models have critical security flaws. Update now! Avoid public USB charging stations. They could hack your phone
This article was written by Dominic Bayley, Australian Editor, PCWorld Based in Australia, Dominic Bayley is a hardcore tech enthusiast. His PCWorld focus is on PC gaming hardware: laptops, mice, headsets and keyboards.