Hacker can steal your sensitive data by observing wifi signal interference

SHARE:

hacker can steal your sensitive data by observing wifi signal interference
Info!  Hackers can steal your sensitive information, such as your Passwords, PINs and Keystrokes, from your phone by observing changes in the wireless signal as you enter them into your smartphones

A group of researchers from the Shanghai Jaio Tong University, the University of South Florida and the University of Massachusetts at Boston have demonstrated a new technique that can reveal private information by analyzing the radio signal Interference, using just one rogue WiFi hotspot.

Dubbed WindTalker, the attack sniffs a user's fingers movement on the phone's touchscreen or a computer's keyboard by reading the radio signal patterns called Channel State Information (CSI).

CSI is part of the WiFi protocol which provides general information about the status of the WiFi signal.
"WindTalker is motivated from the observation that keystrokes on mobile devices will lead to different hand coverage and the finger motions, which will introduce a unique interference to the multi-path signals and can be reflected by the channel state information (CSI)," the researchers writes in their paper titled, 'When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.'
"The adversary can exploit the strong correlation between the CSI fluctuation and the keystrokes to infer the user’s number input."

Here’s How An Attacker Track your fingers moves on a smartphone screen:
hacker can steal your sensitive data by observing wifi signal interference

When you enter your PIN number or password in any app or swipe your smartphone lock screen pattern, your finger movements alter the WiFi signals transmitted by a mobile phone, and the movements are imprinted into the signal.

Now, hackers with control to a public Wi-Fi hotspot to which your device is connected to could then intercept, analyze, and reverse engineer those signals to accurately guess what sensitive data you have typed into your phone or in password input fields.

The WindTalker attack is particularly effective as it does not require any access to the victim's phone and works with regular mobile phones.

The attack needs the hacker to control a rogue WiFi access point to which the target will connect to and collect WiFi signal disturbances.

WindTalker will also not work with older internet router that has one antenna to broadcast Wi-Fi signals around your home, as it relies on a technology called Multiple Input, Multiple Output (MIMO).

hacker can steal your sensitive data by observing wifi signal interference

However, this is not a problem because the latest wireless routers now come with multiple antennas and MIMO technology, which enables routers to connect and transmit data from multiple devices simultaneously.

WindTalker Attack has an Over 68% Accuracy

The researchers tested the WindTalker attack in a real-world scenario against several mobile phones and were able to recover the 6-digit transaction PIN required to complete a mobile payment transaction via Chinese Payment Service Alipay.
The researchers said, "the evaluation results show that the attacker can recover the key with a high successful rate."
"In practice, the attackers have more choices to achieve the user specific training. For example, it can simply offer the user free WiFi access and, as the return, the victim should finish the online training by clicking the designated numbers. It can also mimic a Text Captchas to require the victim to input the chosen numbers," the researchers said. "Even if there is only one training sample for one keystroke, WindTalker can still achieve a whole recovery rate of 68.3%."

The accuracy of the WindTalker attack is different based on mobile phone models, and the accuracy could also be improved with users typing more and the attacker collecting more data on it.

The WindTalker attack technique was also presented at the 23rd Association for Computing Machinery Conference on Computer and Communications Security, held in Vienna, Austria, from 24 to 28 October.

COMMENTS

Name

2016,2,2017,1,360degree,1,360video,1,4k,1,5g,1,8K,1,A series,1,account,2,adobe,1,ads,2,aerial,1,altaba,1,ambassador,1,andriod,30,android,2,antivirus,3,Apple,53,apple watch,1,Apps,34,appstore,1,arrest,1,assassin creed 3,1,atm,1,attack,3,audio,1,backdoor,1,backup,1,ban,3,bank,4,battery,4,best of 2016,2,beta,1,bitcoins,1,bittorrent,8,block,1,bluetooth,1,britney spear,1,browser,8,business,2,bypass,1,callofduty,1,camera,1,cars,1,cash,1,cellebrite,1,CES2017,3,charge,1,china,2,chrome,2,CIA,1,cocacola,1,commandprompt,1,complaint,1,connection,2,copyright,2,cortana,1,crash,1,crime,3,cyanogen,1,cyberlocker,1,D-link,1,darkweb,1,dash charge,1,database,1,databeach,5,ddos,6,deadpool,1,death,1,dell,2,denuvo,1,design,1,desktop,1,dji,1,dmca,2,dns hijacking,1,domain,1,doom,1,download,1,downloader,2,drone,3,durable,1,dvdvideosoft,1,edge,1,eset,1,ex.ua,1,expert,1,explode,3,exploit,1,extratorrent,2,facebook,11,fake,3,fbi,1,FDA,1,findmyiphone,1,fireEye,1,firefox,2,FTC,1,g6,1,gadget,11,galaxy A5,1,galaxy A7,1,galaxy C5,1,game,19,game of throne,1,gaming,2,Gear s2,1,Gear s3,1,giveaway,1,google,28,google playstore,1,hacker,5,hacking,75,hangouts,1,history,1,htc,1,htc 10,1,huawei,3,hyperloop,1,illegal,3,imax,1,imessage,1,improvement,1,india,3,information,1,inspire2,1,instagram,3,intel,1,internet,19,ios,28,ios 10.2,1,iphone,33,iphone 7s,1,iphone6,4,iphone6plus,3,iphone6s,4,iphone7,2,iphone7plus,3,japan,1,kapustkiy,1,kaspersky,3,keyboard for andriod,1,kickass,1,killer,1,laptop,1,latest,13,leak,11,lg,2,limes audio,1,linkedln,2,linux,3,live video,1,lottery,1,lynda,1,mac,1,macbook,5,malware,10,medical report,1,microsoft,43,money,1,monitor,1,movie,1,Music,5,nasa,2,navy,1,netflix,4,network,1,news,2,nintendo,2,noaa,1,nokia,4,nokia 6,1,north korea,1,note5,1,note7,5,nougat,7,nsa,1,office,1,oneplus,4,oneplus 3,1,oneplus 3T,1,oneplus4,1,online,1,os,5,ourmine,2,pacemaker,1,password,2,patch,1,pc,2,periscope,1,photography,2,picture,1,piracy,7,pirate,6,pirate bay,6,pixel,6,pixel xl,1,pizza,1,playstation,4,playstore,3,pokemon go,1,police,1,powershell,1,prisma,1,prison,1,privacy,2,project Valerie,1,Projector,1,protection,1,prototype,1,putlocker,1,qualcomm,1,ransomware,2,raspberrypi,1,rating,1,razer,1,recall,6,red star,1,redstone,1,refund,1,remove,1,rename,1,review,2,rumors,4,russia,7,s6,1,s6edge,1,s7,1,s7edge,2,samsung,27,satelite,1,searchengine,1,security,34,selfie,1,server,1,shadow broker,1,shutdown,8,siri,1,skippable,1,skype,1,smartphone,101,socialnetwork,11,software,1,sony,5,space,2,sqlinjection,1,stolen,1,supercomputer,1,supermario run,2,support,1,system,2,tabs2,1,tango,1,target,1,tech,53,Technology Explained,4,tesla,1,the mummy,1,tools,1,torrent,10,torrent site,1,track,1,trademark,1,TV show,1,twitter,5,ubisoft,2,uk,4,unlock,1,upcoming,1,update,22,us,5,usbkiller,1,users,1,USTR,2,vespa,1,video,4,videoplayer,1,vines,1,visualstudio,1,vlc,1,VR,3,vulnerability,15,vulnrrability,1,warning,1,watchdog2,1,website,2,what.cd,2,whatsapp,1,wifi,3,wikileaks,1,windows,33,windows10,5,wireshark,1,xbox,4,xiaomi,1,xperia,2,yahoo,1,youtube,5,youtubekids,1,
ltr
item
MOUNT TECH: Hacker can steal your sensitive data by observing wifi signal interference
Hacker can steal your sensitive data by observing wifi signal interference
wifi hacked
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiALAwVfzLZohzD8CEF7j5GQ2TOPGPf0P6uO4xynlQxMLvp5v_87RFmCPFIaRfvwpKZ8txfzcuqmHzBuI_3V9Yqrp5pDel3CJRlpyFxENVAnDzd7YNuBh_WjtE5aiDmSdAw-ZuhS4N1dLsx/s1600/hacker+can+steal+your+sensitive+data+by+observing+wifi+signal+interference.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiALAwVfzLZohzD8CEF7j5GQ2TOPGPf0P6uO4xynlQxMLvp5v_87RFmCPFIaRfvwpKZ8txfzcuqmHzBuI_3V9Yqrp5pDel3CJRlpyFxENVAnDzd7YNuBh_WjtE5aiDmSdAw-ZuhS4N1dLsx/s72-c/hacker+can+steal+your+sensitive+data+by+observing+wifi+signal+interference.jpg
MOUNT TECH
http://mount-tech.blogspot.com/2016/11/hacker-can-steal-your-sensitive-data-by-observing-wifi-signal-interference.html
http://mount-tech.blogspot.com/
http://mount-tech.blogspot.com/
http://mount-tech.blogspot.com/2016/11/hacker-can-steal-your-sensitive-data-by-observing-wifi-signal-interference.html
true
5023700227490855537
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy