• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Attackers Can Use Electromagnetic Signals to Control Touchscreens Remotely

You are here: Home / Cyber Security News / Attackers Can Use Electromagnetic Signals to Control Touchscreens Remotely

Researchers have demonstrated what they call the “very first energetic contactless attack against capacitive touchscreens.”

GhostTouch, as it is referred to as, “uses electromagnetic interference (EMI) to inject fake contact points into a touchscreen with out the require to physically touch it,” a team of teachers from Zhejiang College and Technological University of Darmstadt explained in a new investigate paper.

The main plan is to just take advantage of the electromagnetic indicators to inject fake touch gatherings this sort of as faucets and swipes into specific locations of the touchscreen with the target of taking in excess of distant handle and manipulating the underlying unit.

CyberSecurity

The attack, which will work from a length of up to 40mm, hinges on the fact that capacitive touchscreens are sensitive to EMI, leveraging it to inject electromagnetic indicators into transparent electrodes that are developed into the touchscreen so as to sign up them as contact activities.

The experimental setup will involve an electrostatic gun to produce a potent pulse sign that’s then sent to an antenna to transmit an electromagnetic field to the phone’s touchscreen, therefore creating the electrodes โ€” which act as antennas themselves โ€” to choose up the EMI.

This can be further wonderful-tuned by tweaking the signal and the antenna to induce a selection of touch behaviors, these kinds of as press and hold and swipe to select, relying on the unit model targeted.

In a authentic-entire world state of affairs, this could engage in out in different means, together with swiping up to unlock a phone, connecting to a rogue Wi-Fi network, stealthily clicking on a destructive url made up of malware, and even answering a phone connect with on the victim’s behalf.

“In areas like a cafe, library, conference room, or convention lobbies, folks may put their smartphone face-down on the desk,” the scientists stated. “An attacker could embed the attack gear under the table and launch attacks remotely.”

CyberSecurity

As many as nine distinctive smartphone models have been found susceptible to GhostTouch, together with Galaxy A10s, Huawei P30 Lite, Honor Check out 10, Galaxy S20 FE 5G, Nexus 5X, Redmi Be aware 9S, Nokia 7.2, Redmi 8, and an iPhone SE (2020), the latter of which was utilized to set up a malicious Bluetooth relationship.

To counteract the threat, the scientists recommend including electromagnetic shielding to block EMI, bettering the detection algorithm of the touchscreen, and prompting buyers to enter the phone’s PIN or verify their faces or fingerprints prior to executing superior-risk actions.

“GhostTouch controls and designs the in the vicinity of-area electromagnetic sign, and injects touch situations into the targeted space on the touchscreen, with out the require for physical touch or access to the victim’s system,” the scientists explained.

Located this post intriguing? Comply with THN on Facebook, Twitter ๏‚™ and LinkedIn to go through far more distinctive content material we publish.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Anker charging accessories are up to 37 percent off in a one-day Amazon sale
Next Post: Survey Evidences Leaders Lack Confidence in Cyber-Risk Management »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks
  • Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool
  • Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks
  • 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager
  • INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure

Copyright © 2025 ยท AllTech.News, All Rights Reserved.