Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Hackers Can Use Screen Noise to Steal Data on Air-Gapped PCs
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Hackers Can Use Screen Noise to Steal Data on Air-Gapped PCs
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Hackers Can Use Screen Noise to Steal Data on Air-Gapped PCs

Security

Hackers Can Use Screen Noise to Steal Data on Air-Gapped PCs

Hackers can now steal data from air-gapped PCs by eavesdropping on the "singing" of monitor pixels.

Marco Rizal
Last updated: September 18, 2024 9:55 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Hackers Can Use Screen Noise to Steal Data on Air Gapped PCs
SHARE
  • Air-gapped PCs, once thought secure, are now vulnerable to pixel-induced acoustic attacks.
  • The PIXHELL attack uses pixel patterns to generate sound that leaks sensitive information.
  • Hackers can exfiltrate data up to 2 meters away using nearby devices like smartphones.

Air-gapped PCs—fortress-like systems that are physically isolated from the internet—were thought to be the pinnacle of security.

Guess what? Hackers have just discovered a way to turn them into personal music players.

The new attack, known as “PIXHELL,” allows cybercriminals to eavesdrop on the noise emanating from a PC's screen in order to steal sensitive information.

It's as if your computer monitor has decided to start spilling secrets to the nearest eavesdropper.

Researchers at Israel's Ben-Gurion University of the Negev discovered this sneaky attack method.

Their findings show that by exploiting the internal components of an LCD screen, such as coils and capacitors, hackers can generate acoustic signals ranging from 0 to 22kHz.

image 70
PIXHELL uses pixel patterns to leak information through the acoustic signals it produces.

These signals can encrypt and transmit sensitive data, effectively transforming an air-gapped PC's screen into a covert transmitter.

What is the best part (for hackers)? This can be accomplished without the use of speakers or audio hardware.

This is how it goes: The attack begins with traditional hacking methods, such as physical access, USB drives, or even a phishing attack.

Once the hackers have installed their malware on the target system, they begin collecting sensitive information.

The malware then cleverly converts this data into an acoustic signal by displaying specific pixel patterns on the screen.

image 71
Sending screen with RGB levels

These patterns cause the internal components of the screen to vibrate, producing a sound that can be detected by nearby devices such as smartphones or laptops.

In real-world experiments, PIXHELL was able to extract data from a PC located up to 2 meters away.

That's close enough for a hacker to just stand outside a secure room with their phone and listen in on your screen's “song.”

To make matters even more devious, the attack includes a concealment technique that alters the screen's brightness and pixel color values.

For example, they set the RGB values so low that the screen appears black to the naked eye, concealing the fact that it is leaking data.

While this attack may sound like something out of a spy thriller, it should be taken seriously.

If air-gapped PCs can be compromised via something as seemingly innocuous as their screens, what other “secure” systems will be next?

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Kubota Announces Data Breach Affecting 60000 Personal Information Records

Kubota Announces Data Breach Affecting 60,000 Personal Records

Fake Job Interviews Tricks Users Into Installing Atomic Stealer

Fake Job Interviews Tricks Users Into Installing Atomic Stealer

Kaspersky Forces Users to UltraAV After U.S. Ban Is This the Right Move

Kaspersky Forces Users to UltraAV After U.S. Ban, Is This the Right Move?

NATOs TIDE Think Tank Data Breached

NATO’s TIDE Think-Tank Data Breached, High-Ranking Officials’ Info Exposed

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?