• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • December 5th, 2019
  • Home
  • About Us
  • Team
  • Advertise
  • Submit News
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Google+
    • Linkedin
    • Youtube
Home » Hacking News » Hackers can exploit E-Cigarettes to hack computers

Hackers can exploit E-Cigarettes to hack computers

June 17th, 2017 Waqas Hacking News, Security 0 comments
Hackers can exploit E-Cigarettes to hack computers
Share on FacebookShare on Twitter

The manufacturers of Electronic cigarette highlight the benefits to letting you lead a stress-free and healthy life, what they certainly do not highlight was that the device could be used for malware distribution as well.

It’s amazing what hackers can do these days. When it comes to malware, they prefer sending malicious attachments in an email but times have changed and these threat actors are coming up with new ways to target their victims. One of the new ways requires an e-cigarettes or a vape pen and some modification to convert it into a hacking tool and infect a targeted computer.

Security researcher Ross Bevington (@FourOctets on Twitter) had a presentation at BSides London that showcased an e-cigarette attacking a computer by tricking it to believe that it was a keyboard. It was also able to hack the computer by interfering with its network traffic.

It is done because most of the e-cigs come with a rechargeable lithium-ion battery, which can be plugged into a cable or directly connects to the USB port of a computer.

In a conversation with Sky News, Bevington said that:

“He had modified the vape pen by simply adding a hardware chip which allowed the device to communicate with the laptop as if it were a keyboard or mouse – A pre-written script that was saved on the vape made Windows open up the Notepad application and typed “Do you even vape bro!!!!”

 

It is unclear what kind of malware infection can be done through the e-cigarettes however based on WannaCry malware attack one can expect the worst, therefore, require to be careful while using e-cigarettes or vape devices on their computer. 

This is not the first time when news regarding e-cigarettes infecting computers has come out. In 2014, a company executive had their computer infected with malware and no amount of cleaning, robust security or anti-malware protection was able to thwart the data compromise. The IT security experts failed to nail the problem and decided to investigate if the executive routine had any changes.

It was then that they found out that the executive had switched to e-cigarettes in an attempt to quit smoking and lead a healthy life. The IT experts discovered that the charger of the e-cigarette was compromised and the moment it was connected to the computer, the malware would connect it to a remote server and download the malicious software.

To avoid such risks, it is advised to disable data pins on the USB and keep only cable charge to prevent any information exchange between the devices it connects. Alternatively, use a USB Condom, a gadget that connects to USB and makes data pins ineffective.

  • Tags
  • hacking
  • internet
  • IoT
  • Privacy
  • security
  • Technology
  • USB
Facebook Twitter Google+ LinkedIn Pinterest
Previous article Hundreds of Malicious Android Apps Masked as Anti-virus Software
Next article Disruptive Ransomware Group 'FIN10' Hacked Casinos, Mining Firms
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism.

Related Posts
Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors

Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors

Flawed Implementation of RCS Standard putting data of millions at risk

Flawed Implementation of RCS Standard putting data of millions at risk

This Smartwatch is exposing real-time location data of thousands of kids

This Smartwatch is exposing real-time location data of thousands of kids

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

LATEST POSTS
Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns
Surveillance

Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns

23
Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors
Cyber Attacks

Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors

117
Flawed Implementation of RCS Standard putting data of millions at risk
Security

Flawed Implementation of RCS Standard putting data of millions at risk

362
3 arrested, 30,000+ piracy sites shut down in global operation IOSX
News

3 arrested, 30,000+ piracy sites shut down in global operation IOSX

537

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us