7 Unexpected Hacks of 2015, Thanks To DefCon and Black Hat

This year, at DefCon 23 and Black Hat USA 2015 security conferences, hackers are going to discuss how vulnerable and severely flawed our day-to-day things really are.

Here at HackRead.com, we have brought you 7 much awaited hacking discussions that are related to the technologies towards which most of the individuals are looking forward to including vehicle, smartphones, weapons, computers, and skateboards.

So let’s look at what are those concerns and vulnerabilities that hackers have found after the implementation of Internet and modern technologies into these gadgets and hardware.

#1: Remotely Hacking a Jeep

In this Black Hat USA 2015 session, two security researchers namely Charles Miller and Chris Valasek will give a presentation about their discoveries related to the security vulnerability they found in the onboard infotainment system of all the vehicles manufactured by Fiat Chrysler Automobiles, leaving more than 470,000 vehicles vulnerable to these similar hacking attempts.

Using this vulnerability, both of these hackers managed to remotely take control over the vehicle, which allowed them to manipulate the vehicle’s brakes, acceleration, entertainment system and what not.

Head over to this link to know more about how hackers remotely took control of a Jeep while it was on the highway.

#2: Android Stagefright Exploit – Left 950 Million Android Users Vulnerable

Did you ever think that your smartphone running Android mobile operating system could be hacked with just a single text message?

Well, that is possible now as a Zimperium’s Mobile Security Expert Joshua Drake found a security bug within the Android Media Playback Tool codes. This bug allowed him to remotely execute malicious code in the targeted Android smartphone just by sending a simple text message embedded with a malicious code.

This security bug codenamed Stagefright, is believed to be one of the most devastating hacks in the history of mobile software, which left whopping 950 million Android-based smartphones vulnerable to the security threat.

Head over to this link to know how Drake managed to find Android Stagefright exploit.

#3: Remotely Hack Linux-Powered Sniper Rifles

You don’t believe that heading, right? At first, we neither. Until this married couple Runa Sandvik and Michael Auger, surprisingly both are researchers too, managed to hack two self-aiming sniper rifles, gaining access over the self-aiming functionality. It took them almost a year to discover and exploit the vulnerability in the rifle.

Actually, these self-aiming rifles are powered by a Linux-based system, allowing any novice shooter to make perfect shots, even if the target is 1000 yards away.

You must be wondering that what makes this rifle vulnerable to remote hacking, right? The rifle manufacturer implemented a Wi-Fi accessibility within the gun, making it vulnerable to hacking.

So security researchers found a vulnerability in the software of Wi-Fi functionality that allowed them to remotely alter the shooting calculations made by rifle, making it miss the target.

Head over to this link to learn more about what else these researchers did after remotely hacking the Linux-powered sniper rifle.

#4: Remotely Locate, Unlock and Start GM Vehicles Using A Mobile App

Do you own any GM vehicle that is equipped with the OnStar system? Beware because a security researcher Samy Kamkar has found a vulnerability within the OnStar’s mobile app named RemoteLink, which allowed him to remotely locate, unlock, start, honk the horn, and turn on the headlights of a vehicle. He can perform all those tasks that your RemoteLink app is capable of, remotely!

Kamkar also developed a $100 gadget that allowed him to remotely connect to any OnStar equipped GM vehicle. He codenamed it OwnStar.

Head over to this link to see him controlling a Chevy Volt after hacking OnStar’s RemoteLink app.

#5: Thunderstrike 2 – Permanently Hack Apple MAC Computers

Do you know your MAC computer can be permanently hacked? Recently, a team of researchers found a number of vulnerabilities within the core firmware of the MACs. And using this vulnerability they made a worm that can permanently infect any MAC based computer system.

This exploit is so risky that once your MAC is infected then the only possibility to fix it is by re-flashing the infected chip.

Security researchers Trammell Hudson and Xeno Kovah codenamed this firmware vulnerability as ‘Thunderstrike 2’. They have planned to demonstrate this exploit at Black Hat USA 2015.

To know more about what Thunderstrike 2 is capable of and how it can permanently hack MAC computer then head over to this link.

#6: Remotely Hacking Electronic Skateboards

Two security researchers Rico Healey and Mike Ryan accidentally found a vulnerability in the on-board system of the Bluetooth controlled electronic skateboards, which allowed them to remotely hack the skateboard, taking complete control over it.

The researchers have planned to demonstrate the several security vulnerabilities at DefCon 23 security conference. They said that these vulnerabilities make it a risky ride for those using it to commute. They codenamed the vulnerability as ‘FacePlant’.

To know more about remotely hacking a Bluetooth-enabled electronic skateboard then head over to this link.

#7: Stealing Data Using Radio and Sound Waves

All your computer data isn’t secure anymore, even if your computer is not connected to the Internet. Security researcher named Ang Cui found out that there’s a possibility to remotely steal data just by transforming any infected hardware or device into a transmitter, which then transmits radio frequency signals that can be received by software controlled AM receiver.

This isn’t any concept or theory. The researcher himself is going to present, brief and provide a live demonstration of his inventive hack at Black Hat USA 2015. He codenamed it as ‘Funtenna’.

Are you interested in the video demo of how Ang Cui snooped over a simple data using an infected printer and his technique? Head over to this link.

Related Posts