Here's how your monitor could be hacked to spy on you

Dell monitors

There's been plenty happening over at the Defcon 24 hacking conference in Las Vegas, and another worrying development is the emergence of news that the humble monitor can be hacked.

A monitor, hacked? How exactly? Well, that's a good question, and the simple answer is that it's possible to do so if an attacker can get physical access to the monitor's USB or HDMI port – via which they can access the firmware of the display.

Two enterprising security experts, Ang Cui and Jatin Kataria (from Red Balloon Security) discovered this by reverse-engineering a Dell U2410 monitor. This was not a trivial process – it took over two years, as PC World reports – but the pair noted that there was a complete lack of security when it came to the firmware update process, which allowed for the hack.

Ransoming or spying

Once a monitor has been hacked, an attacker can manipulate the hardware to display a message permanently on-screen, for example – which could be a new strain of computer-based ransoming, demanding payment to remove said message.

Or perhaps even worse, particularly if we are talking about businesses, it could be possible to log the pixels generated by the monitor and effectively spy on the user.

The pair noted they embarked on their campaign to "highlight the lack of security in 'modern' on-screen-display controllers", and indeed they noted that monitors from other vendors – they'd also looked at Samsung, Acer and HP – could theoretically be hacked in the same fashion.

Of course, the physical access aspect – and the amount of work the security researchers had to put in – does limit the usefulness of this for would-be attackers, but it's still undoubtedly a good wake-up call for monitor manufacturers.

And it also serves as a reminder for businesses to keep a careful eye on what goes on with the hardware inside their office.

Top image credit: iStock.com/scyther5

TOPICS

Darren is a freelancer writing news and features for TechRadar (and occasionally T3) across a broad range of computing topics including CPUs, GPUs, various other hardware, VPNs, antivirus and more. He has written about tech for the best part of three decades, and writes books in his spare time (his debut novel - 'I Know What You Did Last Supper' - was published by Hachette UK in 2013).

Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
NetSuite EVP Evan Goldberg at SuiteConnect London 2025
"It's our job to deliver constant innovation” - NetSuite head on why it wants to be the operating system for your whole business
Monster Hunter Wilds
Monster Hunter Wilds Title Update 1 launches in early April, adding new monsters and some of the best-looking armor sets I need to add to my collection