Cyber Security News

GhostTouch – A Remote Attack Against Touchscreens Using Electromagnetic Signals

Touchscreens have become a trending alternative to mouses and keyboards that allow users to interact with computers using their fingers.

Especially, capacitive touchscreens give multi-touch capabilities, long service life, and cost-effectiveness, and therefore, have been widely used on personal devices such as smartphones, tablets, and watches. The major requirement for touch screens is reliable and accurate touch sensibility. 

GhostTouch, the First Contactless EMI-attack (Electromagnetic Interference)

A team of researchers from Zhejiang University and the Technical University of Darmstadt devised a technique, called ‘GhostTouch’, to remotely control capacitive touchscreens using electromagnetic signals.

Experts say, its main target is to interfere with the capacitance measurement of touchscreens using electromagnetic signals, which are injected into the receiving electrodes integrated into the touchscreen. As a result, an electromotive force is induced in the measuring circuit that affects the touchpoint detection.

A GhostTouch attack scenario

In this scenario, the attacker uses an EMI device under a table to remotely attack the touchscreen of a smartphone face-down on the table. By injecting fake touches, the attacker can trick the smartphone to click a malicious link containing malware, connect a malicious network, and answering an eavesdropping phone call.

Working on GhostTouch Attack

The experts explained the attack scenario using the illustration design where the GhostTouch system consists of two components, a touch injector, and a phone locator. The touch injector is used to inject touch events into the touchscreen and includes a signal generator, an amplifier, an on/off switch, and a receiving antenna array. The phone locator is used to identify the position of the touchscreen and consists of a sensing antenna array, a data acquisition device, and a location calculator.

GhostTouch system

The researchers say “Our results showed that certain smartphones are less vulnerable to the GhostTouch attack, which could be due to better electromagnetic shielding or effective validation”.

Mitigation

Manufacturers may reinforce the touchscreen by adding an electromagnetic shield and increasing the voltage of the excitation signal. Experts also recommend improving the detection algorithm of the touchscreen. Application permissions may be restricted and identity verification needs to be conducted when executing high-risk actions.

Guru

Gurubaran is a Security Consultant, Security Editor & Co-Founder of Cyber Security News & GBHackers On Security.

Recent Posts

SSNDOB Marketplace Admin Jailed for Selling millions of Americans Data

In a resounding triumph for justice, U.S. District Judge Kathryn Kimball Mizelle has sentenced Vitalii…

12 hours ago

Is Your Online Store Hacked in a Carding Attack? Here’s an Action Plan to Protect

Hackers are plotting to benefit from the generosity of Halloween, Thanksgiving, and Christmas shoppers using…

15 hours ago

Google Researchers Find Out How ChatGPT Queries Can Collect Personal Data

The LLMs (Large Language Models) are evolving rapidly with continuous advancements in their research and…

16 hours ago

New Android Malware Employs Various Tactics to Deceive Malware Analyst

In the dynamic realm of mobile application security, cybercriminals employ ever more sophisticated forms of…

17 hours ago

DJvu Ransomware Mimic as Cracked Software to Compromise Computers

A recent campaign has been observed to be delivering DJvu ransomware through a loader that…

18 hours ago

Okta Hack: Threat Actors Downloaded all Customer Support System Users’ Data

In a pivotal update to the Okta security incident divulged in October 2023, Okta Security…

20 hours ago