Laptop docks vulnerable to hacks, researcher finds

This version of Laptop Docks Vulnerable Hacks Researcher Finds Flna1B8307362 - Technology and Innovation | NBC News Clone was adapted by NBC News Clone to help readers digest key facts more efficiently.

Office laptop dock
NCC Group
NCC Group researcher Andy Davis showed how to construct a remotely controllable, covert hardware implant in a laptop dock, based on the Raspberry Pi miniature computer.
NCC Group researcher Andy Davis showed how to construct a remotely controllable, covert hardware implant in a laptop dock, based on the Raspberry Pi miniature computer.Andy Davis / NCC Group

Laptop docking stations are useful for increasing a computer's functionality — but they can also be used to launch a computer attack.

As an interface with access to the network and all ports on a laptop, a docking station isn't just a "dumb" device.

Hackers can exploit one by connecting it to a stealthy piece of hardware that can be controlled remotely.

"If you have access to a dock, you have information on all the other ports, such as softphones or videoconference traffic," NCC security researcher Andy Davis told the Dark Reading security blog. "It [the dock] can capture traffic before it's encrypted and after it's decrypted."

A softphone is any kind of software product used to make telephone calls over the Internet, such as Skype.

[8 Simple Tips for Securing Your Computer]

Davis will demonstrate how such an attack is possible at the Black Hat Europe security conference in Amsterdam next month.

Although the majority of computer attacks are perpetrated by criminals in remote locations, who never have physical access to a victim's hardware, it's important not to overlook the vulnerabilities we have sitting on our desks.

Even a low-level custodial employee with office access could quickly and covertly place such a device inside a docking station.

"It's a potential piece of interception equipment, and it blends in with the office environment," Davis added.

Davis said a thermal-imaging camera could be used to detect infected devices. He added that a low-tech method, such measuring the device's weight, could also be used to combat tampering.


×
AdBlock Detected!
Please disable it to support our content.

Related Articles

Donald Trump Presidency Updates - Politics and Government | NBC News Clone | Inflation Rates 2025 Analysis - Business and Economy | NBC News Clone | Latest Vaccine Developments - Health and Medicine | NBC News Clone | Ukraine Russia Conflict Updates - World News | NBC News Clone | Openai Chatgpt News - Technology and Innovation | NBC News Clone | 2024 Paris Games Highlights - Sports and Recreation | NBC News Clone | Extreme Weather Events - Weather and Climate | NBC News Clone | Hollywood Updates - Entertainment and Celebrity | NBC News Clone | Government Transparency - Investigations and Analysis | NBC News Clone | Community Stories - Local News and Communities | NBC News Clone