Tech

Graphics cards expose your PC to hacking


PCs rely mainly on graphics cards for a large number of tasks. This is because it is used to run games and process their content, in addition to its main role in artistic works such as image design or video editing.

The hackers have discovered a way that they can perform these attacks using only graphics cards. This is done by mining the card’s random memory module with specific code, and the card in turn transmits it to the system.

The creator of this method has proven that it works on integrated Intel cards as well as NVIDIA and AMD external cards. The idea behind this method can be described as a very clever one. This is because anti-virus and anti-malware applications cannot scan the RAM of the graphics cards, so hackers resort to mining it.

Also Read: Optimal CPU and Graphics Card Temperatures While Gaming

The method was first posted on a hacker’s forum. The publisher of the method then included evidence showing that his method was working properly. It is tested on different types of cards such as Intel UHD 620, AMD Radeon RX 5700, and GeForce GTX 1650.

The method was announced on August 8, and by August 25, the owner of the method announced that he had succeeded in selling it to one of the forum’s pioneers, but the details of the sale process or the method’s working details were not disclosed.

Also Read: Why Game Emulators Are Growing In Importance Over Time

Graphics Card Hacks

Although the exact details of this method are not known, security researchers have indicated that it relies on running certain code through graphics cards and based on their random memory, rather than running it based on the central processor and main RAM.

A similar method appeared several years ago, which was known as JellyFish, and it was allowed to include an application that logs everything that is typed as a keylogger to the graphics cards as well.

However, the developer of the method has made it clear through the forum that there is no similarity between the JellyFish method and its method.

Read also: Comparison of FAT32, exFAT and NTFS file management systems

So far, there is no complete information about this new threat. Since it has not yet spread, ways to prevent it are still unknown. But it is always advised not to download any files from any untrusted sites or platforms. Also, only open email attachments from trusted senders.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button