Skip to main content

I’m not even mad. That’s amazing! 7 brilliant, unorthodox hacks

hacks header
dangrytsku/Getty Images
Most of the time you hear about large scale hacks, it’s based on brute force attacks, or user naivety — such as a person clicking a link they shouldn’t or accidentally downloading malware. But there are also plenty of ingenious high-tech hacking methods which wouldn’t look out of place in a spy movie. Whether it’s false fingerprints or hacking drones, here are six of the most unusual and clever hacking methods we’ve heard about.

Getting past the sensors

Simon Hill / Digital Trends
Simon Hill / Digital Trends

Your smartphone sensors could rat you out by revealing your PIN code and password to hackers, claim researchers at Singapore’s Nanyang Technological University. Utilizing machine learning and information gathered from six different smartphone sensors, they were able to unlock Android handsets with 99.5 percent accuracy within three attempts — provided that the PIN was among the 50 most common numbers. Even when this was expanded to 10,000 PIN numbers, the success rate stood at around 83 percent.

The idea of hacking different smartphone sensors is that they can reveal information which may not be immediately apparent to users — such as utilizing the ambient light sensor to discern which button is being pressed, based on how much light is being blocked.

When TVs go from smart to scheming

Image used with permission by copyright holder

We don’t necessarily think of televisions as being computers, but in the age of smart TVs, maybe we should.

Recently, security consultant Rafael Scheel of Oneconsult AG demonstrated how it’s possible for hackers to gain control of smart TV sets without having to have physical access to them to do so. Using a cheap transmitter to embed malicious commands into a rogue TV signal, Scheel was able to gain access to televisions in the vicinity of the signal.

Once the TV is compromised, it could be used to attack further devices in the home network, or simply to spy on a home’s inhabitants using the TV’s camera and microphone.

Hacking in the age of 3D printers

Image used with permission by copyright holder

At first glance, it might be harder to understand why someone would want to hack a 3D printer rather than, say, a smartphone. However, when you consider the applications of 3D printing for areas like prototyping it’s quite obvious.

In one 3D printer hack demonstration showing how secret designs could be stolen, a team of computer scientists was able to use a smartphone’s built-in sensors to measure the electromagnetic energy and acoustic waves that emanate from a 3D printer. This allowed them to gather enough data to replicate 3D printed objects with accuracy levels of up to 94 percent.

More worryingly, another team of researchers was able to use a phishing attack to gain access to the PC attached to a 3D printer, and alter its 3D model file. The result was a 3D printed drone propellor that was made to malfunction, and caused the drone to crash.

A flying hacker’s laptop

Image used with permission by copyright holder

A lot of the high profile large scale hacks have taken place from thousands of miles away — from places like North Korea. However, there is also a rise in proximity-based “over the air” attacks, in which hackers are able to gain access to other people’s devices, which are physically located nearby.

In order to carry out proximity-based attacks on local devices like set-top boxes, smartwatches, smart refrigerators and more, researchers from renowned security firm Bishop Fox have developed a flying drone-based hacking station called Danger Drone.

By using its abilities to hover and fly to get around the problem of physical access, Danger Drone could be used to carry out an attack on multiple smart devices in a victim’s home.

Your fingerprints aren’t safe

starbug: Ich sehe, also bin ich ... Du (english translation)

Biometric passcode systems like Touch ID are on their way out for smartphones, but fingerprint sensors will likely stick around for years before they die out completely — and that’s exactly what this next James Bond-style hack could be used to exploit.

Demonstrated at the 31st annual Chaos Computer Club convention in Hamburg, Germany, hacker Jan Krissler showed how it was possible to replicate the fingerprint of German Defense Minister Ursula von der Leyen using nothing more than a photo of her hands software called VeriFinger.

With photos taken from several different angle using a standard camera, Krissler created a full fingerprint for Von der Leyen, and then developed a mold good enough to fool a fingerprint sensor.

Using soundwaves to control a phone

Sonic Cyber Attacks on MEMS Accelerometers

Whether it’s your smartphone or your connected car, hackers may be able to access it using soundwaves. Researchers at the University of Michigan have shown that it’s possible to hack into a variety of different gadgets by using soundwaves to trigger micro-electro-mechanical systems (MEMS) accelerometers, a.k.a. the chip used to say whether a device is in motion.

Using just a cheap $5 speaker to blast sound at different frequencies was able to cause devices to perform a range of actions, such as showing a video, starting an app, or even potentially start up a vehicle. While this would only have limited application from short range, it’s pretty disconcerting to imagine a device being hacked using an off-the-shelf speaker.

Luke Dormehl
Former Digital Trends Contributor
I'm a UK-based tech writer covering Cool Tech at Digital Trends. I've also written for Fast Company, Wired, the Guardian…
BYD’s cheap EVs might remain out of Canada too
BYD Han

With Chinese-made electric vehicles facing stiff tariffs in both Europe and America, a stirring question for EV drivers has started to arise: Can the race to make EVs more affordable continue if the world leader is kept out of the race?

China’s BYD, recognized as a global leader in terms of affordability, had to backtrack on plans to reach the U.S. market after the Biden administration in May imposed 100% tariffs on EVs made in China.

Read more
Tesla posts exaggerate self-driving capacity, safety regulators say
Beta of Tesla's FSD in a car.

The National Highway Traffic Safety Administration (NHTSA) is concerned that Tesla’s use of social media and its website makes false promises about the automaker’s full-self driving (FSD) software.
The warning dates back from May, but was made public in an email to Tesla released on November 8.
The NHTSA opened an investigation in October into 2.4 million Tesla vehicles equipped with the FSD software, following three reported collisions and a fatal crash. The investigation centers on FSD’s ability to perform in “relatively common” reduced visibility conditions, such as sun glare, fog, and airborne dust.
In these instances, it appears that “the driver may not be aware that he or she is responsible” to make appropriate operational selections, or “fully understand” the nuances of the system, NHTSA said.
Meanwhile, “Tesla’s X (Twitter) account has reposted or endorsed postings that exhibit disengaged driver behavior,” Gregory Magno, the NHTSA’s vehicle defects chief investigator, wrote to Tesla in an email.
The postings, which included reposted YouTube videos, may encourage viewers to see FSD-supervised as a “Robotaxi” instead of a partially automated, driver-assist system that requires “persistent attention and intermittent intervention by the driver,” Magno said.
In one of a number of Tesla posts on X, the social media platform owned by Tesla CEO Elon Musk, a driver was seen using FSD to reach a hospital while undergoing a heart attack. In another post, a driver said he had used FSD for a 50-minute ride home. Meanwhile, third-party comments on the posts promoted the advantages of using FSD while under the influence of alcohol or when tired, NHTSA said.
Tesla’s official website also promotes conflicting messaging on the capabilities of the FSD software, the regulator said.
NHTSA has requested that Tesla revisit its communications to ensure its messaging remains consistent with FSD’s approved instructions, namely that the software provides only a driver assist/support system requiring drivers to remain vigilant and maintain constant readiness to intervene in driving.
Tesla last month unveiled the Cybercab, an autonomous-driving EV with no steering wheel or pedals. The vehicle has been promoted as a robotaxi, a self-driving vehicle operated as part of a ride-paying service, such as the one already offered by Alphabet-owned Waymo.
But Tesla’s self-driving technology has remained under the scrutiny of regulators. FSD relies on multiple onboard cameras to feed machine-learning models that, in turn, help the car make decisions based on what it sees.
Meanwhile, Waymo’s technology relies on premapped roads, sensors, cameras, radar, and lidar (a laser-light radar), which might be very costly, but has met the approval of safety regulators.

Read more
Waymo, Nexar present AI-based study to protect ‘vulnerable’ road users
waymo data vulnerable road users ml still  1 ea18c3

Robotaxi operator Waymo says its partnership with Nexar, a machine-learning tech firm dedicated to improving road safety, has yielded the largest dataset of its kind in the U.S., which will help inform the driving of its own automated vehicles.

As part of its latest research with Nexar, Waymo has reconstructed hundreds of crashes involving what it calls ‘vulnerable road users’ (VRUs), such as pedestrians walking through crosswalks, biyclists in city streets, or high-speed motorcycle riders on highways.

Read more