Skip to main content

I’m not even mad. That’s amazing! 7 brilliant, unorthodox hacks

hacks header
dangrytsku/Getty Images
Most of the time you hear about large scale hacks, it’s based on brute force attacks, or user naivety — such as a person clicking a link they shouldn’t or accidentally downloading malware. But there are also plenty of ingenious high-tech hacking methods which wouldn’t look out of place in a spy movie. Whether it’s false fingerprints or hacking drones, here are six of the most unusual and clever hacking methods we’ve heard about.

Getting past the sensors

Simon Hill / Digital Trends
Simon Hill / Digital Trends

Your smartphone sensors could rat you out by revealing your PIN code and password to hackers, claim researchers at Singapore’s Nanyang Technological University. Utilizing machine learning and information gathered from six different smartphone sensors, they were able to unlock Android handsets with 99.5 percent accuracy within three attempts — provided that the PIN was among the 50 most common numbers. Even when this was expanded to 10,000 PIN numbers, the success rate stood at around 83 percent.

The idea of hacking different smartphone sensors is that they can reveal information which may not be immediately apparent to users — such as utilizing the ambient light sensor to discern which button is being pressed, based on how much light is being blocked.

When TVs go from smart to scheming

We don’t necessarily think of televisions as being computers, but in the age of smart TVs, maybe we should.

Recently, security consultant Rafael Scheel of Oneconsult AG demonstrated how it’s possible for hackers to gain control of smart TV sets without having to have physical access to them to do so. Using a cheap transmitter to embed malicious commands into a rogue TV signal, Scheel was able to gain access to televisions in the vicinity of the signal.

Once the TV is compromised, it could be used to attack further devices in the home network, or simply to spy on a home’s inhabitants using the TV’s camera and microphone.

Hacking in the age of 3D printers

At first glance, it might be harder to understand why someone would want to hack a 3D printer rather than, say, a smartphone. However, when you consider the applications of 3D printing for areas like prototyping it’s quite obvious.

In one 3D printer hack demonstration showing how secret designs could be stolen, a team of computer scientists was able to use a smartphone’s built-in sensors to measure the electromagnetic energy and acoustic waves that emanate from a 3D printer. This allowed them to gather enough data to replicate 3D printed objects with accuracy levels of up to 94 percent.

More worryingly, another team of researchers was able to use a phishing attack to gain access to the PC attached to a 3D printer, and alter its 3D model file. The result was a 3D printed drone propellor that was made to malfunction, and caused the drone to crash.

A flying hacker’s laptop

A lot of the high profile large scale hacks have taken place from thousands of miles away — from places like North Korea. However, there is also a rise in proximity-based “over the air” attacks, in which hackers are able to gain access to other people’s devices, which are physically located nearby.

In order to carry out proximity-based attacks on local devices like set-top boxes, smartwatches, smart refrigerators and more, researchers from renowned security firm Bishop Fox have developed a flying drone-based hacking station called Danger Drone.

By using its abilities to hover and fly to get around the problem of physical access, Danger Drone could be used to carry out an attack on multiple smart devices in a victim’s home.

Your fingerprints aren’t safe

starbug: Ich sehe, also bin ich ... Du (english translation)

Biometric passcode systems like Touch ID are on their way out for smartphones, but fingerprint sensors will likely stick around for years before they die out completely — and that’s exactly what this next James Bond-style hack could be used to exploit.

Demonstrated at the 31st annual Chaos Computer Club convention in Hamburg, Germany, hacker Jan Krissler showed how it was possible to replicate the fingerprint of German Defense Minister Ursula von der Leyen using nothing more than a photo of her hands software called VeriFinger.

With photos taken from several different angle using a standard camera, Krissler created a full fingerprint for Von der Leyen, and then developed a mold good enough to fool a fingerprint sensor.

Using soundwaves to control a phone

Sonic Cyber Attacks on MEMS Accelerometers

Whether it’s your smartphone or your connected car, hackers may be able to access it using soundwaves. Researchers at the University of Michigan have shown that it’s possible to hack into a variety of different gadgets by using soundwaves to trigger micro-electro-mechanical systems (MEMS) accelerometers, a.k.a. the chip used to say whether a device is in motion.

Using just a cheap $5 speaker to blast sound at different frequencies was able to cause devices to perform a range of actions, such as showing a video, starting an app, or even potentially start up a vehicle. While this would only have limited application from short range, it’s pretty disconcerting to imagine a device being hacked using an off-the-shelf speaker.

Luke Dormehl
I'm a UK-based tech writer covering Cool Tech at Digital Trends. I've also written for Fast Company, Wired, the Guardian…
The best portable power stations
EcoFlow DELTA 2 on table at campsite for quick charging.

Affordable and efficient portable power is a necessity these days, keeping our electronic devices operational while on the go. But there are literally dozens of options to choose from, making it abundantly difficult to decide which mobile charging solution is best for you. We've sorted through countless portable power options and came up with six of the best portable power stations to keep your smartphones, tablets, laptops, and other gadgets functioning while living off the grid.
The best overall: Jackery Explorer 1000

Jackery has been a mainstay in the portable power market for several years, and today, the company continues to set the standard. With three AC outlets, two USB-A, and two USB-C plugs, you'll have plenty of options for keeping your gadgets charged.

Read more
CES 2023: HD Hyundai’s Avikus is an A.I. for autonomous boat and marine navigation
Demonstration of NeuBoat level 2 autonomous navigation system at the Fort Lauderdale International Boat Show

This content was produced in partnership with HD Hyundai.
Autonomous vehicle navigation technology is certainly nothing new and has been in the works for the better part of a decade at this point. But one of the most common forms we see and hear about is the type used to control steering in road-based vehicles. That's not the only place where technology can make a huge difference. Autonomous driving systems can offer incredible benefits to boats and marine vehicles, too, which is precisely why HD Hyundai has unveiled its Avikus AI technology -- for marine and watercraft vehicles.

More recently, HD Hyundai participated in the Fort Lauderdale International Boat Show, to demo its NeuBoat level 2 autonomous navigation system for recreational boats. The name mashes together the words "neuron" and "boat" and is quite fitting since the Avikus' A.I. navigation tech is a core component of the solution, it will handle self-recognition, real-time decisions, and controls when on the water. Of course, there are a lot of things happening behind the scenes with HD Hyundai's autonomous navigation solution, which we'll dive into below -- HD Hyundai will also be introducing more about the tech at CES 2023.

Read more
This AI cloned my voice using just three minutes of audio
acapela group voice cloning ad

There's a scene in Mission Impossible 3 that you might recall. In it, our hero Ethan Hunt (Tom Cruise) tackles the movie's villain, holds him at gunpoint, and forces him to read a bizarre series of sentences aloud.

"The pleasure of Busby's company is what I most enjoy," he reluctantly reads. "He put a tack on Miss Yancy's chair, and she called him a horrible boy. At the end of the month, he was flinging two kittens across the width of the room ..."

Read more