Home / Tech News / I’m not even mad. That’s amazing! 7 brilliant, unorthodox hacks

I’m not even mad. That’s amazing! 7 brilliant, unorthodox hacks


Most of the time you hear about large scale hacks, it’s based on brute force attacks, or user naivety — such as a person clicking a link they shouldn’t or accidentally downloading malware. But there are also plenty of ingenious high-tech hacking methods which wouldn’t look out of place in a spy movie. Whether it’s false fingerprints or hacking drones, here are six of the most unusual and clever hacking methods we’ve heard about.

Getting past the sensors

forgot android password pin pattern

Simon Hill / Digital Trends

Your smartphone sensors could rat you out by revealing your PIN code and password to hackers, claim researchers at Singapore’s Nanyang Technological University. Utilizing machine learning and information gathered from six different smartphone sensors, they were able to unlock Android handsets with 99.5 percent accuracy within three attempts — provided that the PIN was among the 50 most common numbers. Even when this was expanded to 10,000 PIN numbers, the success rate stood at around 83 percent.

The idea of hacking different smartphone sensors is that they can reveal information which may not be immediately apparent to users — such as utilizing the ambient light sensor to discern which button is being pressed, based on how much light is being blocked.

When TVs go from smart to scheming

unorthodox hacks roundup vizio 43  m series m43 c1 ultra hd full array led smart tv 2015

We don’t necessarily think of televisions as being computers, but in the age of smart TVs, maybe we should.

Recently, security consultant Rafael Scheel of Oneconsult AG demonstrated how it’s possible for hackers to gain control of smart TV sets without having to have physical access to them to do so. Using a cheap transmitter to embed malicious commands into a rogue TV signal, Scheel was able to gain access to televisions in the vicinity of the signal.

Once the TV is compromised, it could be used to attack further devices in the home network, or simply to spy on a home’s inhabitants using the TV’s camera and microphone.

Hacking in the age of 3D printers

unorthodox hacks roundup photo3 2

At first glance, it might be harder to understand why someone would want to hack a 3D printer rather than, say, a smartphone. However, when you consider the applications of 3D printing for areas like prototyping it’s quite obvious.

In one 3D printer hack demonstration showing how secret designs could be stolen, a team of computer scientists was able to use a smartphone’s built-in sensors to measure the electromagnetic energy and acoustic waves that emanate from a 3D printer. This allowed them to gather enough data to replicate 3D printed objects with accuracy levels of up to 94 percent.

More worryingly, another team of researchers was able to use a phishing attack to gain access to the PC attached to a 3D printer, and alter its 3D model file. The result was a 3D printed drone propellor that was made to malfunction, and caused the drone to crash.

A flying hacker’s laptop

danger drone hacker laptop dangerdrone photo 1

A lot of the high profile large scale hacks have taken place from thousands of miles away — from places like North Korea. However, there is also a rise in proximity-based “over the air” attacks, in which hackers are able to gain access to other people’s devices, which are physically located nearby.

In order to carry out proximity-based attacks on local devices like set-top boxes, smartwatches, smart refrigerators and more, researchers from renowned security firm Bishop Fox have developed a flying drone-based hacking station called Danger Drone.

By using its abilities to hover and fly to get around the problem of physical access, Danger Drone could be used to carry out an attack on multiple smart devices in a victim’s home.

Your fingerprints aren’t safe