Technology

«Human Brain Piracy» to manipulate memory

If you are afraid of cyber attacks on your devices and stealing your data, it will be the least you fear. Electronic criminals are exploiting the neural devices that are implanted in the human body to steal, manipulate or change human memories. The concept of the virus will be vague to doctors in the near future, where the concept of infection can be transformed from a biological virus infection to a digital virus.

Brain Piracy

This type of digital penetration is present when penetrating deep brain stimulators. These devices, known as pulse-generating implants or nerve impulses, send electrical pulses to specific brain targets to treat disorders such as Parkinson's disease, idiopathic tremors, severe depression, and obsessive-compulsive disorder. The latest generation of these implants comes with a management software for both doctors and patients to be installed on smartphones and tablets. The connection is based on standard Bluetooth technology.

While scientists are looking at how memories can be created in the brain and how they can be targeted, restored and improved with implantable devices, gaps remain in related software and devices and should be addressed in order to prepare for future threats, according to a recent report by Kaspersky Lab, Digital and Functional Neurosurgery Group at the University of Oxford. The researchers combined practical and theoretical analyzes to explore current gaps in the implants used to stimulate the brain.

The researchers found the existing and potential risk scenarios that an attacker could exploit, including the possibility of transmitting unsafe or unencrypted data between the implant and its operating software and any associated network, by malicious manipulation of a plant or even a whole set of implants in a number of patients that are associated with the infrastructure itself. Manipulation may result in a change in settings that causes pain, paralysis or theft of private and confidential personal data of patients.

Design restrictions that give priority to patient safety at the expense of security can also be a breakthrough area where doctors must be able to control the emergency medical implant, including cases where the patient is taken to hospital away from home, Password is widely unknown among doctors. Moreover, this means that implants must be equipped with an emergency back-end software entry. Unsafe behaviors by medical staff also affect the digital security of these implants. Programmers with basic programs for this type of patient with standard or easy-to-penetrate passwords have been found.

– Memory booster implants

Scientists predict that within five years they will be able to record the electronic brain signals that build memories, and then enhance or even rewrite them, before they are returned to the brain. A decade from now, the first commercial implants that enhance memory can emerge in the market, and technology could evolve in 20 years enough to allow for a great control over memories.

These developments can lead to new threats, including manipulation of groups of individuals, through the implantation of specific memories of political events and conflicts or their scanning, while redirected electronic threats can target new opportunities for cyber espionage, theft or deletion of memories, or Even "kidnapping" for a ransom. The solution may not be merely a wireless software update of the chip or small device within the human body, but a surgical intervention that may be dangerous to the health of the patient.

– Sensitive attacks

Researchers at Kaspersky Lab have found breakthrough codes similar to those that appeared a month ago to target hot political points and sensitive government and military entities.

The researchers, who are monitoring various groups of the Russian-language threat center Turla, said the latest version of KopiLuwak malicious software was being delivered to the victims using a code similar to that used only a month ago by the hackers implementing the Zebrocy From Sofacy, another Russian-speaking threat center that has been around for a long time.

The researchers found an overlap in targeting the targets between these two dangerous entities that focus their work on such targeting.

The latest copies of Copilwak were observed in mid-2018. When researchers noticed new targets in Syria and Afghanistan, Torla used a new vector-guided vector with LNK-specific shortcut files for the Windows operating system. The analysis showed that the LNK file contains a script to decode the Kopelwak code and launch it into the target computer. The Middle East and North Africa region was one of the areas targeted by the subversive Torla subgroups in 2018, as well as parts of Western and Eastern Europe, Central and South Asia and the Americas. The researchers also found some overlap in targeting between the two threats, focusing on sensitive political targets, including government research and security agencies, diplomatic missions and military affairs, particularly in Central Asia.

– Control procedures

The company recommends that organizations, companies and institutions take the following measures to reduce the risk of victimization of advanced targeted attacks: first, to use an advanced security solution with anti-attack and threat-based technologies such as Threat Management and Defense, Giving electronic security teams a complete view of the network and automating response to threats. The second is to provide security personnel with up-to-date information on threats, which will equip them with useful tools to assist them in research on and prevention of targeted attacks, such as indicators of YARA breaches, rules and advanced threat reports.

The third is to ensure that the organization's software debugging processes are ok and to check back all system settings and best practices. Finally, if you identify early indicators of a targeted attack, managed protection services can be considered, allowing proactive detection of advanced threats and timely response response.

Tags
Show More

Nawfal Mohammed

Hello I am a student at law college and I am still studying i'M GOOG IN : Blogging, MMA fighter, Designer, Website Management, Bodybuilding, etc BUT my Hobbies :Learn languages, horseback riding, motorcycles and more

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
Close

Adblock Detected

Please consider supporting us by disabling your ad blocker