Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Researchers Revive 2000s ‘Blinkenlights’ Technique to Dump Smartwatch Firmware via Screen Pixels

Researchers Revive 2000s ‘Blinkenlights’ Technique to Dump Smartwatch Firmware via Screen Pixels

Posted on December 12, 2025December 12, 2025 By CWS

Safety researchers have efficiently extracted firmware from a funds smartwatch by bringing again a 20-year-old assault technique initially used to steal information from community gadgets.

The approach, often known as “Blinkenlights,” was tailored to work with trendy TFT screens as an alternative of conventional LED indicators.

Quarkslab analysts bought an affordable smartwatch for roughly €12 from a neighborhood retailer and found it contained faux well being sensors that would not measure blood strain or observe sleep exercise.

The system used a JieLi AC6958C6 system-on-chip and communicated over Bluetooth Low Vitality, which initially appeared like a promising avenue for firmware extraction.

After analyzing the smartwatch, researchers recognized a dial parser vulnerability that did not correctly test offset boundaries.

This safety flaw allowed them to use an out-of-bounds learn situation, forcing the system to show arbitrary reminiscence content material instantly on the display.

Quarkslab analysts famous this weak point after reverse-engineering the customized dial add course of and discovering that the firmware parser didn’t validate picture offsets pointing exterior the dial’s binary information.

Smartwatch’s major system-on-chip (Supply – Quarkslab)

The researchers tried a number of extraction strategies earlier than deciding on the Blinkenlights strategy.

They first explored JieLi’s over-the-air replace characteristic however discovered it solely supported firmware uploads, not downloads.

The authentication mechanism used Bluetooth’s E1 legacy operate with hardcoded values, which researchers efficiently replicated. Nevertheless, this path proved unsuccessful for firmware extraction.

Fashionable Blinkenlights Implementation

The staff developed a customized {hardware} setup utilizing a Raspberry Pi Pico overclocked to 200 MHz to seize information despatched from the smartwatch‘s major SoC to the NV3030B display controller.

The display used a 25 MHz clock to transmit pixel information in RGB565 format, requiring high-speed sampling to seize the knowledge precisely.

Researchers soldered 0.1mm diameter wires to the display connector and used the Pico’s Programmable Enter/Output (PIO) characteristic to pattern information bits on rising clock edges.

Bluetooth’s legacy authentication mechanism based mostly on E1 (Supply – Quarkslab)

The PIO program was designed with solely two directions to keep up effectivity on the excessive sampling charge.

The captured information was saved within the Pico’s 145,000-byte buffer earlier than being transmitted to a number laptop through USB serial port.

To set off the firmware dump, researchers crafted malicious customized dials with manipulated offset values that precipitated the smartwatch to learn and show reminiscence contents past the dial’s supposed information area.

The extraction course of concerned producing a number of customized dials, every concentrating on completely different reminiscence addresses.

A particular header containing synchronization phrases (0xa5a5a5a5) and magic bytes (0xdeadbeef) was embedded in every dial to determine captured information blocks and confirm alignment.

Python scripts have been developed to automate dial era, information assortment, and firmware reconstruction from particular person reminiscence slices.

This analysis exhibits how outdated assault strategies stay efficient towards trendy embedded gadgets when mixed with inventive exploitation strategies.

A budget {hardware} strategy, costing virtually nothing past a Raspberry Pi Pico, proved extra sensible than costly logic analyzers for this particular utility.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:2000s, Blinkenlights, Dump, Firmware, Pixels, Researchers, Revive, Screen, Smartwatch, Technique

Post navigation

Previous Post: New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
Next Post: New Research Details on What Happens to Data Stolen in a Phishing Attack

Related Posts

SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar Cyber Security News
South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members Cyber Security News
Qualys Confirms Data Breach – Hackers Accessed Salesforce Data in Supply Chain Attack Qualys Confirms Data Breach – Hackers Accessed Salesforce Data in Supply Chain Attack Cyber Security News
SquareX Reveals AI Browsers Vulnerable to OAuth Attacks and Malware Threats SquareX Reveals AI Browsers Vulnerable to OAuth Attacks and Malware Threats Cyber Security News
10 Best Data Loss Prevention Software in 2025 10 Best Data Loss Prevention Software in 2025 Cyber Security News
Top 10 Best Autonomous Endpoint Management Tools in 2025 Top 10 Best Autonomous Endpoint Management Tools in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark