Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Researchers Revive 2000s ‘Blinkenlights’ Technique to Dump Smartwatch Firmware via Screen Pixels

Posted on December 12, 2025December 12, 2025 By CWS

Safety researchers have efficiently extracted firmware from a funds smartwatch by bringing again a 20-year-old assault technique initially used to steal information from community gadgets.

The approach, often known as “Blinkenlights,” was tailored to work with trendy TFT screens as an alternative of conventional LED indicators.

Quarkslab analysts bought an affordable smartwatch for roughly €12 from a neighborhood retailer and found it contained faux well being sensors that would not measure blood strain or observe sleep exercise.

The system used a JieLi AC6958C6 system-on-chip and communicated over Bluetooth Low Vitality, which initially appeared like a promising avenue for firmware extraction.

After analyzing the smartwatch, researchers recognized a dial parser vulnerability that did not correctly test offset boundaries.

This safety flaw allowed them to use an out-of-bounds learn situation, forcing the system to show arbitrary reminiscence content material instantly on the display.

Quarkslab analysts famous this weak point after reverse-engineering the customized dial add course of and discovering that the firmware parser didn’t validate picture offsets pointing exterior the dial’s binary information.

Smartwatch’s major system-on-chip (Supply – Quarkslab)

The researchers tried a number of extraction strategies earlier than deciding on the Blinkenlights strategy.

They first explored JieLi’s over-the-air replace characteristic however discovered it solely supported firmware uploads, not downloads.

The authentication mechanism used Bluetooth’s E1 legacy operate with hardcoded values, which researchers efficiently replicated. Nevertheless, this path proved unsuccessful for firmware extraction.

Fashionable Blinkenlights Implementation

The staff developed a customized {hardware} setup utilizing a Raspberry Pi Pico overclocked to 200 MHz to seize information despatched from the smartwatch‘s major SoC to the NV3030B display controller.

The display used a 25 MHz clock to transmit pixel information in RGB565 format, requiring high-speed sampling to seize the knowledge precisely.

Researchers soldered 0.1mm diameter wires to the display connector and used the Pico’s Programmable Enter/Output (PIO) characteristic to pattern information bits on rising clock edges.

Bluetooth’s legacy authentication mechanism based mostly on E1 (Supply – Quarkslab)

The PIO program was designed with solely two directions to keep up effectivity on the excessive sampling charge.

The captured information was saved within the Pico’s 145,000-byte buffer earlier than being transmitted to a number laptop through USB serial port.

To set off the firmware dump, researchers crafted malicious customized dials with manipulated offset values that precipitated the smartwatch to learn and show reminiscence contents past the dial’s supposed information area.

The extraction course of concerned producing a number of customized dials, every concentrating on completely different reminiscence addresses.

A particular header containing synchronization phrases (0xa5a5a5a5) and magic bytes (0xdeadbeef) was embedded in every dial to determine captured information blocks and confirm alignment.

Python scripts have been developed to automate dial era, information assortment, and firmware reconstruction from particular person reminiscence slices.

This analysis exhibits how outdated assault strategies stay efficient towards trendy embedded gadgets when mixed with inventive exploitation strategies.

A budget {hardware} strategy, costing virtually nothing past a Raspberry Pi Pico, proved extra sensible than costly logic analyzers for this particular utility.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:2000s, Blinkenlights, Dump, Firmware, Pixels, Researchers, Revive, Screen, Smartwatch, Technique

Post navigation

Previous Post: New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
Next Post: New Research Details on What Happens to Data Stolen in a Phishing Attack

Related Posts

UAC‑0099 Tactics, Techniques, Procedures and Attack Methods Unveiled Cyber Security News
CISA Shares New Threat Detections for Actively Exploited WSUS Vulnerability Cyber Security News
Hackers Attacking Remote Desktop Protocol Services from 100,000+ IP Addresses Cyber Security News
Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files Cyber Security News
Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server Cyber Security News
Microsoft Azure Faces Global Outage Affecting Services Worldwide Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25
  • CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks
  • 7 Best Security Awareness Training Platforms For MSPs in 2026
  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25
  • CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks
  • 7 Best Security Awareness Training Platforms For MSPs in 2026
  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark