Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Researchers Revive 2000s ‘Blinkenlights’ Technique to Dump Smartwatch Firmware via Screen Pixels

Researchers Revive 2000s ‘Blinkenlights’ Technique to Dump Smartwatch Firmware via Screen Pixels

Posted on December 12, 2025December 12, 2025 By CWS

Safety researchers have efficiently extracted firmware from a funds smartwatch by bringing again a 20-year-old assault technique initially used to steal information from community gadgets.

The approach, often known as “Blinkenlights,” was tailored to work with trendy TFT screens as an alternative of conventional LED indicators.

Quarkslab analysts bought an affordable smartwatch for roughly €12 from a neighborhood retailer and found it contained faux well being sensors that would not measure blood strain or observe sleep exercise.

The system used a JieLi AC6958C6 system-on-chip and communicated over Bluetooth Low Vitality, which initially appeared like a promising avenue for firmware extraction.

After analyzing the smartwatch, researchers recognized a dial parser vulnerability that did not correctly test offset boundaries.

This safety flaw allowed them to use an out-of-bounds learn situation, forcing the system to show arbitrary reminiscence content material instantly on the display.

Quarkslab analysts famous this weak point after reverse-engineering the customized dial add course of and discovering that the firmware parser didn’t validate picture offsets pointing exterior the dial’s binary information.

Smartwatch’s major system-on-chip (Supply – Quarkslab)

The researchers tried a number of extraction strategies earlier than deciding on the Blinkenlights strategy.

They first explored JieLi’s over-the-air replace characteristic however discovered it solely supported firmware uploads, not downloads.

The authentication mechanism used Bluetooth’s E1 legacy operate with hardcoded values, which researchers efficiently replicated. Nevertheless, this path proved unsuccessful for firmware extraction.

Fashionable Blinkenlights Implementation

The staff developed a customized {hardware} setup utilizing a Raspberry Pi Pico overclocked to 200 MHz to seize information despatched from the smartwatch‘s major SoC to the NV3030B display controller.

The display used a 25 MHz clock to transmit pixel information in RGB565 format, requiring high-speed sampling to seize the knowledge precisely.

Researchers soldered 0.1mm diameter wires to the display connector and used the Pico’s Programmable Enter/Output (PIO) characteristic to pattern information bits on rising clock edges.

Bluetooth’s legacy authentication mechanism based mostly on E1 (Supply – Quarkslab)

The PIO program was designed with solely two directions to keep up effectivity on the excessive sampling charge.

The captured information was saved within the Pico’s 145,000-byte buffer earlier than being transmitted to a number laptop through USB serial port.

To set off the firmware dump, researchers crafted malicious customized dials with manipulated offset values that precipitated the smartwatch to learn and show reminiscence contents past the dial’s supposed information area.

The extraction course of concerned producing a number of customized dials, every concentrating on completely different reminiscence addresses.

A particular header containing synchronization phrases (0xa5a5a5a5) and magic bytes (0xdeadbeef) was embedded in every dial to determine captured information blocks and confirm alignment.

Python scripts have been developed to automate dial era, information assortment, and firmware reconstruction from particular person reminiscence slices.

This analysis exhibits how outdated assault strategies stay efficient towards trendy embedded gadgets when mixed with inventive exploitation strategies.

A budget {hardware} strategy, costing virtually nothing past a Raspberry Pi Pico, proved extra sensible than costly logic analyzers for this particular utility.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:2000s, Blinkenlights, Dump, Firmware, Pixels, Researchers, Revive, Screen, Smartwatch, Technique

Post navigation

Previous Post: New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
Next Post: New Research Details on What Happens to Data Stolen in a Phishing Attack

Related Posts

Cloudflare Outage Traced to Emergency React2Shell Patch Deployment Cloudflare Outage Traced to Emergency React2Shell Patch Deployment Cyber Security News
Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users Linux UDisks daemon Vulnerability Let Attackers Gaining Access to Files Owned by Privileged Users Cyber Security News
Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries Cyber Security News
Windows 11 24H2 Update Hides the Password Icon in the Sign-in Options on the Lock Screen Windows 11 24H2 Update Hides the Password Icon in the Sign-in Options on the Lock Screen Cyber Security News
Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows Hackers Use .PIF Files and UAC Bypass to Drop Remcos Malware on Windows Cyber Security News
Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark