Monday, March 20, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
Ransomware Report
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Tri Counties Bank cyber attack

    Tri Counties Bank Cyber Attack: Customers Data At Risk After BlackBasta Ransomware Group Lists It Among Victims

    Microsoft Outlook Vulnerability

    Microsoft Outlook Zero Day Vulnerability Actively Exploited

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    Gamekaking Data Breach

    Gamekaking Data Breach? Leakbase Claims to Upload 19 Million Rows of Stolen Information

    Medusa Ransomware Group

    Medusa Ransomware Group Targets National Institute of Ocean Technology

    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Clop Ransomware Group Adds Hitachi Energy

    Hitachi Energy Confirms Security Incident After Clop Ransomware Adds it to Victim List

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Cyble Among Top 50 Emerging Companies

    Cyble Among Top 50 Emerging Companies Across Governance Risk & Compliance Solutions Sector

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Tri Counties Bank cyber attack

    Tri Counties Bank Cyber Attack: Customers Data At Risk After BlackBasta Ransomware Group Lists It Among Victims

    Microsoft Outlook Vulnerability

    Microsoft Outlook Zero Day Vulnerability Actively Exploited

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    Gamekaking Data Breach

    Gamekaking Data Breach? Leakbase Claims to Upload 19 Million Rows of Stolen Information

    Medusa Ransomware Group

    Medusa Ransomware Group Targets National Institute of Ocean Technology

    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Clop Ransomware Group Adds Hitachi Energy

    Hitachi Energy Confirms Security Incident After Clop Ransomware Adds it to Victim List

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Cyble Among Top 50 Emerging Companies

    Cyble Among Top 50 Emerging Companies Across Governance Risk & Compliance Solutions Sector

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

Taking Control of the Human Mind: How Close are Hackers to Brainjacking?  

Avantika Chopra by Avantika Chopra
November 13, 2022 - Updated on November 22, 2022
in Features, Main Story
0
Brainjacking
590
SHARES
3.3k
VIEWS
Share on LinkedInShare on Twitter
Listen to this story

At the age of 16, British filmmaker Christopher Nolan fantasized about the art of mind control. It took him almost ten years to pen down his vision and bring it to life with the release of the science fiction action film ‘Inception’ in 2010. The movie starring Leonardo DiCaprio kept its viewers hooked till the last minute with the make-believe concept of “dream invaders” who stole the information by infiltrating the subconscious of their targets. The film’s ingenuity won praise worldwide and brought into perspective the unexplored possibility of hijacking the human mind.

In the form of illusions, hypnosis or machines, experts from varied fields have imagined developing ways to stimulate and control the human mind. However, hacking the mind has equally intrigued the world of cybercrime, giving birth to “Brainjacking”.

You might also like

Unconscious Bias & Social Barriers Negatively Impact Neurodiverse Workforce in Cybersecurity

Women in Cybersecurity: 6 Lessons Learned From Running My Own Business

Four Ways Women Can Close The Gender Gap in The Cybersecurity Industry

What is brainjacking?

Brainjacking

Brainjacking — combined with the words brain and hijacking – isn’t as whimsical as one would want to believe. It can be understood as the exercise of unauthorized control of another individual’s electronic brain implant. Termed illegal, brain jacking involves hacking into the surgical implants connected to the human brain to create a brain-computer interface – direct communication between an external device and the brain’s electrical activity.

With increased cyber-attacks on the healthcare sector and the ease at which medical implants such as pacemakers and insulin pumps have been compromised, brainjacking has emerged as a new threat to target and exploit the implants technology.

The concept of facilitating human memory was proven as early as 2018. In a breakthrough study published in the Journal of Neural Engineering, a team of researchers was able to boost the ability of individuals to create memories. The experts worked with human volunteers, and extracted-encoding electrical signals for the study as the subject performed a memory chore. On re-injecting the signals, the performance was boosted by almost 37%.

“This is the first time scientists have been able to identify a patient’s brain cell code or pattern for memory and, in essence, ‘write in’ that code to make existing memory work better, an important first step in potentially restoring memory loss,” lead author Robert Hampson at Wake Forest Baptist stated in the report.

To understand the severity of brainjacking, it is essential to know how hackers can exploit it.

Deep Brain Stimulation

The cyberpunk action film ‘Upgrade’ broadly defines the concept of deep brain stimulation (DBS), a neurological process where implanted electrodes and electrical stimulation are used to treat movement disorders. The movie follows the life of Grey Trace, an auto mechanic who suffers paralysis after being shot in the neck. Struggling as a wheelchair-using quadriplegic, Trace decides to insert an artificial intelligence-based chip ‘STEM’ in his body and is finally able to regain control of his motor functions.

While DBS works on a similar concept, it is far less dramatic than the film’s plot. Often doctors use the DBS to tackle various movement disorders such as Parkinson’s disease (PD), essential tremor, dystonia, and other neurological conditions when the medicinal treatment becomes less effective, or the response is slower than expected.

In movement-related disorders, patients experience neurological conditions caused by disorganized electrical signals in that area of the brain which controls the movement. With the help of DBS, neurosurgeons can target those regions of the patient’s brain with varied stimulation to increase control. This allows them to efficiently tackle the distressing symptoms of patients as DBS disrupts the irregular signals that trigger movement disturbance.

After understanding the patient’s brain signals and movement better, doctors implant leads (wires) in the brain connected to a compact electrical generator, known as the neurostimulator, inserted and placed under the collarbone. It is through this system that pluses of electric current are passed through the neurostimulator to the patient’s brain.

However, gaining access and control of the human brain with wireless stimulators may have severe consequences when exploited with malicious intent.

The darker side of DBS

Most sci-fi and animation fans would agree that great discoveries, in the hands of a malicious actor, often lead to evil outcomes, whether it was Mojo Jojo from The PowerPuff Girls, Doctor Octopus in Spiderman or Thanos in Avengers: Infinity Wars, who nearly wiped out half of the human population.

When it comes to DBS, this is precisely what experts fear. As advantageous as the treatment may be for patients suffering from a movement disorder, the stimulation generates endless opportunities for those intending to exploit it. In a ‘neurosecurity’ breach, a threat actor would target an individual with a neurostimulator to gain control of the device.

The growing market

In the coming future, the global market size of brain implants is expected to reach $8.29 billion by 2025 at a compound annual growth rate (CAGR) of 9.1% from 2021 to 2028, with neurological disorders being the primary drivers.

According to a market report by Grand View Research, an evident increase in neurological conditions such as Parkinson’s disease, Alzheimer’s, and epilepsy combined with a rise in awareness among people regarding the benefits of brain implants and their positive outcomes has led to the overall growth of the market.

The World Health Organization termed neurological disorders among the major causes of mortality worldwide, leading to 13.2% of deaths in developed countries and 16.8% in low- and middle-income countries, creating an urgency to incorporate long-term solutions that include spinal cord stimulators and deep brain stimulators, the report stated.

Moreover, US Brain implants have proven to play a crucial role in assisting people and providing them with providing therapeutic solutions for depression. Thus, adding relevance to the advancement in neural implants.

However, the high number of people using the implants also increases their vulnerability and susceptibility to attacks where a hacker could compromise the wireless system of the implants and harm the patient.

How hackers can take advantage

With the growing demand for neural implants worldwide, it is essential to understand how malicious actors can misuse them. A researcher by the Oxford University Functional Neurosurgery Group and cybersecurity software company Kaspersky studied existing neurostimulators and supporting infrastructure to highlight vulnerabilities that hackers could exploit.

  • Unencrypted data transfer: With the data not being encrypted, it becomes easier for hackers to access any transfer of information between the programming software, the implants, and any interlinked networks. According to the report, this vulnerability leaves not just the patient’s implant open to access but also those connected to the same infrastructure
  • Device Protection: Due to the crucial role the implant plays in the well-being of the patient, it is essential for devices and their security measures to be comfortably accessible to the physician, especially in times of emergency. Moreover, due to this aspect, the devices need to be fitted with a software ‘backdoor’ that makes them more vulnerable to attacks.
  • Exposed and insecure inter-connected infrastructure: As per the study, exposed interlinked online management platforms, often used by healthcare teams and departments, pose a serious threat to the security system as they are vulnerable to attacks and can be exploited by hackers.
  • Medical staff: Like in most organizations, it is essential to train the staff to secure critical patient information. However, the research revealed that in many medical firms, programmers installed with critical software could be easily accessed with stored passwords, had various apps downloaded on them and were used to browse the internet.

How Real is the threat?

Several movies, series, and games alike have explored the more profound and darker concept of brainjacking and how easily a hacker could gain access to the devices and manipulate them to their advance; however, despite cybersecurity vulnerabilities in neurostimulators being deemed as a potential threat, there haven’t been incidents confirming the misuse.

“Broken Hearts”, the tenth episode in the second season of the Homeland series, featured a similar concept where a hacker could assassinate the United States vice president by accessing his pacemaker and controlling his heart.

Interestingly, former Vice President Dick Cheney had gotten the wireless feature of his pacemaker implants disabled in 2007. Cheney spoke about the potential threats in an interview with CBS news in 2013. “I found it credible,” Cheney said, talking about the episode. “Because I know from the experience we had and the necessity for adjusting my own device that it was an accurate portrayal of what was possible.”

However, according to a 2022 report by American news agency United Press International, the FDA to date has not received any incidents of “deliberate or intentional compromises of medical devices due to cyber exploits.

The concept, in theory, and practice, is yet to advance to a stage where an individual’s mind can be fiddled with to the extent of distorting or wiping brain memory. So, though brain jacking isn’t Michel Gondry’s movie ‘Eternal Sunshine of the Spotless Mind’, where the couple decides to erase one another’s memory after their relationship turns sour, it sure poses a severe threat to individual autonomy in the near future.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: BrainjackingDeep Brain Stimulationneurological conditionsneurosecurityThe Cyber ExpressThe Cyber Express News
Previous Post

The Next Big Thing: How to Check WhatsApp Hack

Next Post

Hackers are Out to Pull Your Charity Strings, Warns FTC

Avantika Chopra

Avantika Chopra

Related Posts

Neurodiverse Workforce
Features

Unconscious Bias & Social Barriers Negatively Impact Neurodiverse Workforce in Cybersecurity

by Editorial
March 12, 2023
Women in Cybersecurity
Features

Women in Cybersecurity: 6 Lessons Learned From Running My Own Business

by Editorial
March 8, 2023
Gender Gap in The Cybersecurity
Features

Four Ways Women Can Close The Gender Gap in The Cybersecurity Industry

by Editorial
March 8, 2023
Mel Migriño
Features

‘Men Are Allies, Not Adversaries’

by Vishwa Pandagle
March 8, 2023
Simona Dimovski Women in Technology
Features

Designing a Different Future for Women in Technology and Cyber

by Editorial
March 8, 2023
Next Post
Cryptocurrency Prices Plummet After FTX Exchange Fall

Hackers are Out to Pull Your Charity Strings, Warns FTC

Latest Issue is Out. Subscribe Now

Women in Cybersecurity

Download Now

CRIL


Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Top 10 Cybersecurity Jobs

Categories

About The Cyber Express

The Cyber Express

Cyber Security News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing, PR & media partnerships: [email protected]

For media kit and digitals sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Events: +1 (678) 578-4140

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Tel: (678) 578-8838

Events: +1 (678) 578-4140

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cyber Security Magazine
  • Events
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.