March 5, 2015 By Shane Schick 2 min read

In an age of streaming services such as Netflix and Hulu, it’s easy to forget many people watch Blu-ray Discs — and it’s even easier to overlook the technology as a potential target for malware.

At the recent Securi-Tay conference held in Scotland, a researcher from consultancy firm NCC Group presented evidence that attackers could use two vulnerabilities in common Blu-ray systems to inject malware and steal user data.

According to the firm’s blog, the NCC researcher demonstrated how a flaw in an application called PowerDVD could be breached and how an embedded system at the hardware level could potentially provide root access.

Consumers could be completely oblivious to these types of attacks, PCWorld pointed out, because those exploiting the vulnerabilities could create a Blu-ray disc that plays real content while it figures out which flaw offers the best attack vector. This is not unlike similar attempts to commit cybercrime via CDs and other forms of removable media.

Of course, Blu-ray software and hardware do come with some security safeguards, but in this case, the exploits would potentially let cybercriminals overcome Microsoft Windows’ auto-run prevention, according to TechWorm. There are other features to safeguard Blu-ray discs, but in some cases, such as PowerDVD, they may not have been updated for more than five years.

It should be pointed out that there is no sense that anyone has actually distributed malware via these Blu-ray system vulnerabilities and that what has been discovered was done through ethical hacking to educate security professionals. In fact, as SC Magazine suggested, many users of Blu-ray products may not realize the extent to which they are more digitally connected and, therefore, more open to attack.

The Register, however, noted that other ways to break into Blu-ray systems via digital rights management controls were revealed just a few months ago. Perhaps more people will pay greater attention to these types of holes. The only real prevention methods, of course, are much like those suggested for warding off cyberattacks via email: Don’t accept a Blu-ray disc that looks suspicious or comes from someone you don’t know. And, of course, you could always ditch the Blu-ray system and opt for streaming movies, instead.

More from

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

DOD establishes Office of the Assistant Secretary of Defense for Cyber Policy

2 min read - The federal government recently took a new step toward prioritizing cybersecurity and demonstrating its commitment to reducing risk. On March 20, 2024, the Pentagon formally established the new Office of the Assistant Secretary of Defense for Cyber Policy to supervise cyber policy for the Department of Defense. The next day, President Joe Biden announced Michael Sulmeyer as his nominee for the role.“In standing up this office, the Department is giving cyber the focus and attention that Congress intended,” said Acting…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today