NCSC Launches 'SilentGlass,' a First-of-its-Kind Hardware Device to Prevent Cyberattacks Through Monitor Connections

UK's NCSC Unveils 'SilentGlass' Hardware to Block Malware via HDMI and DisplayPort

INFORMATIONAL
April 24, 2026
April 27, 2026
4m read
Security OperationsOtherIndustrial Control Systems

Related Entities(initial)

Products & Tech

SilentGlass

Other

Goldilock LabsSony UK

Full Report(when first published)

Executive Summary

The UK's National Cyber Security Centre (NCSC), part of GCHQ, has announced the commercial launch of its first hardware product, a security device named SilentGlass. This plug-and-play gadget is a hardware-based data diode designed to protect against cyberattacks transmitted through video display cables. Available for both HDMI and DisplayPort connections, SilentGlass physically blocks any non-video data from passing between a computer and its monitor, effectively preventing malware injection or data exfiltration through the display interface. The NCSC developed the intellectual property and has licensed it to the UK firm Goldilock Labs for manufacturing and global sales, in partnership with Sony UK. The device, already deployed in high-security UK government environments, is now being made available commercially to protect critical infrastructure and other organizations handling highly sensitive data.

Product Overview

Product Name: SilentGlass Developer: UK National Cyber Security Centre (NCSC) Commercial Partner: Goldilock Labs Function: A threat-agnostic hardware data diode for video connections. Interfaces: HDMI and DisplayPort.

SilentGlass works by sitting inline between a computer's video output and the monitor's input. It physically ensures that only a one-way flow of video signal can occur, blocking any bidirectional communication or covert data channels that could be used to compromise the monitor's firmware or exfiltrate data from the display's internal processors. The NCSC states that while such attacks are not common, modern displays are complex computing devices in their own right, making them an "attractive target" for sophisticated state-sponsored espionage actors.

Threat Model Addressed

The device is designed to mitigate a specific and advanced threat vector:

  • Malware Injection: An attacker could potentially compromise a monitor's firmware to deliver malware to a connected computer. SilentGlass prevents the monitor from sending any data back to the PC.
  • Data Exfiltration / Eavesdropping: Advanced adversaries could attempt to exfiltrate data by manipulating the video signal itself (a form of steganography) or by compromising the monitor to capture and transmit screen content. SilentGlass's one-way enforcement helps mitigate these risks.
  • Firmware Manipulation: It prevents a compromised computer from maliciously flashing the monitor's firmware with spyware.

This type of attack is most relevant in high-security environments (government, defense, intelligence) where even the most obscure attack surfaces must be protected. The commercial release indicates a desire to provide this level of protection to critical national infrastructure and other high-value private sector targets.

Impact Assessment

The immediate impact of SilentGlass is the availability of a niche but powerful security control for organizations with extreme security requirements. It provides a physical, verifiable guarantee against a class of hardware-level attacks that software defenses cannot address. For government agencies and critical infrastructure operators, this can help secure air-gapped or highly sensitive systems from advanced threats. The commercialization of NCSC-developed technology also represents a new model for government cybersecurity agencies to transition research into tangible products for the wider market, potentially raising the defensive baseline for key industries.

Deployment and Use Cases

  • High-Security Government: Protecting workstations used by officials with access to classified information.
  • Critical Infrastructure: Securing operator consoles in industrial control system (ICS) environments, such as power plants or water treatment facilities.
  • Financial Services: Safeguarding trading floor terminals or systems handling sensitive financial data.
  • R&D Labs: Protecting intellectual property on researcher workstations.

As a plug-and-play device, deployment is straightforward, requiring no software installation or complex configuration.

Mitigation Strategy

SilentGlass is itself a mitigation. It falls under the category of hardware-based security controls that enforce network segmentation and data flow policies at a physical level.

  • Data Diode: It functions as a unidirectional security gateway, a well-established principle for protecting secure networks. This is a form of Network Isolation.
  • Hardware Security: It addresses threats at the hardware layer (Layer 1 of the OSI model), which is often a blind spot for traditional cybersecurity tools. This aligns with D3FEND's IO Port Restriction, as it restricts the capabilities of the DisplayPort/HDMI IO ports to video-out only.

Timeline of Events

1
April 24, 2026
This article was published

Article Updates

April 27, 2026

New article provides deeper technical analysis of NCSC's SilentGlass, detailing how it blocks HPD and I2C/DDC bus exploitation, and linking it to MITRE ATT&CK T1200 for hardware-based cyber threats.

MITRE ATT&CK Mitigations

The device itself is a hardware control that limits the functionality of I/O ports (HDMI/DisplayPort) to prevent bidirectional data flow.

Mapped D3FEND Techniques:

SilentGlass acts as a micro-segmentation device or data diode, isolating the computer from the monitor's compute capabilities.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

SilentGlass is a physical implementation of the IO Port Restriction defensive technique, specifically tailored for video ports. For organizations handling highly sensitive information, such as defense contractors, intelligence agencies, or critical infrastructure operators, deploying this device provides a high-assurance countermeasure against an often-overlooked threat vector. The recommendation is to deploy SilentGlass on any workstation that processes classified or business-critical information. This includes operator consoles in SCADA environments, analyst workstations, and executive laptops. By physically preventing any data from being sent from the monitor back to the computer, it effectively neutralizes threats like compromised monitor firmware (e.g., BadUSB-style attacks over HDMI) or advanced data exfiltration techniques that leverage the display's internal hardware. It should be part of a defense-in-depth strategy for securing endpoints in high-threat environments.

Sources & References(when first published)

NCSC's first gadget blocks malware transfer over HDMI cables
The Register (theregister.com) April 23, 2026
NCSC launches SilentGlass to combat display cyberattacks
SC Magazine (scmagazine.com) April 24, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Hardware SecurityNCSCGCHQData DiodeHDMIDisplayPortSilentGlass

📢 Share This Article

Help others stay informed about cybersecurity threats