Welcome, Guest

 or  Register
NewsFeed

Mosquito Attack Allows Air-Gapped Computers to Covertly Exchange Data - works by reversing connected speakers into micr
#1
Mosquito Attack Allows Air-Gapped Computers to Covertly Exchange Data - the new technique works by reversing connected speakers into microphones

snip:

The team of security researchers—who last month demonstrated how attackers could steal data from air-gapped computers protected inside a Faraday cage—are back with its new research showing how two (or more) air-gapped PCs placed in the same room can covertly exchange data via ultrasonic waves.
Air-gapped computers are believed to be the most secure setup wherein the systems remain isolated from the Internet and local networks, requiring physical access to access data via a USB flash drive or other removable media.

Dubbed MOSQUITO, the new technique, discovered by a team of researchers at Israel's Ben Gurion University, works by reversing connected speakers (passive speakers, headphones, or earphones) into microphones by exploiting a specific audio chip feature.

Two years ago, the same team of researchers demonstrated how attackers could covertly listen to private conversations in your room just by reversing your headphones (connected to the infected computer) into a microphone, like a bug listening device, using malware.

Now, with its latest research [PDF https://arxiv.org/pdf/1803.03422.pdf], the team has taken their work to the next level and found a way to convert some speakers/headphones/earphones that are not originally designed to perform as microphones into a listening device—when the standard microphone is not present, muted, taped, or turned off.





https://thehackernews.com/2018/03/air-ga...cking.html
If society fell apart, we - the people would build a new one. Most people are good at their core, and when we see things that are wrong we work to fix them together. Make friends with your neighbors, get involved with your community - because we will rebuild our lives, our communities, from horrible circumstances we always will.
FoShizzle  likes this!
Reply Share
#2
Intel Vpro AMT computers use infrasound and the high definition audio for some of their "out of band" networking.

If your computer has High Definition audio, don't trust it.

It's not for you, you can't hear high def audio.

Chuckle
FoShizzle, Karu, Mmmkay_Ultra  likes this!
Reply Share
#3
(03-13-2018, 02:50 PM)Luvapottamus Wrote: Intel Vpro AMT computers use infrasound and the high definition audio for some of their "out of band" networking.

If your computer has High Definition audio, don't trust it.

It's not for you, you can't hear high def audio.

Chuckle

snip:

It's not the first time when Ben-Gurion researchers have come up with a covert technique to target air-gapped computers. Their previous research of hacking air-gap computers include:

aIR-Jumper attack steals sensitive data from air-gapped PCs with the help of infrared-equipped CCTV cameras that are used for night vision.

USBee can be used to steal data from air-gapped computers using radio frequency transmissions from USB connectors.

DiskFiltration can steal data using sound signals emitted from the hard disk drive (HDD) of air-gapped computers.

BitWhisper relies on heat exchange between two computers to stealthily siphon passwords and security keys.

AirHopper turns a computer's video card into an FM transmitter to capture keystrokes.

Fansmitter technique uses noise emitted by a computer fan to transmit data.

GSMem attack relies on cellular frequencies.
If society fell apart, we - the people would build a new one. Most people are good at their core, and when we see things that are wrong we work to fix them together. Make friends with your neighbors, get involved with your community - because we will rebuild our lives, our communities, from horrible circumstances we always will.
Luvapottamus  likes this!
Reply Share
#4
(03-13-2018, 03:07 PM)Karu Wrote:
(03-13-2018, 02:50 PM)Luvapottamus Wrote: Intel Vpro AMT computers use infrasound and the high definition audio for some of their "out of band" networking.

If your computer has High Definition audio, don't trust it.

It's not for you, you can't hear high def audio.

Chuckle

snip:

It's not the first time when Ben-Gurion researchers have come up with a covert technique to target air-gapped computers. Their previous research of hacking air-gap computers include:

aIR-Jumper attack steals sensitive data from air-gapped PCs with the help of infrared-equipped CCTV cameras that are used for night vision.

USBee can be used to steal data from air-gapped computers using radio frequency transmissions from USB connectors.

DiskFiltration can steal data using sound signals emitted from the hard disk drive (HDD) of air-gapped computers.

BitWhisper relies on heat exchange between two computers to stealthily siphon passwords and security keys.

AirHopper turns a computer's video card into an FM transmitter to capture keystrokes.

Fansmitter technique uses noise emitted by a computer fan to transmit data.

GSMem attack relies on cellular frequencies.

Lots of agencies are doing it, I've had mine attacked, and I'm not a valuable target in any way.

Chuckle

But I've seen it done to my machines.

One day I shut down my LINIX box, and the PowerPc Mac across the room turned off at the same time.

Lmao
Karu  likes this!
Reply Share

Post Thread  Back To Forum
[-]
Quick Reply
Message
Type your reply to this message here.

Please select the number: 10
1 2 3 4 5 6 7 8 9 10