Unabhängiges Magazin für Wirtschaft und Bildung

26. April 2024

Search form

Search form

Stealing Data from disconnected Computers

Stealing Data from disconnected Computers© piqs.de/steh

Israel Researchers exfiltrated Data from isolated Computer in a new show-case. Austrian Defense Minister visits Tel Aviv in November to get more informations about the capability of Israel in Cyber Security and Defense.

Researchers from the Ben-Gurion University of the Negev (BGU) have demonstrated that an unmodified USB connected to a computer with malicious code can be used to steal data from infected and “air-gapped” computers, so current news of the Israel Homeland Security Report (IHLS). Parallel announced the Austrian Defense Minister Hans Peter Doskozil a visit to the IHLS Cyber Conference in Tel Aviv. The visit is organized by the Austrian Jewish Community, Doskozil wants to study Israels Research & Science-Programms in Cyber Security.

Transmitting sonic and ultrasonic signals
Computers may contain or interact with sensitive information, they are often “air-gapped” and in this way kept isolated and disconnected from the Internet. In recent years the ability of malware to communicate over an “air-gap” by transmitting sonic and ultrasonic signals from a computer speaker to a nearby receiver has been shown. In order to eliminate such acoustic channels, current best practice recommends the elimination of speakers (internal or external) in secure computers.

Present in every computer
The researchers, led by Mordechai Guri, developed Fansmitter, a malware that can acoustically exfiltrate data from “air-gapped” computers, even when audio hardware and speakers are not present. Their method utilizes the noise emitted from the CPU and chassis fans which are present in virtually every computer today. They show that a software can regulate the internal fans’ speed in order to control the acoustic waveform emitted from a computer.

Data from different types of computers
They demonstrated the effective transmission of encryption keys and passwords from a distance of zero to eight meters, with bit rate of up to 900 bits/hour. This method can also be used to leak data from different types of IT equipment, embedded systems, and IoT devices that have no audio hardware, but contain fans of various types and sizes. The team successfully transmitted data from “air-gapped” computer without audio hardware to a smartphone receiver in the same room.

Links

Israel Homeland Security Report/economy-red/cc, Economy Ausgabe Webartikel, 13.09.2016