Apr 18 11

passwdResearchers from Cyber-Security Research Center at Ben-Gurion University have created bridgeware that can stealthily exfiltrate data from air-gapped computers using power lines.
In their POC, a malicious code is running on a compromised computer system which has control over the power consumption by intentionally regulating the CPU utilization. In this case data is modulated, encoded, and transmitted on top of the current flow fluctuations, and then it is conducted and propagated through the power lines.
In their paper the researchers present two versions of that attack:

  • Line level power-hammering: In this attack, the attacker taps the in-home powerlines that are directly attached to the electrical outlet.
  • Phase level power-hammering: In this attack, the attacker taps the power lines at the phase level, in the main electrical service panel

Read the whole paper: PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines

written by d45id \\ tags: , , , , ,

Mrz 17 23

In this new paper title „LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED“ researchers at Ben-Gurion University Cyber Security Research Center present a method how data can be stolen with a maximum bit rate of 4000 bits per second from an isolated „air-gapped“ computer’s hard drive reading the pulses of light on the LED drive using various types of cameras and light sensors.

Find out more:
* Cameras can Steal Data from Computer Hard Drive LED Lights
* PDF version of the paper
* LED-it-GO – youtube video

written by d45id \\ tags: , , , , , ,

Mrz 15 23

A research by Mordechai Guri and Prof. Yuval Elovici from the Cyber Security Resarch Center at Ben-Gurion University found a new way for jumping the Air-Gap.

This time they are doing this by using the heat emissions and a computer’s built-in thermal sensors.

See also

written by d45id \\ tags: , , , , ,