Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 15 submissions in the queue.
posted by chromas on Saturday April 14 2018, @01:23AM   Printer-friendly
from the about-that-thing-you-thought-was-air-gapped... dept.

El Reg reports:

Data exfiltrators send info over PCs' power supply cables

Malware tickles unused cores to put signals in current

If you want your computer to be really secure, disconnect its power cable.
So says Mordechai Guri and his team of side-channel sleuths at the Ben-Gurion University of the Negev.

The crew have penned a paper titled PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines that explains how attackers could install malware that regulates CPU utilisation and creates fluctuations in the current flow that could modulate and encode data. The variations would be "propagated through the power lines" to the outside world.

Depending on the attacker's approach, data could be exfiltrated at between 10 and 1,000 bits-per-second. The higher speed would work if attackers can get at the cable connected to the computer's power supply. The slower speed works if attackers can only access a building's electrical services panel.

The PowerHammer malware spikes the CPU utilisation by choosing cores that aren't currently in use by user operations (to make it less noticeable).

Guri and his pals use frequency shift keying to encode data onto the line.

After that, it's pretty simple, because all the attacker needs is to decide where to put the receiver current clamp: near the target machine if you can get away with it, behind the switchboard if you have to.

This seems hinky to me.

First, there's the point that the bad guys will need PHYSICAL ACCESS to the premises or even to the individual machine.

Next, if the current clamp is put around the typical line cord, the sum of the current in the hot wire and the neutral (return) wire will be zero. (An inductive current sensor is typically put over only one of the wires, so they will need to do some surgery on that cable — which will be obvious.)

Putting a 100% online UPS between the computer and the AC power supply will also interfere. [ed.]


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by jmorris on Saturday April 14 2018, @08:00PM

    by jmorris (4844) on Saturday April 14 2018, @08:00PM (#667008)

    Has anyone looked at a modern switch mode power supply? So these guys claim you can take 60hz AC on the input, filter, "condition" and PF correct it, rectify and filter it again, drive that into a 50KHz or higher switch mode regulator, filter it some more and still drive a readable 1KHz signal back out from that? They might find a dodgy supply that is somehow coupling noise from the DC outputs into the mains improperly, but driving a 1KHz signal directly back through the supply? Oh Hell no.

    And that is ignoring the UPS systems (which always feature yet more high frequency transient suppression) and other power conditioning any military installation will be running, up to and including protection against EMP and more mundane threats like the shitty power coming from diesel generators when a unit is in the field. And even fixed locations will have a genset for operation during emergencies when the utility power won't be available so any competent facilities management will include overkill power conditioning. Hello, government contracting.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2