Stories
Slash Boxes
Comments

SoylentNews is people

posted by LaminatorX on Thursday October 30 2014, @12:00PM   Printer-friendly
from the tempest-in-an-airgap dept.

Security researchers at Ben-Gurion University in Israel have found a way to lift data from closed networks using little more than a standard computer monitor and FM radio waves. It's a pretty clever trick: researchers have created a keylogging app called AirHopper that can transmit radio frequencies by exploiting the PC's display. A companion app on an FM-equipped smartphone can decode those transmissions and record the host machine's keystrokes in real-time.

It's not the first time FM radio waves have been used to smuggle data out of an air gap network, but this method can be done without PC connected speakers and without either device being connected to an outside network. Like previous methods, it has a fairly short range (about 7 meters) and can't transmit more than a few bytes a second, but that's more than enough to nab passwords or other sensitive text data. The group has already released a short video of the exploit in action, and intends to publish a more detailed paper on the subject at Malcon 2014 later this week.

http://cyber.bgu.ac.il/content/how-leak-sensitive-data-isolated-computer-air-gap-near-mobile-phone-airhopper

http://www.engadget.com/2014/10/29/fm-data-leaking/

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by kaszz on Thursday October 30 2014, @01:43PM

    by kaszz (4211) on Thursday October 30 2014, @01:43PM (#111508) Journal

    Perhaps it's time to invest in shielded walls?

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Thursday October 30 2014, @02:11PM

    by Anonymous Coward on Thursday October 30 2014, @02:11PM (#111514)

    "Perhaps it's time to invest in shielded walls?"

    That's only part of the solution. But knowing is 1/2 the battle ------- GI JOE!

  • (Score: 2) by bob_super on Thursday October 30 2014, @03:45PM

    by bob_super (1357) on Thursday October 30 2014, @03:45PM (#111555)

    I can't remember if it was the CIA or the NSA which had their whole building enclosed in a Faraday cage...

    • (Score: 2) by kaszz on Thursday October 30 2014, @04:46PM

      by kaszz (4211) on Thursday October 30 2014, @04:46PM (#111578) Journal

      Just shows what's needed..

    • (Score: 2) by urza9814 on Monday November 03 2014, @04:36PM

      by urza9814 (3954) on Monday November 03 2014, @04:36PM (#112653) Journal

      I can't remember if it was the CIA or the NSA which had their whole building enclosed in a Faraday cage...

      Sounds like that won't really help in this case. It says it has a seven meter range, which means your receiver will need to be inside the same building (and therefore inside the Faraday cage). So you infect the super secure PC, and you infect the FM-capable smartphone of the guy who works on it -- or the guy down the hall or downstairs. Then the worker goes outside and connects the same smartphone to an outside network and you use that to pass the data along.

      Problem number one -- how do you coordinate infecting the right systems?
      Problem two -- who the hell has a smartphone with an FM receiver these days?
      Problem three -- last time I saw an FM receiver on a phone, the headphones were used as the antenna. No headphones, no reception.