Stories
Slash Boxes
Comments

SoylentNews is people

posted by LaminatorX on Thursday October 30 2014, @12:00PM   Printer-friendly
from the tempest-in-an-airgap dept.

Security researchers at Ben-Gurion University in Israel have found a way to lift data from closed networks using little more than a standard computer monitor and FM radio waves. It's a pretty clever trick: researchers have created a keylogging app called AirHopper that can transmit radio frequencies by exploiting the PC's display. A companion app on an FM-equipped smartphone can decode those transmissions and record the host machine's keystrokes in real-time.

It's not the first time FM radio waves have been used to smuggle data out of an air gap network, but this method can be done without PC connected speakers and without either device being connected to an outside network. Like previous methods, it has a fairly short range (about 7 meters) and can't transmit more than a few bytes a second, but that's more than enough to nab passwords or other sensitive text data. The group has already released a short video of the exploit in action, and intends to publish a more detailed paper on the subject at Malcon 2014 later this week.

http://cyber.bgu.ac.il/content/how-leak-sensitive-data-isolated-computer-air-gap-near-mobile-phone-airhopper

http://www.engadget.com/2014/10/29/fm-data-leaking/

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 1) by jmorris on Thursday October 30 2014, @06:41PM

    by jmorris (4844) on Thursday October 30 2014, @06:41PM (#111630)

    The whole point of an airgap is to keep things from crossing. This method would work to get information out but only after the cybercooties first get in to infect the system to cause it to begin logging keystrokes and emitting them to a nearby smartphone. Once infected there are simply too many ways to leak information to ever plug em all. Put the CPU clock in/out of power saving modes, idle the various busses in detectable patterns, or this one of dropping patterns into the display's stream. The way to stop them all though is not letting the attacker get executable code on your secure systems in the first place. Once you have given em root trying to stop the outbound paths is whack-a-mole(tm).