Security researchers demonstrate AirHopper, leak data from isolated networks

Ink

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
Think your completely isolated, internet-disconnected "air gap" computer network is secure from wireless infiltration? Think again -- security researchers at Ben-Gurion University in Israel have found a way to lift data from closed networks using little more than a standard computer monitor and FM radio waves. It's a pretty clever trick: researchers have created a keylogging app called AirHopper that can transmit radio frequencies by exploiting the PC's display. A companion app on an FM-equipped smartphone can decode those transmissions and record the host machine's keystrokes in real-time.

Via Engadget (Security researcher uses radio frequencies to smuggle data out of isolated network)

Yes, from the computer screen. Still, this is the first time that a mobile phone is considered in an attack model as the intended receiver of maliciously crafted radio signals emitted from the screen of the isolated computer. AirHopper demonstrates how textual and binary data can be exfiltrated from physically a isolated computer to mobile phones at a distance of 1-7 meters, with effective bandwidth of 13-60 Bps (Bytes per second). Enough to steal a secret password.

See more at: http://cyber.bgu.ac.il/content/how-...-computer-air-gap-near-mobile-phone-airhopper

Cyber Security Labs @ Ben Gurion University
How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone - AirHopper


MALCON 2014 - http://www.malwareconference.org/index.php/en/
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top