New Air-Gap Jumper Covertly Transmits Data in Hard-Drive Sounds (arstechnica.com) 83
Security researchers have found a new way to siphon data out of an infected computer even when it has been physically disconnected from the Internet -- otherwise known as "air-gap" computers -- to prevent the leakage of sensitive information it stores, reports ArsTechnica. From the article: The method has been dubbed "DiskFiltration" by its creators because it uses acoustic signals emitted from the hard drive of the air-gapped computer being targeted. It works by manipulating the movements of the hard drive's actuator, which is the mechanical arm that accesses specific parts of a disk platter so heads attached to the actuator can read or write data. By using so-called seek operations that move the actuator in very specific ways, it can generate sounds that transfer passwords, cryptographic keys, and other sensitive data stored on the computer to a nearby microphone. The technique has a range of six feet and a speed of 180 bits per minute, fast enough to steal a 4,096-bit key in about 25 minutes.
Considering that people play music (Score:4, Interesting)
Considering that people play music with floppy drives [youtube.com] then the ability to transfer information acoustically with hard drives isn't really different.
Re: (Score:3, Insightful)
Considering that people play music with floppy drives [youtube.com] then the ability to transfer information acoustically with hard drives isn't really different.
I wasn't aware of that, thank you for the link. I find things like that fascinating even if they aren't particularly useful.
A much bigger issue with this: if you can get this program onto the air-gapped machine in the first place, haven't you already compromised it? If I could load say, a flash drive, into the air-gapped system to run this program, why can't I just copy whatever data I was after?
Unrelated side issue: you know what's really broken about Slashdot? An AC post containing GNAA or the N-word
Re: (Score:2)
A much bigger issue with this: if you can get this program onto the air-gapped machine in the first place, haven't you already compromised it? If I could load say, a flash drive, into the air-gapped system to run this program, why can't I just copy whatever data I was after?
This does make these air-gapped hacks much less useful, but it could be used to exfiltrate data on an ongoing basis without having to touch the hacked air-gapped machine again after it's been compromised.
Re: (Score:2)
Yes, but now your compromise is stuck on a computer with no way off. You drop a handful of flash drives around the target's parking lot, someone plugs it in and gets the internal network pwned... then what? Put the data back on the flash drive and hope they put it back in the parking lot? But say you're a TLA and can track/activate cellphones on demand. Sure, people aren't supposed to carry the
Re: (Score:2)
A much bigger issue with this: if you can get this program onto the air-gapped machine in the first place, haven't you already compromised it?
The rules on taking data into or out of a secured location is a bit like a roach motel, you can bring things in but taking anything out is difficult. For example, I set up an air gapped system and as I recall there was little I had to do to bring in the software and source code. All I had to do was run any media through a virus check. Taking anything out meant I had to log what was taken, when, and for what reason. It came down to me just making a mental note that I would take nothing off the system, I'
The Floppotron 2.0 (Score:3)
https://www.youtube.com/watch?... [youtube.com]
Re: (Score:1)
Isn't it amazing what math can do?
Unusable (Score:1)
Nice theoretical attack, but in practise a HD that makes sounds like this is easy to spot. Just listen.
I remember fondly the drives for the C64 that made music, though.
Re: (Score:3)
Just pretend you're defragging and people won't question it.
Most people don't even understand or know half of what's going on in their computer. If the HD suddenly starts to act up, most would probably just assume that Windows is "doing its thing".
Re: (Score:1)
When Windows is "doing its thing" I usually get a blue screen.
April fools / bullshit? (Score:1)
This is some serious "Jason Bourne" hoop-jumping technology.
Re: (Score:2)
It's fucking air gapped. (Score:1)
Re: (Score:3)
USB Sticks" [blackhat.com]?
Re: (Score:2)
Network booted usb reader that mounts the stick as an nfs share.
problem solved.
Re: (Score:2)
USB? You mean a connector that could be used for keyboards, mice, printers, scanners, hard drives?
That sounds like science-fiction to me.
Posted from 1986.
pointless stupidity (Score:4, Insightful)
Of course, if I am allowed to install software on an "air-gapped" computer, I can make it transfer information by anything on it that makes noise or can be lit or even via power supply. Speakers, various fans, hard drive heads, retractable optical drive tray, locator blue LED, LCD display, even the power draw....I can manipulate all of those.
There is no point to these studies, they only belabor the obvious.
Any manager that makes some security policy based on such studies should be beaten.
Re: (Score:2)
Any manager that makes some security policy based on such studies should be beaten.
What's wrong with building a windowless soundproof Faraday cage 500 feet underground? I'd like to see the seismographer that can read through that.
Much more stupid than that.. (Score:3)
'Honest boss, I was sure the computer was secure! How was I to know the high sensitivity microphone pointed at it a few feet away, with a wire running out to the van outside and the stranger asking us to all be very VERY quiet for the next hour was a problem?'
Yes, this 'research' is pure stupidity because the methods are obvious as well as being easily mitigated if you really NEED security.
Although its not quite as stupid as the actually false and incorrect claim of using pixels to an infiltrated monitor w
Re: (Score:1)
Not to mention the obvious workaround, USE A SSD. sigh.
Re: (Score:2)
'Honest boss, I was sure the computer was secure! How was I to know the high sensitivity microphone pointed at it a few feet away, with a wire running out to the van outside and the stranger asking us to all be very VERY quiet for the next hour was a problem?'
And this goes back to rule 1 of computer security. If you don't have physical security on sensitive machines, you're screwed.
Re: (Score:2)
it would need to have its own power supply, if malicious code installed beforehand the power draw can be used to communicate.
By the way, what function does this isolated computer perform? how do people use it?
Re: (Score:1)
it would need to have its own power supply
You're right, I forgot. Use geothermal from even deeper underground. TNX!
By the way, what function does this isolated computer perform?
Solitaire [microsoft.com]. What else is there?
Re: (Score:2)
as long as it plays solitaire with itself that's fine, if there's a human down there needing supplies from the surface that's a possible security hole
Re: (Score:2)
While true, it highlights a problem: Air-gaping a system is no silver bullet against spying. Managers who think it is should be beaten, too.
Re: (Score:3)
No system is foolproof. The idea is to make it harder to crack than is worthwhile for most people to bother with.
If you put a security system on your home, it's not because you think there aren't criminals out there who can disable them, it's because you're going to make yourself a difficult enough target that people are less likely to bother.
Digital security is much the same. There is no system that can't be compromised, not even an air-gapped system; however you can make it ridiculously difficult that f
Re: (Score:2)
but the prerequisite for this particular waste of time exercise was allowing the installation of malicious code. You can secure all you want, and then if you allow someone to do that final step of putting in bad code, well guess what..
Re: (Score:2)
you're confused, the problem here is allowing installation of malicious code. If that happens of course there is no security and all bets are off. Report for your beating.
Re: (Score:2)
Haven't you ever done something for the "cool" factor? How about because you wanted to know how something was done?
To only read about other people doing stuff and choosing not to do it because it has already been done seems like a pretty boring way to live life...
Re: (Score:2)
problem is this things are too trivial to code to even be "cool"
Re: (Score:2)
Glad you don't work in security.
Joke's on you. He works in IoT security...
Re: (Score:2)
Of course, if I am allowed to install software on an "air-gapped" computer, I can make it transfer information by anything on it that makes noise or can be lit or even via power supply. Speakers, various fans, hard drive heads, retractable optical drive tray, locator blue LED, LCD display, even the power draw....I can manipulate all of those. There is no point to these studies, they only belabor the obvious.
Where does the border between obvious and sci-fantasy (enhance, enhance, enhance) go? If my "airgap" server is next to my normal server in the same rack, can they communicate using power draw? Heat cycles, one server heating up the other? Vibration causing HDD read errors? Can I run the cables down the same canal or can you use crosstalk to steal information? Maybe I have an alarm system with motion detection and a microphone to detect movement/noise in my "top secret" room, despite the machine having no sp
Re: (Score:2)
How about, being able to figure out what is going on in another VM guest or on the host by paying close attention to how much guest resources are throttled/scheduled in the VM?
Re: (Score:1)
Re: (Score:2)
By that measure there is no such thing as an air gap, since it is impossible to construct a computer that contains no programming from some other source.
Step G: Whig is outraged by News-Paper Headline (Score:2)
Re: faraday cage, SSD and blasting gwar soundtrack (Score:2)
Clicky-clacky white noise (Score:2)
Play clicky-clacky-white noise in your server room to confuse any microphone.
Trivial to thwart. (Score:3)
Wont work with my SSD. and honestly will not work at all on SAS drives. most places that are serious about their computing and security uses thin clients running SSD boot drives and the rack of servers are all the workstations. good luck recording the drive noises with all those fans and the libert unit running.
It may work if a target's cheap laptop is set on top of the microphone.
Re: (Score:2)
Ah, yes - we have a Liebert in the bedroom to drown out our deaf neighbour watching QVC!
Very interesting (Score:2)
Well, very interesting were it not for the prevalence of solid-state disks with, oh, the horror, neither plates nor mechanical arms to produce sound with.
Score another point (Score:2)
Re: (Score:2)
for solid state drives. They are completely quiet.
All SSDs whine to some extent. The one I have in my laptop sounds like a regular HDD in a quiet room, and it definitely varies as data is written.
Re: (Score:2)
I would suspect the vast majority of computers that would be targeted would not have speakers. They're not going to be playing music or youtube videos on an air-gapped computer. Playing on a speaker is pointless.
This method of listening to hard drive reminds me of old spy techniques I've read about such as:
a) recording the sound a printer makes and using it to determine what was printed.
b) by pointing a laser at a window you can "listen" to what is going on inside by tracking how much the window flexes wi
Meh (Score:2)
Interesting proof-of-concept, but ridiculously impractical in the real world.
Is it that hard? (Score:2)
Re: (Score:1)
Yes, that's how you get the initial infection. Now assuming you want data from the airgapped system, you need a way to extract that data. Maybe improvise an open-air modem with some form of sound generation on the airgapped system and a microphone on a nearby internet accessible system that you have already compromised?
What about RAID? What about server room noise? (Score:2)
Re: (Score:2)
Interestingly enough... we have one overloaded UPS so when we RDPed into it the UPS sounded its alarm. It would be really slow but you could definitely hear the UPS alarm over the 20 servers. Just increase the power draw on 10 servers you don't mind shortening the life of to overload a UPS. I bet people don't think to secure their UPS and leave it on "Default" to sound an audio alarm. One more attack vector.
That being said the best advice I ever read was that there are two kinds of attackers "Mossad a
Limited usability? (Score:2)
Ya but... (Score:2)
Not news (Score:1)
If you are air-gapped for security reasons, you are also aware of other ways to exfiltrate information through the environment and through personnel and are taking precautions appropriate for your situation.
If you aren't, you are doing it wrong.
Important Question... (Score:2)