banner



Black Hat Researcher Shows Why Air Gaps Won't Protect Your Data

LAS VEGAS—For your most important secrets, it isn't enough to simply have layers of security. The better pick is to simply shun the internet and keep your computer safely offline behind what'southward called an air gap. But even without a connection to the internet, your secrets aren't necessarily prophylactic, as security researcher Mordechai Guri demonstrated at the Black Hat briefing.

Black Hat Bug ArtAir gaps, said Guri, are commonly considered an exotic topic. That'south mostly because it'southward by and large military organizations and governments that need to resort to such radical lengths to protect their secrets. But Guri said that's no longer the case, and more industries are employing air gaps to protect devices that store critical data on internal networks.

Guri has been working on jumping air gaps for years, compiling an impressive list of tactics. At Black Hat, Guri ran through several of his attacks, demonstrating how even layers of physical security could exist thwarted.

All the Ways to Bridge the Gap

In his near recent research, Guri attempted to extract the private cardinal to a Bitcoin wallet from an air-gapped computer. Unlike super secret submarine plans, anyone can accept a Bitcoin wallet. What'due south more, the practice of storing Bitcoin keys on isolated devices in what'southward chosen "cold storage" is, if not actually popular, at least more approachable than stealing from the Pentagon.

To do information technology, Guri created a tool called BeatCoin. Once the air-gapped machine is infected with Guri's malware, it so transmits the private key to a nearby smartphone via most-ultrasonic sound. It works considering computer speakers are capable of generating sounds outside the range of human hearing but that are nonetheless detectable with a smartphone. Considering the sounds can be detected up to ten meters from the infected computer, a microphone subconscious in the room could be used instead of a smartphone.

'No problem,' I hear you say. 'Let's only remove the speakers!' Guri calls this an audio gap, and he's also figured out how to defeat it. It's called Fansmitter, and it alternates the speed of the calculator'southward fans to change the blade pass frequency and thus leak information from the calculator. The attack tin transmit acoustic data to smartphones or listening devices within viii meters of the target computer.

'Ok, ok,' you say. 'Nosotros'll just shut off the fans or replace them with water cooling!' Guri is ahead of yous there, too. His technique is called DiskFiltration, and it uses the actuator arm within the air-gapped computer'southward spinning-platter hard bulldoze to leak data acoustically.

All of these air gap jumping methods have, and then far, relied on acoustics. And so mayhap you think that simply banning smartphones or microphones from being near the air-gapped computer would be the solution. For that scenario, Guri developed the Mosquito attack. This time, his software messes with the general-purpose input/output (GPIO) to convert figurer speakers into rudimentary microphones. The air-gapped computer transmits its secret information ultrasonically to the receiver computer.

Maybe yous tin try stripping out the microphones, speakers, and fans from your air-gapped computer. So, you can supersede the spinning platter drives with silent solid-country drives (SSDs.) Possibly that will be enough? Guri thinks otherwise, and created AirHopper to prove it. In this scenario, Guri is able to leak information electromagnetically as a radio broadcast. It works because any electric current will create EM radiation. "If we control the current in the wire, we can command the radiation in the wire, including the frequency and amplitude," Guri explains.

In this case, AirHopper attacks the monitor and monitor cable of the air-gapped computer. The monitor, past its nature, tin command the current in the monitor cable. Using that, Guri is able to push button the EM radiations in the cablevision into the FM ring, and receive the information using a smartphone with a congenital-in FM receiver.

This wasn't the only EM method Guri adult for extracting information off of air-gapped devices. Another attack he dubs GSMem uses the path between the air-gapped estimator's CPU and RAM to create a rudimentary cellular transmitter. This attack is peculiarly notable because a simple feature phone can receive the data. Guri's USBee attack can also turn any USB plug into an antenna, perfect for leaking data.

I know what you're thinking: Faraday muzzle. These are rooms or sequestered spaces designed to cake all EM transmissions going in or out. They're finer radio-costless zones. Placing your stripped-downwards computer within a Faraday muzzle is, presumably, the ultimate air gap.

Not so. Guri developed the ODINI assault for this scenario. ODINI uses the air-gapped computer's CPU cores to generate depression-frequency magnetic fields that are capable of slipping by the Faraday cage's protection.

If information technology's starting to audio dire, don't worry. Guri had ane more fob to show off at Black Hat.

"Even the most secure reckoner," Guri said," has to be connected to the main ability lines. Nosotros were able to generate some parasitic signals on the powerlines." An attacker can then tap the chief power lines for the building containing the air-gapped device and receive the signals. This attack, Guri dubbed PowerHammer.

One Important Caveat

Equally impressive every bit all of Guri'due south work is, they all carry one critical supposition that limits their effectiveness. For all them, Guri assumes that someone can get physical admission to the air-gapped computer, and be able to successfully install malware on it.

That means about of your air gaps are safety. But it's worth remembering that Stuxnet and other successful attacks accept fabricated use of infecting isolated computer systems, either with the use of confederates or targeted malware spread by concrete media.

Guri'south work, and that of other air gap researchers at previous Blackness Hat conferences, underlines an important truth in data security: A motivated attacker will eventually get to its target. By exploring how that might happen, security experts can blueprint new defenses. But that probably means that Guri and those like him will have more to prove off in hereafter presentations.

Go on reading PCMag for more Black Hat coverage.

Source: https://sea.pcmag.com/news/28793/black-hat-researcher-shows-why-air-gaps-wont-protect-your-data

Posted by: lavalliealkinew.blogspot.com

0 Response to "Black Hat Researcher Shows Why Air Gaps Won't Protect Your Data"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel