The Cyber Security Research Center at Ben-Gurion University may not be an every day name in security. But every few years, the come up in the news for finding another theoretical way to defeat air gapped security. They’ve found ways to exfiltrate data by using the sound of a computer fan, and the whirring buzz of a mechanical hard drive. These all require some pretty serious infiltration on the machine already, but conceptually they’re all fascinating.
This time, the researchers targeted a router for their Mission Impossible-style hack. On an infected router, they were able to use the LED activity lights to transmit binary data. This in turn could be picked up by an optical sensor or camera, and then read, without ever having direct access.
The most impressive part is that the rate of transmission is relatively fast, at least compared to their acoustic exfiltrations of the past. Each light is able to send at about 1 kilobit per second. In their video example with eight lights, they could send data at 8000 baud.
As I said before, the Cyber Security Research Center is all about concepts, not practicality. While this demo is really interesting and creative, it seems like if you’re able to get malicious firmware on a router, you have a wide variety of exploits to gain access to data much more effectively.
I’ll be looking forward to seeing what their next vaguely terrifying but essentially impractical exploit is down the line.
- Alastair Cooke – IT Origins - August 9, 2018
- Slack Buying Hipchat is Good for ChatOps - August 3, 2018
- Transcoding with My Little Cluster - August 3, 2018
- AMD Plays the Long Hygon | Gestalt IT Rundown: July 11, 2018 - July 12, 2018
- AIRI: Converging FlashBlade into an AI Reference Architecture - July 12, 2018
- 2018 MacBook Pros Comes Closer to Earning Their Name - July 12, 2018
- The Path of an IT Influencer Starts with a Single Post - July 12, 2018
- Leon Adato – IT Origins - July 10, 2018
- John Welsh – IT Origins - July 5, 2018
- Covering All Your Storage Bases - June 28, 2018