The Cyber Security Research Center at Ben-Gurion University may not be an every day name in security. But every few years, the come up in the news for finding another theoretical way to defeat air gapped security. They’ve found ways to exfiltrate data by using the sound of a computer fan, and the whirring buzz of a mechanical hard drive. These all require some pretty serious infiltration on the machine already, but conceptually they’re all fascinating.
This time, the researchers targeted a router for their Mission Impossible-style hack. On an infected router, they were able to use the LED activity lights to transmit binary data. This in turn could be picked up by an optical sensor or camera, and then read, without ever having direct access.
The most impressive part is that the rate of transmission is relatively fast, at least compared to their acoustic exfiltrations of the past. Each light is able to send at about 1 kilobit per second. In their video example with eight lights, they could send data at 8000 baud.
As I said before, the Cyber Security Research Center is all about concepts, not practicality. While this demo is really interesting and creative, it seems like if you’re able to get malicious firmware on a router, you have a wide variety of exploits to gain access to data much more effectively.
I’ll be looking forward to seeing what their next vaguely terrifying but essentially impractical exploit is down the line.
- MacOS Has Been Around Longer Than Classic Mac OS - May 24, 2018
- Jon Hildebrand – IT Origins - May 24, 2018
- Q(uestion)LC Flash | Gestalt IT Rundown: May 23, 2018 - May 24, 2018
- Pure Accelerate Live Blog – Day 2 - May 24, 2018
- Pure Accelerate Live Blog - May 23, 2018
- BONUS: Patric Palm – IT Origins - May 22, 2018
- HPE Buying Plexxi - May 21, 2018
- Random Numbers on a Raspberry Pi - May 17, 2018
- FPGAs are Coming for AI Workloads - May 17, 2018
- Patric Palm – IT Origins - May 17, 2018