Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack

被引:29
|
作者
Guri, Mordechai [1 ]
Monitz, Matan [1 ]
Elovici, Yuval [1 ]
机构
[1] Ben Gurion Univ Negev, POB 653, IL-8410501 Beer Sheva, Israel
关键词
Air-gap; data exfiltration; TEMPEST; EMSEC; FM Radio; APT; cyber-attack; bridging the air-gap;
D O I
10.1145/2870641
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information is the most critical asset of modern organizations, and accordingly it is one of the resources most coveted by adversaries. When highly sensitive data is involved, an organization may resort to air gap isolation in which there is no networking connection between the inner network and the external world. While infiltrating an air-gapped network has been proven feasible in recent years, data exfiltration from an air-gapped network is still considered one of the most challenging phases of an advanced cyber-attack. In this article, we present "AirHopper," a bifurcated malware that bridges the air gap between an isolated network and nearby infected mobile phones using FM signals. While it is known that software can intentionally create radio emissions from a video card, this is the first time that mobile phones serve as the intended receivers of the maliciously crafted electromagnetic signals. We examine the attack model and its limitations and discuss implementation considerations such as modulation methods, signal collision, and signal reconstruction. We test AirHopper in an existing workplace at a typical office building and demonstrate how valuable data such as keylogging and files can be exfiltrated from physically isolated computers to mobile phones at a distance of 1-7 meters, with an effective bandwidth of 13-60 bytes per second.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies
    Guri, Mordechai
    Kedma, Gabi
    Kachlon, Assaf
    Elovici, Yuval
    [J]. PROCEEDINGS OF THE 2014 9TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE: THE AMERICAS (MALWARE), 2014, : 58 - 67
  • [2] CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks
    Baek, Youngmi
    Shin, Seongjoo
    [J]. SENSORS, 2022, 22 (07)
  • [3] Impact of Cyber-Attack on Isolated Power System
    Sahabuddin, Md.
    Dutta, Bilash
    Hassan, Mehedi
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION & COMMUNICATION TECHNOLOGY (ICEEICT), 2016,
  • [4] Social Phones: Bridging the Gap Between Smartphones and Traditional Mobile
    Schiller, Kurt
    [J]. ECONTENT, 2010, 33 (06) : 10 - 11
  • [5] PERSONAL COMMUNICATIONS NETWORKS BRIDGING THE GAP BETWEEN CELLULAR AND CORDLESS PHONES
    LIPOFF, SJ
    [J]. PROCEEDINGS OF THE IEEE, 1994, 82 (04) : 564 - 571
  • [6] Developing Simulated Cyber-Attack Scenarios Against Virtualized Adversary Networks
    Aybar, Luis
    Singh, Gurminder
    Shaffer, Alan
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 1 - 10
  • [7] CyVi: Visualization of Cyber-Attack and Defense Effects in Geographically Referenced Networks
    Muhati, Eric
    Rawat, Danda B.
    Garuha, Moses
    Njilla, Laurent
    [J]. 2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [8] BRIDGING THE GAP BETWEEN TECHNICAL AND PRACTICAL
    SUMMERFIELD, AJ
    [J]. MILLING FEED AND FERTILISER, 1982, 165 (01): : 30 - 31
  • [9] Improving performance and cyber-attack resilience in multi-firewall industrial networks
    Seno, Lucia
    Cheminod, Manuel
    Bertolotti, Ivan Cibrario
    Durante, Luca
    Valenzano, Adriano
    [J]. 18TH IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS 2022 (WFCS 2022), 2022, : 79 - 86
  • [10] Secure Traffic Networks in Smart Cities: Analysis and Design of Cyber-Attack Detection Algorithms
    Roy, Tanushree
    Dey, Satadru
    [J]. 2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 4102 - 4107