Exfiltrating private keys from air-gapped cold wallets

Air-gapped cold wallets might be one of the safest options for keeping your cryptocurrency stash, but even they can be compromised. And, as demonstrated by security researchers from the Ben-Gurion University of the Negev, Israel, extracting private key… Continue reading Exfiltrating private keys from air-gapped cold wallets

Researchers use power lines to exfiltrate data from air-gapped computers

Researchers from the Ben-Gurion University of the Negev have come up with another way to exfiltrate data from air-gapped computers: this time, its via malware that can control the power consumption of the system. “Data is modulated, encoded, and … Continue reading Researchers use power lines to exfiltrate data from air-gapped computers

Using security cameras and infrared light to extract data from air-gapped networks

Researchers have demonstrated that it’s possible for attackers to covertly exfiltrate data from and send data into an air-gapped network by using the infrared light capabilities of (indoor and outdoor) security cameras connected to it. Infrared (IR) light is invisible to humans, but cameras are optically sensitive to it. They are also equipped with IR LEDs (used for night vision), which can be used to send out data. Infiltration and exfiltration scenarios The researchers have … More Continue reading Using security cameras and infrared light to extract data from air-gapped networks

How the CIA gained access to air-gapped computers

A new WikiLeaks release of documents believed to have been stolen from the CIA show the intelligence agency’s capability to infect air-gapped computers and networks via booby-trapped USB sticks. The Brutal Kangaroo project The agency would start by infecting an Internet-connected computer inside the target organizations with malware, which would infect inserted USB sticks with another piece of malware. If such a USB is ultimately inserted in the air-gapped computer, it will get infected with … More Continue reading How the CIA gained access to air-gapped computers

USBee makes USB devices transmit data from air-gapped computers

After devising ways of exfiltrating data from air-gapped computers via mobile phones, using radio frequencies, heat, rogue software that transmits electromagnetic signals at cellular frequencies, hard drive noise and fan noise, researchers from the Ben-Gurion University of the Negev’s Cyber Security Research Center have now demonstrated that USB devices can be turned into a short-range RF transmitter via their USBee malware. Unlike COTTONMOUTH, NSA’s USB hardware implant that allows attackers to infiltrate air-gapped systems, load … More Continue reading USBee makes USB devices transmit data from air-gapped computers

Top-level cyber espionage group uncovered after years of stealthy attacks

Symantec and Kaspersky Lab researchers have uncovered another espionage group that is likely backed by a nation-state. The former have dubbed the threat actor Strider, wile the latter named it ProjectSauron (after a mention in the code of one of the malware modules the group deploys). According to the researchers, evidence of ProjectSauron’s activity can be found as far back as 2011, and as near as early 2016. Within that period, the group has targeted … More Continue reading Top-level cyber espionage group uncovered after years of stealthy attacks

Exfiltrating data from air-gapped computers by modulating fan speed

For the last few years, researchers from Ben-Gurion University of the Negev have been testing up new ways to exfiltrate data from air-gapped computers: via mobile phones, using radio frequencies (“AirHopper”); using heat (“BitWhisper”), using rogue software (“GSMem”) that modulates and transmits electromagnetic signals at cellular frequencies. The latest version of the data-exfiltration attack against air-gapped computers involves the machine’s fans. Dubbed “Fansmitter,” the attack can come handy when the computer does not have speakers, … More Continue reading Exfiltrating data from air-gapped computers by modulating fan speed