Article count:16428 Read by:87919360

Hottest Technical Articles
Exclusive: A senior executive of NetEase Games was taken away for investigation due to corruption
OPPO is going global, and moving forward
It is reported that Xiaohongshu is testing to directly direct traffic to personal WeChat; Luckin Coffee is reported to enter the US and hit Starbucks with $2, but the official declined to comment; It is reported that JD Pay will be connected to Taobao and Tmall丨E-commerce Morning News
Yu Kai of Horizon Robotics stands at the historical crossroads of China's intelligent driving
Lei Jun: Don't be superstitious about BBA, domestic brands are rising in an all-round way; Big V angrily criticized Porsche 4S store recall "sexy operation": brainless and illegal; Renault returns to China and is building a research and development team
A single sentence from an overseas blogger caused an overseas product to become scrapped instantly. This is a painful lesson. Amazon, Walmart, etc. began to implement a no-return and refund policy. A "civil war" broke out between Temu's semi-hosted and fully-hosted services.
Tmall 3C home appliances double 11 explosion: brands and platforms rush to
Shareholders reveal the inside story of Huayun Data fraud: thousands of official seals were forged, and more than 3 billion yuan was defrauded; Musk was exposed to want 14 mothers and children to live in a secret family estate; Yang Yuanqing said that Lenovo had difficulty recruiting employees when it went overseas in the early days
The app is coming! Robin Li will give a keynote speech on November 12, and the poster reveals a huge amount of information
It is said that Zhong Shanshan asked the packaged water department to sign a "military order" and the entire department would be dismissed if the performance did not meet the standard; Ren Zhengfei said that it is still impossible to say that Huawei has survived; Bilibili reported that employees manipulated the lottery丨Leifeng Morning News
Account Entry

Hackers come up with a new trick! A Belgian research team has discovered that hackers can steal your data even without an Internet connection by using a fan

Latest update time:2021-08-30 22:27
    Reads:

Hackers steal data in the background without users noticing.

Text | Liu Lin

For hackers, there is nothing they can't do, only things you can't think of.

1

Even without an Internet connection, hackers can use fans to

Can it steal your data too?

Recently, a research team in Israel discovered that they can use a special method to steal data from computers "unnoticed".

A research team at Israel's Ben-Gurion University has discovered a new way to steal computer data - Air-ViBeR. This is not the first time they have developed this strange technology to obtain computer data. For example, they have previously used hard drive LEDs, screen brightness, computer speakers, heat, etc. to steal data.

According to the paper, the attack is divided into three steps. First, the malware implanted in the computer is used to control the fan speed to adjust the mechanical vibrations generated by the computer, and the data will be encoded into these vibrations; then, the smartphone is placed on the computer desk or other locations close to the computer host, and the accelerometer in the phone can be used to collect vibration signals; finally, the obtained signal is decoded through the App.

But this technique of secretly stealing data from air-gapped computers is not new. Their previous research on hacking into air-gapped devices includes:

The PowerHammer attack can steal data from air-gapped computers through power lines.

MOSQUITO technology uses ultrasound to allow two (or more) air-gapped computers in the same room to exchange data covertly.

The BeatCoin technique enables attackers to steal private encryption keys from air-gapped cryptocurrency wallets.

The aIR-Jumper attack uses infrared CCTV cameras equipped with night vision capabilities to obtain sensitive information from air-gapped computers.

MAGNETO and ODINI technologies use the magnetic field generated by the CPU as a covert channel between the air-gapped system and a nearby smartphone.

The USBee attack can steal data from an air-gapped computer through radio frequency transmissions from a USB connector.

DiskFiltration attacks can exploit the acoustic signals emitted by the hard disk drive (HDD) of a target air-gapped computer to steal data.

BitWhisper relies on hot-swapping between two computer systems to steal passwords or security keys.

AirHopper converts your computer's video card into an FM transmitter to control keystrokes.

Fansmitter technology uses the noise emitted by computer heat sinks to obtain data.

GSMem attacks rely on cellular frequencies.

The latest research points out that CPU fans, GPU fans, power supply fans or any other fans installed on the computer case can generate vibrations. For computers that are not connected to the Internet, malicious code implanted in the system can control the speed of the fan. So, by speeding up or slowing down the fan, the attacker can control the frequency of the fan vibration. This frequency can be encoded and then transmitted through computer desks, etc.

A nearby attacker could then use the smartphone's accelerometer to record those vibrations and decode the information hidden in the vibration patterns to reconstruct the information stolen from the unconnected computer system.

Collecting these vibrations can be done in two ways:

If an attacker has physical access to a gapped network, they can place their smartphone on a table near a gapped system and collect the emitted vibrations without touching the gapped computer.

If the attacker does not have access to the air-gapped network, then the attacker can infect the smartphones of employees who work for the target company that operates the air-gapped system. Malware on the employee's device can pick up those vibrations on the attacker's behalf.

The accelerometer in a smartphone is highly hidden from hackers:

First, no user permission is required. Android and iOS operating system applications read the combination of accelerometer samples without initiating a request to the user.

Second, there is no visible prompt. When the application enables the accelerometer, there is no visible prompt.

Third, standard JavaScript code can access the accelerometer through a web browser. This means that hackers no longer need to hack into the user's device or install malware. All they need to do is plant malicious JavaScript on a legitimate website that samples the accelerometer, receives the secret signal, and steals information over the network.

That is, hackers are stealing your data in the background without your knowledge, and even when your computer is not connected to the Internet.

Oh my god, then all my little secrets can no longer be hidden...

However, it should be pointed out that at present, the use of this technology is limited to data acquisition processes that require high security, such as military confidential networks, payment networks for retailers to process credit and debit cards, and critical infrastructure operations in industrial control systems. In addition, many journalists will use it to protect sensitive data.

The new attack method is based on the principle of using radiation from computer components that few people would notice, such as light, sound, heat, radio frequencies or ultrasound, or even current fluctuations in power lines, to steal computer data.

2

How to stop it?

Although this method of stealing secrets is very novel, the researchers also pointed out its disadvantages. To transmit small data packets, it must be within 1.5 meters of the PC to be relatively stable, and this transmission method is very slow. Different vibration sources have different transmission speeds. For example, the CPU fan is the lowest, while the chassis fan is the highest.

Therefore, researchers have also proposed several solutions.

One solution is to place accelerometers on computers containing sensitive information to detect abnormal vibrations.

Another solution is a fan access monitor. Generally, no program should access fan control in the system, so endpoint protection can be used to detect code that interferes with the fan control API or accesses the fan control bus (such as ACPI and SMBus). However, the disadvantage of this method is that an attacker can use a rootkit or other evasion technology to bypass the monitor and access fan control.

Additionally, jamming the communication channel by cutting or blocking the original transmission is also a method of internal interference, and a specialized program can be used to change the fan speed at random times and RPMs, but again this cannot be prevented from being disabled or circumvented by a kernel rootkit.

Currently, the most trusted external interference method in terms of security is to connect components that generate random vibrations to the computer. One weakness of this method is that it requires maintenance and cannot be deployed on every computer, but this operation is indeed relatively simple and easy.

Of course, you can also physically isolate the computer by putting it in a special vibration-resistant chassis, or replace the original computer fan with a water cooling system, but such a solution cannot be promoted on a large scale.

Fortunately, such unexpected interference rarely occurs in real-world environments, and ordinary users do not need to worry too much.

References:

https://www.zdnet.com/article/academics-steal-data-from-air-gapped-systems-using-pc-fan-vibrations/

https://arxiv.org/abs/2004.06195v1


Previous recommendations






*Recruitment: Leiphone.com is urgently recruiting senior editors for the hot topics group. Interested parties please send your resume to liufangping@leiphone.com


Featured Posts


Latest articlesabout

Database "Suicide Squad" 
Exclusive: Yin Shiming takes over as President of Google Cloud China 
After more than 150 days in space, the US astronaut has become thin and has a cone-shaped face. NASA insists that she is safe and healthy; it is reported that the general manager of marketing of NetEase Games has resigned but has not lost contact; Yuanhang Automobile has reduced salaries and laid off employees, and delayed salary payments 
Exclusive: Google Cloud China's top executive Li Kongyuan may leave, former Microsoft executive Shen Bin is expected to take over 
Tiktok's daily transaction volume is growing very slowly, far behind Temu; Amazon employees exposed that they work overtime without compensation; Trump's tariff proposal may cause a surge in the prices of imported goods in the United States 
OpenAI's 7-year security veteran and Chinese executive officially announced his resignation and may return to China; Yan Shuicheng resigned as the president of Kunlun Wanwei Research Institute; ByteDance's self-developed video generation model is open for use丨AI Intelligence Bureau 
Seven Swordsmen 
A 39-year-old man died suddenly while working after working 41 hours of overtime in 8 days. The company involved: It is a labor dispatch company; NetEase Games executives were taken away for investigation due to corruption; ByteDance does not encourage employees to call each other "brother" or "sister" 
The competition pressure on Douyin products is getting bigger and bigger, and the original hot-selling routines are no longer effective; scalpers are frantically making money across borders, and Pop Mart has become the code for wealth; Chinese has become the highest-paid foreign language in Mexico丨Overseas Morning News 
ByteDance has launched internal testing of Doubao, officially entering the field of AI video generation; Trump's return may be beneficial to the development of AI; Taobao upgrades its AI product "Business Manager" to help Double Eleven丨AI Intelligence Bureau 

 
EEWorld WeChat Subscription

 
EEWorld WeChat Service Number

 
AutoDevelopers

About Us About Us Service Contact us Device Index Site Map Latest Updates Mobile Version

Site Related: TI Training

Room 1530, Zhongguancun MOOC Times Building,Block B, 18 Zhongguancun Street, Haidian District,Beijing, China Tel:(010)82350740 Postcode:100190

EEWORLD all rights reserved 京B2-20211791 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号 Copyright © 2005-2021 EEWORLD.com.cn, Inc. All rights reserved