Researchers proved they can seep data off your PC through fan vibrations.
Cyberattack Steals PC Data Through Fan Vibrations : Read more
Cyberattack Steals PC Data Through Fan Vibrations : Read more
This seems like something that could only be accomplished in a lab environment. You have to hack into both the phone and the PC (at which point you could just take the data anyways) - then you have to wait until your target sets the phone down on the desk at which they're using the pc.
Right now, my phone is on it's charger in the kitchen where it pretty much stays until I need it. My PC sits on the concrete slab of my garage floor. I guess I'm immune to this attack vector.
I'd have to see some documentation on that.My father in law does cyber security work for the government. They aren't allowed to talk about classified information around PC's because there have been studies where the vibration form the air could leave imprints onto the hard drives! I was skeptical at first, but then he had a document he showed me about it and my jaw just dropped.
Exactly.By their own admission, this doesn't overcome the air-gap because it requires that you have contact with the computer to install malware in the first place. If they have no access to the computer in the 1st place, this doesn't work. If they do have access to the computer in the 1st place, this is totally unnecessary.
Interestingly enough...That is Confidential information sir.
It's for attacking machines with an air-gap. So, it's clearly intended for high-stakes Stuxnet-style scenarios.This seems like something that could only be accomplished in a lab environment.
How are you going to "just take the data anyways" across an air gap? By definition, this is a PC that's not networked (or maybe not on a network you can access). Maybe you can get software onto it by infecting a software update the victim installs on it (e.g. via USB drive), but that doesn't mean you can get any information off of it. That's the problem they're trying to tackle, here.You have to hack into both the phone and the PC (at which point you could just take the data anyways)
Or, if they can get access to your phone's microphone, then it might even work while in your pocket.then you have to wait until your target sets the phone down on the desk at which they're using the pc.
Yeah, it's not about you. I think the article made that pretty clear.Right now, my phone is on it's charger in the kitchen where it pretty much stays until I need it. My PC sits on the concrete slab of my garage floor. I guess I'm immune to this attack vector.
Document authored when?My father in law does cyber security work for the government. They aren't allowed to talk about classified information around PC's because there have been studies where the vibration form the air could leave imprints onto the hard drives! I was skeptical at first, but then he had a document he showed me about it and my jaw just dropped.
Huh. I didn't think most speakers or mics would extend much above the audible range. But, there's a deeper problem, which is that nothing is normally listening to your mic that would be susceptible to hacking. Maybe some kind of speech recognition software that has a specific buffer overrun vulnerability, but then it'd have to be a very targeted attack.Also remember reading something about a guy where some malware was able to infect other PC's though the speakers and mic using high frequency sound waves that you couldn't hear.
I'm calling BS on that.It was a loooong time ago using some really old laptops but it infected the BIOS some how.
Cool, though it requires hacked HDD firmware.Hard drive as "microphone".
https://andrewkwong.org/docs/Kwong-HDDphone-IEEE-SP-2019.pdf
Reading in real time.
Not "imprinted" to read back later.
No, an air gap doesn't mean the PC is hermetically sealed. It just means you have no networked access to it.By their own admission, this doesn't overcome the air-gap because it requires that you have contact with the computer to install malware in the first place.
Maybe it hasn't been used in the wild, but how would you even know?This is a lab quality proof of concept.
Not an actual vulnerability in the wild.
Cool, though it requires hacked HDD firmware.
I'm calling BS on that.
As the article points out, that was another story they covered. Perhaps it was even by the same researchers.This is about as useful as exfiltrating data by creating subtle monitor screen brightness changes,
Uh, no. That's far too low-bandwidth and much too susceptible to interference.or by changing the room temperature slightly up and down to indicate 0's and 1's
It's practical enough for 3-letter agencies to employ, when few other options exist. And it's easily fast enough to use for exfiltrating things like passwords or encryption keys.While a fun challenge, hardly practical at all and way too slow to be useful.
I wasn't trying to say anything in particular by that, just making an observation.I read a news article a few months back. Certain state actors found out how to hack WD and Seagate firmwares already to store data in areas they shouldn't where is wasn't protected by permissions.
After all drive firmware was designed to be updated to improve reliability.
WTF does that have to do with hijacking a PC by sound??First UEFI malware discovered in wild is laptop security software hijacked by Russians
“LoJax” repurposed LoJack anti-theft agent as rootkit that could survive OS re-installs.arstechnica.com
How are you going to "just take the data anyways" across an air gap? By definition, this is a PC that's not networked (or maybe not on a network you can access). Maybe you can get software onto it by infecting a software update the victim installs on it (e.g. via USB drive), but that doesn't mean you can get any information off of it. That's the problem they're trying to tackle, here.
Unless this were incorporated as part of the device's operating system, drivers or firmware to begin with. Think along the lines of something that could be employed by a government, for example. And technically, they wouldn't even need the phone to be part of it, as something like a laser microphone directed at a window might suffice for detecting variations in fan speed over time.Uh, you have access to the machine long enough to install this mission-impossible setup on not only the system but the phone as well, you could just take whatever data it is you're after there, Hoss.
WTF does that have to do with hijacking a PC by sound??