Hackers use radio signals to steal private information from PCs - when computers are NOT connected

R.B

JF-Expert Member
May 10, 2012
6,296
2,573
[h=1]Hackers use radio signals to steal private information from PCs - even when the computers are NOT connected to the web[/h]
  • Sensitive machines are often protected on an offline 'air-gap' network
  • This is considered to be the most effective way to keep data safe
  • But computer scientists from Ben-Gurion University, Israel, have found a way to attack machines and 'steal' data, called the AirHopper method
  • They used a smartphone capable of receiving FM signals
  • Experiment means new protective measures will have to be found



From national security data to secret company information, some of the most sensitive documents are stored on computers that are never connected to the internet.
This precaution of keeping such information on an ‘air-gap’ network is popularly considered the safest way to prevent hackers from accessing it.
But computer scientists from Ben-Gurion University in Israel have found a way to attack these machines and ‘steal’ the confidential data.
Scroll down for video
2356D37500000578-2842778-image-71_1416502167785.jpg



Hackers from Ben-Gurion University in Israel have found a way to attack computers that are not connected to the internet - as used by many companies to store sensitive data - and steal data. The finding means that some high profile machines may not be as safe from hackers (illustrated) as previously thought

[h=3]HOW DOES THE ATTACK WORK?[/h] 'Air gaps' currently used to protect important computers could be rendered useless.
An air-gap or air wall is a network security measure.
It was designed to make sure secure computer networks are physically isolated from unsecured networks, such as the internet or a local area network.
The researchers from Israel designed computer software that logs keystrokes.
This software transmits these strokes via FM radio signals generated by the computer's graphics card.
The data is picked up by a nearby mobile, equipped to pick up radio signals.
In the example case, the researchers used a Samsung Galaxy S4 and had to plug in the headphones to get the radio receiver to work.
This can be done without being detected by the user, but does rely on the software being installed on the computer in the first place.
Since FM radio signals can travel over long distances, the receiver could be placed in another building.
A new method of protecting these machines will now have to be found, claimed the researchers.


In an experiment designed to highlight the danger facing machines in an air-gap, the researchers assumed that the attacker has already broken into a protected system to sneak out new data.
An air-gap or air wall is a network security measure.
It was designed to make sure secure computer networks are physically isolated from unsecured networks, such as the internet or a local area network.
The researchers from Israel designed computer software that logs keystrokes, Ars Technica reported.
This software transmits these strokes via FM radio signals generated by the computer's graphics card.
The signals are picked up by a nearby mobile, equipped to pick up radio signals.
In the example case, they used a Samsung Galaxy S4 and had to plug in the headphones to get the radio receiver to work.
This can be done without being detected by the user, but does rely on the software being installed on the computer in the first place.
And since FM radio signals can travel over long distances, the receiver could be placed in another building.
A new method of protecting these machines will now have to be found, claimed the researchers.
They demonstrated that a hacker could use it to collect data from devices protected by an air-gap in a paper, which they presented at the IEEE 9th International Conference on Malicious and Unwanted Software (Malcon).
'The scenario is that you go to a secure facility and leave your cell phone at the entrance,’ said Dudu Mimran, chief technology officer for the cyber security labs at the university.
 
Back
Top Bottom