POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers

POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers https://arxiv.org/abs/2005.00395 LED-it-Go - exfiltrate data from air-gapped systems via an HDD's activity LED USBee - force a USB connector's data bus give out electromagnetic emissions that can be used to exfiltrate data AirHopper - use the local GPU card to emit electromagnetic signals to a nearby mobile phone, also used to steal data Fansmitter - steal data from air-gapped PCs using sounds emanated by a computer's GPU fan DiskFiltration - use controlled read/write HDD operations to steal data via sound waves BitWhisper - exfiltrate data from non-networked computers using heat emanations Unnamed attack - uses flatbed scanners to relay commands to malware infested PCs or to exfiltrate data from compromised systems GSMem - steal data from air-gapped systems using GSM cellular frequencies xLED - use router or switch LEDs to exfiltrate data aIR-Jumper - use a security camera's infrared capabilities to steal data from air-gapped networks HVACKer - use HVAC systems to control malware on air-gapped systems MAGNETO & ODINI - steal data from Faraday cage-protected systems MOSQUITO - steal data from PCs using attached speakers and headphones PowerHammer - steal data from air-gapped systems using power lines CTRL-ALT-LED - steal data from air-gapped systems using keyboard LEDs BRIGHTNESS - steal data from air-gapped systems using screen brightness variations AiR-ViBeR - steal data using a computer's fan vibrations

For some reason I just noticed this posting. One partial solution to exfiltrating information by LEDs would be to design the LEDs with capacitors across them, greatly reducing the rate of change of intensity. This could also be retrofitted after assembly. In 1977, after building a "Dyna-Micro" Single-board computer (highlighted in Radio-Electronics magazine) I noticed that a nearby AM radio could easily pick up RF from it. If anything, this is potentially an even more useable kind of surveillance, because it doesn't necessarily require intrusion into a computer room or building. Jim Bell On Tuesday, May 5, 2020, 06:04:29 AM PDT, grarpamp <grarpamp@gmail.com> wrote: [trim] LED-it-Go - exfiltrate data from air-gapped systems via an HDD's activity LED [trim]xLED - use router or switch LEDs to exfiltrate data [trim] CTRL-ALT-LED - steal data from air-gapped systems using keyboard LEDs
participants (2)
-
grarpamp
-
jim bell