Computers isolated from the internet can still be hacked via the network card LED
Israeli researcher Mordechai Guri has discovered a new method to steal data from air-gapped computers. The method, called ETHERLED, turns the blinking LED lights on network cards into Morse code that can be decoded by hackers .
To capture the signals, a hacker needs a camera with a direct line of sight to the LEDs on the network card of an air-gapped computer. These can be translated into binary data to steal information.
Air-gapped computers are computer systems that are typically installed in highly sensitive environments (e.g. critical infrastructure, weapons control units, etc.). For security reasons, these computers are isolated from the public internet.
However, they still have network cards to connect to the internal network. Mordechai Guri discovered that if hackers can install special malware that replaces the video card driver with software that modifies the LED color and flashing frequency, they can send encrypted data to the outside.
The ETHERLED method can be used on other peripherals and hardware that use LEDs as status indicators such as routers, NAS, printers, scanners, etc.
Compared to previously disclosed data exfiltration methods that monitor keyboard and modem LEDs, ETHERLED is a more covert and less likely to raise suspicions.
Details about ETHERLED
The attack begins by installing malware on the target computer that contains modified firmware for the network card. This allows the hacker to control the frequency, duration, and color of the LED flashes.
Additionally, malware can directly attack the drive containing the network interface controller (NIC) to change the connection state or adjust the LEDs needed to generate the signal.
The researcher discovered that the malicious driver can exploit hardware functionality to control network connection speed and enable or disable the Ethernet interface, resulting in flickering and color-changing lights.
Guri's tests showed that each data frame begins with a 1010 sequence, to mark the start of the packet, followed by a 64-bit payload.
For filtering data through single status LEDs, Morse code dots and dashes lasting from 100ms to 300ms are generated, separated by indicator off intervals ranging from 100ms to 700ms.
Morse code bitrate can be increased up to 10 times (10m dots, 30m dashes and 10-70ms spacing) using driver/firmware attack method.
To capture signals from a distance, hackers can use anything from smartphone cameras (up to 30 meters), drones (up to 50 meters), hacked webcams (10 meters), hacked surveillance cameras (30 meters), and telescopes or cameras with telephoto or super zoom lenses (over 100 meters).
The time it takes to leak secrets like passwords via ETHERLED ranges from 1 second to 1.5 minutes, depending on the attack method used. For complex data like Bitcoin wallet keys, it takes 2.5 seconds to 4.2 minutes, and 42 seconds to 1 hour with a 4096-bit RSA key.
You should read it
- Learn about SQL Injection and how to prevent it
- What is SS7 attack? What can hackers use it for?
- The 13-year-old 'Hacker' enters the school's computer system to create a 'list of the most hated kids'
- It turns out this is how hackers attack your computer through the main screen
- Russian Hacker performs a new attack tactic
- There has been hack Among Us and this is how you find out hacker
- Hackers hide stolen credit card data in JPG file
- The most basic insights to becoming a Hacker - Part 5
May be interested
- Protect WiFi network before hackersunsecured wifi wireless internet access networks can be easily hacked, so securing your wifi network is a must to avoid unnecessary curiosity. very easy to set up a secure wifi network.
- The UN acknowledges that cyberattacks are extremely sophisticated and cannot identify the culpritthe united nations recently acknowledged the organization was the target of a massive cyberattack in the summer of 2019.
- Set up and configure a LAN (Local Area Network)installing the network card: at first you have to install the network card into the computer by: turning off the computer, removing the computer's cover, then you find an empty slot to plug in the network card. turn the screw back on. then close the case. ...
- How to Detect Remotely Accessed Computerssurely there are few things that make you feel as scared as having your personal computer hacked. if you think your computer is being controlled by a hacker, the first thing you should do is disconnect from the network. once you're offline, you can find and remove the gateway the hacker used to access your system. once your system is secure, there are several steps you can take to keep your computer from being hacked.
- Internet connection sharing - Internet Connection Sharingyou have many computers, if you have to set up a separate internet connection for each machine, it is not reasonable at all. fortunately, windows has built-in internet connection sharing (ics) software to help all computers share a single internet connection.
- Twitch hacked, 125GB of data including source code shared on the internetit looks like the streaming service twitch has been hacked recently. an anonymous person uploaded a 125gb torrent file containing many important twitch data on 4chan.
- Instructions for installing mobile networks on Windows 10some windows 10 computers have a sim card which allows you to connect to a mobile data network, so you can go online with mobile signals. the following article will guide some basic settings for mobile networks on windows 10.
- How to fix exclamated network errorsthe network with yellow exclamation mark is a fairly common mistake when we use computers connected to the internet. this error has many causes such as network cable, modem, ip address, etc., making it impossible for us to access the internet. the following article of tipsmake.
- Tips to optimize Internet connection speed from Linksysmaximizing internet speed is essential to optimizing your network connection. you can have the best entertainment and working experience when using computers, internet-ready tvs, game consoles, etc.
- How to share data between 2 computers via LAN?normally, when you need to share data between two computers, we often choose the option of using an intermediary tool, usb or portable hard drive. in addition, you can use the internet. however, if you do not have a usb connection and the network connection fails, what should you do? do not worry. we will show you how to share data between 2 computers via lan (network system used to connect computers in a small range) in the article content below.