Hackers can steal data from the Air Gap network computer using Camera IR CCTV
The computers in the Air Gap network are separated from the local Internet and network, which is said to be the safest and most difficult way to penetrate. This network has been the subject of research for many years as researchers try to describe every possible scenario of attack, leading to disruption of the safety of these isolated networks.
Recently, researchers from Israel's Ben Gurion University have described several ways to get sensitive information from computers in this closed network.
Now they find another way to steal sensitive information on the Air Gap computer - thanks to the help of infrared CCTV cameras for night vision.
An attack scenario called aIR-Jumper consists of an Air Gap computer (to steal data from it), a CCTV network (at least one CCTV installed inside, in front of the Air Gap computer and a side-mounted CCTV In addition), suppose both networks are not connected to each other and are not connected to the network.
Stealing data transmission model
Ignoring the fact that Air Gap and CCTV are infected with malware, research focuses on how malware transfers the stolen data back to the attacker.
To read and send data, aIR-Jumper malware on Air Gap and CCTV network will flash IR LED lights in a password-like sequence to transfer files into binary data 0, 1.
Data from the video camera transmits at a rate of 20 bits per second over a distance of 10 meters and from an attacker to a video camera is 100 bits per second, even in the dark.
Because of the attack to steal files under binary data, the attacker will not be able to retrieve large files, but can obtain passwords, encryption keys, PIN codes and other sensitive data on the computer.
'Under this scenario, the attacker stands in public, using IR LED to transmit signals to surveillance cameras. Binary data such as messages from C&C are encrypted on it '.
The researchers also released two videos that illustrate two attack scenarios.
The first video describes how malware is installed on Air Gap computers to collect data and convert to binary, then flash the LED. At the same time, the camera captures the signal and the malware installed on it will convert the code back into binary.
In the second video, another internal connection camera is placed outside (in the parking lot) and transmits the stolen binary data to the attacker sitting in the car using IR LED in sequence.
CCTV camera is like a bridge between Air Gap computer and attacker, as a navigation channel.
You should read it
- The 13-year-old 'Hacker' enters the school's computer system to create a 'list of the most hated kids'
- How to choose a CCTV surveillance camera
- Test your understanding of P2 hack
- Reddit is hacked, many member data is stolen
- It turns out this is how hackers attack your computer through the main screen
- Hackers demand $ 50K from the hacker forum, otherwise they will give no Fed
- Hack smartphone password via touch screen sound
- Test knowledge about hacking
May be interested
- The 13-year-old 'Hacker' enters the school's computer system to create a 'list of the most hated kids'recently, a 13-year-old 'young man' in the united states was investigated for allegedly illegally accessing and using personal data of a teacher, thereby breaking into the school's computer system to steal personal information of other students and create a blacklist of the most hated students in the school.
- It turns out this is how hackers attack your computer through the main screenthe video clearly shows how he entered the user's computer through the main screen, creating a vulnerability on the computer to steal personal information. in this way, the hacker can even change the amount of money in the user's bank account.
- The Forum focuses on notorious social network hackers who have been hacked and sold for sale on other forumsogusers - a famous forum for gathering hackers.
- Test your understanding about hackinghacker is a job that brings a lot of income and is loved by many people. to become a true hacker you need to cultivate a lot of useful knowledge. the network administrator's quiz below will help you gain the knowledge to start your career as a hacker.
- Super hackers steal tens of millions of credit card datain the biggest bank card theft in the united states, 28-year-old hackers were fined $ 2.7 million and have the ability to 'peel off the calendar' for decades in prison.
- Model of Fujifilm surveillance camera with the ability to zoom in and out of a person from more than 2km awayfujifilm has equipped its products with excellent zoom capabilities.
- Detecting APT attack campaign on important national infrastructure on Tet holidaythe main purpose of hackers is to gain user control, then through it to attack internal computer systems to steal important information.
- How hackers steal 9 million USD from ATM in 1 hourcisco security experts explained the entire process that bad guys apply to withdraw the money with just over 100 real cards.
- Malicious ad campaigns abuse Chrome to steal 500 million iOS user sessionsin recent times, many large malvertising attacks targeted ios users from the united states and many european union countries have been deployed.
- Detecting a Thunderbolt flaw allows a hacker to steal system data for 5 minutesrecently, international security researcher bjorn ruytenberg unexpectedly discovered a vulnerability called 'thunderspy' that exists in thunderbolt ports, allowing hackers to easily steal data.