![]() ![]() The team went so far as to built an Android app they call ODINI, named for the escape artist Harry Houdini, to catch those signals using a phone's magnetometer, the magnetic sensor that enables its compass and remains active even when the phone is in airplane mode. By carefully coordinating operations on a computer's processor cores to create certain frequencies of electrical signals, their malware can electrically generate a pattern of magnetic forces powerful enough to carry a small stream of information to nearby devices. On Wednesday, Guri's Ben-Gurion team revealed a new technique they call MAGNETO, which Guri describes as the most dangerous yet of the dozen covert channels they've developed over the last four years. In new research published today, the Ben-Gurion team has even shown that they can pull data off a computer protected by not only an air gap, but also a Faraday cage designed to block all radio signals. Guri and his fellow Ben-Gurion researchers have shown, for instance, that it's possible to trick a fully offline computer into leaking data to another nearby device via the noise its internal fan generates, by changing air temperatures in patterns that the receiving computer can detect with thermal sensors, or even by blinking out a stream of information from a computer hard drive LED to the camera on a quadcopter drone hovering outside a nearby window. ![]() As the director of the Cybersecurity Research Center at Israel's Ben Gurion University, 38-year-old Guri's team has invented one devious hack after another that takes advantage of the accidental and little-noticed emissions of a computer's components-everything from light to sound to heat. More, perhaps, than any single researcher outside of a three-letter agency, Guri has uniquely fixated his career on defeating air gaps by using so-called "covert channels," stealthy methods of transmitting data in ways that most security models don't account for. Which makes Guri something like an information escape artist. Specifically, he focuses on stealing secrets sensitive enough to be stored on an air-gapped computer, one that's disconnected from all networks and sometimes even shielded from radio waves. But Mordechai Guri has spent the last four years fixated instead on exfiltration: How spies pull information out once they've gotten in. The field of cybersecurity is obsessed with preventing and detecting breaches, finding every possible strategy to keep hackers from infiltrating your digital inner sanctum. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |