DocumentCode :
1785294
Title :
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies
Author :
Guri, Mordechai ; Kedma, Gabi ; Kachlon, Assaf ; Elovici, Yuval
Author_Institution :
Dept. of Inf. Syst. Eng., Ben-Gurion Univ., Beer-Sheva, Israel
fYear :
2014
fDate :
28-30 Oct. 2014
Firstpage :
58
Lastpage :
67
Abstract :
Information is the most critical asset of modern organizations, and accordingly coveted by adversaries. When highly sensitive data is involved, an organization may resort to air-gap isolation, in which there is no networking connection between the inner network and the external world. While infiltrating an air-gapped network has been proven feasible in recent years (e.g., Stuxnet), data exfiltration from an air-gapped network is still considered to be one of the most challenging phases of an advanced cyber-attack. In this paper we present "AirHopper", a bifurcated malware that bridges the air-gap between an isolated network and nearby infected mobile phones using FM signals. While it is known that software can intentionally create radio emissions from a video display unit, this is the first time that mobile phones are considered in an attack model as the intended receivers of maliciously crafted radio signals. We examine the attack model and its limitations, and discuss implementation considerations such as stealth and modulation methods. Finally, we evaluate AirHopper and demonstrate how textual and binary data can be exfiltrated from physically isolated computer to mobile phones at a distance of 1-7 meters, with effective bandwidth of 13-60 Bps (Bytes per second).
Keywords :
invasive software; mobile radio; modulation; AirHopper; FM signals; air-gap isolation; bifurcated malware; cyber-attack; data exfiltration; distance 1 m to 7 m; isolated networks; maliciously crafted radio signals; mobile phones; modulation methods; radio emissions; radio frequencies; stealth methods; video display unit; Computers; Frequency modulation; Mobile handsets; Monitoring; Receivers; Software;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on
Conference_Location :
Fajardo, PR
Print_ISBN :
978-1-4799-7328-6
Type :
conf
DOI :
10.1109/MALWARE.2014.6999418
Filename :
6999418
Link To Document :
بازگشت