JMH
Emeritus, Contributor
- Apr 2, 2012
- 7,197
How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone - AirHopper
How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone - AirHopper | Cyber Security Labs @ Ben-Gurion University of the Negev
[TABLE="class: ncode_imageresizer_warning"]
[TR]
[TD="class: td1"][/TD]
[TD="class: td2"]This image has been resized. Click this bar to view the full image.[/TD]
[/TR]
[/TABLE]
Submitted by Cyber Security ... on Tue, 28/10/2014 - 09:22
Security researcher Mordechai Guri with the guidance of Prof. Yuval Elovici from the cyber security labs at Ben-Gurion University in Israel presented at the 9th IEEE International Conference on Malicious and Unwanted Software (MALCON 2014), at Puerto Rico, a breakthrough method (“AirHopper) for leaking data from an isolated computer to a mobile phone without the presence of a network. In highly secure facilities the assumption today is that data can not leak outside of an isolated internal network. It is called air-gap security. The common policy in such secure organizations is to leave your mobile phone in some locker when you enter the facility and then pick it up when you go out. We at the cyber security labs challenged this assumption and found a way to leak data from a computer inside the organization to a remote a mobile phone without using Wifi or Bluetooth. “Such technique can be used potentially by people and organizations with malicious intentions and we want to start a discussion on how to mitigate this newly presented risk.” said Dudu Mimran CTO of the cyber security labs.
The following video demonstrates AirHopper:
How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone - AirHopper | Cyber Security Labs @ Ben-Gurion University of the Negev