Meet USBee, the malware that uses USB drives to covertly jump airgaps

JMH

Emeritus, Contributor
Joined
Apr 2, 2012
Posts
7,197
[TABLE="class: ncode_imageresizer_warning"]
[TR]
[TD="class: td1"][/TD]
[TD="class: td2"]This image has been resized. Click this bar to view the full image.[/TD]
[/TR]
[/TABLE]
usbee-800x427.jpg


Enlarge / Illustration of USBee, in which an ordinary, unmodified USB drive (A) transmits information to a nearby receiver (B) through electromagnetic waves emitted from the drive data bus.

In 2013, a document leaked by former National Security Agency contractor Edward Snowden illustrated how a specially modified USB device allowed spies to surreptitiously siphon data out of targeted computers, even when they were physically severed from the Internet or other networks. Now, researchers have developed software that goes a step further by turning unmodified USB devices into covert transmitters that can funnel large amounts of information out of similarly "air-gapped" PCs.

The USBee—so named because it behaves like a bee that flies through the air taking bits from one place to another—is in many respects a significant improvement over the NSA-developed USB exfiltrator known as CottonMouth. That tool had to be outfitted with a hardware implant in advance and then required someone to smuggle it into the facility housing the locked-down computer being targeted. USBee, by contrast, turns USB devices already inside the targeted facility into a transmitter with no hardware modification required at all.
Meet USBee, the malware that uses USB drives to covertly jump airgaps | Ars Technica
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top