AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers

Total Page:16

File Type:pdf, Size:1020Kb

AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers Mordechai Guri Ben-Gurion University of the Negev, Israel Cyber-Security Research Center [email protected] demo video: https://www.youtube.com/watch?v=vhNnc0ln63c air-gap research page: http://www.covertchannels.com Abstract—In this paper, we show that attackers can exfiltrate deceived insiders [20][5]. These techniques allow the attackers data from air-gapped computers via Wi-Fi signals. Malware in to insert targeted malware into systems within the isolated a compromised air-gapped computer can generate signals in the environment. Wi-Fi frequency bands. The signals are generated through the memory buses - no special hardware is required. Sensitive data One of the most famous incidents in which the air-gap can be modulated and secretly exfiltrated on top of the signals. was breached involved the Stuxnet worm which targeted su- We show that nearby Wi-Fi capable devices (e.g., smartphones, pervisory control and data acquisition (SCADA) systems and laptops, IoT devices) can intercept these signals, decode them, destroyed an estimated 1,000 centrifuges at an Iranian uranium and send them to the attacker over the Internet. To extract enrichment facility [53]. In 2018, the US Department of the signals, we utilize the physical layer information exposed by the Wi-Fi chips. We implement the transmitter and receiver Homeland Security accused Russian hackers of penetrating the and discuss design considerations and implementation details. We internal network of America’s electric utilities [4]. In 2019, the evaluate this covert channel in terms of bandwidth and distance media reported that the Kudankulam Nuclear Power Plant was and present a set of countermeasures. Our evaluation shows that the target of a successful cyber attack earlier that year [21]. data can be exfiltrated from air-gapped computers to nearby In addition, sophisticated malware, such as SymonLoader [8] Wi-Fi receivers located a distance of several meters away. and other advanced persistent threats capable of compromising I. INTRODUCTION air-gapped networks, were found in the wild [14], [1], [15]. One of the initial phases in the kill chain of advanced C. Air-Gap Exfiltration persistent threats (APTs) is infiltrating the network of the target organization. To achieve this goal, adversaries may use Once the attacker has taken his/her its initial step into the attack vectors, such phishing emails, compromised websites, air-gapped network, he/she moves on to the next phases of malicious documents, exploit kits, and other types of online the kill chain. In these subsequent phases sensitive data is attacks [15]. collected, including: documents, files, keylogging, credentials, and biometric information. In the case of Internet connected A. Isolated, Air-Gapped Networks networks the data is exfiltrated through covert channels within When highly sensitive or confidential information is in- Internet protocols (e.g., HTTPS, FTP, SSH, and SMTP [61]). volved, an organization may resort to air-gapped networks. However, in isolated air-gapped networks, the attacker must Such networks are disconnected from the Internet logically use unconventional communication techniques to leak the data and physically, with any type of wired or wireless connection out - methods which are referred to as air-gap covert channels to the Internet strictly prohibited [3]. Certain sectors may [29]. Over the years, various types of air-gap covert channels arXiv:2012.06884v1 [cs.CR] 12 Dec 2020 maintain their data within air-gapped networks, including have been introduced. For example, malware may exploit financial, defense, and critical infrastructure sectors. In many electromagnetic radiation from various computer components cases, operational technology (OT) networks are also kept to transmit data [32], [51], [52], [60], [31]. Acoustic [19], isolated from the Internet to protect the physical processes and [40], optical [55], [44], [45], thermal [35], magnetic [27], machinery used to carry them out [5]. Classified networks such and electric [42] air-gap covert channels have also been as the Joint Worldwide Intelligence Communications System demonstrated over the past 20 years [18]. are also known to be air-gapped [7]. D. Our Contribution B. Infecting Air-Gapped Networks In this paper we introduce a new type of covert channel Despite the high degree of isolation, air-gapped networks that exploits Wi-Fi to leak data from air-gapped networks. are not immune to cyber attacks. To penetrate highly secure The AIR-FI attack introduced in this paper does not require networks, motivated adversaries may employ complex attack Wi-Fi related hardware in the air-gapped computers. Instead, vectors, such as sabotaging the supply chain, compromising a we show that an attacker can exploit the DDR SDRAM buses third-party software, using malicious insiders, and exploiting to generate electromagnetic emissions in the 2.4 GHz Wi-Fi bands and encode binary data on top of it. We also show TABLE I that nearby Wi-Fi receivers, such smartphones, laptops, and SUMMARY OF EXISTING AIR-GAP COVERT CHANNELS Internet of Things (IoT) devices, can receive and decode the Type Method modulated data, and then send it to the attacker via the Internet. AirHopper (FM radio) [32], [34] GSMem (cellular frequencies) [31] The AIR-FI covert channel has the following characteristics: Electromagnetic USBee (USB bus emission) [33] • Requires no Wi-Fi transmitter. The method doesn’t AIR-FI (Wi-Fi frequencies) MAGNETO (CPU-generated magnetic fields) [27] require any type of Wi-Fi hardware in the air-gapped Magnetic ODINI (Faraday shield bypass) [46] computer. Instead, it uses the computer memory hardware Electric PowerHammer (power lines) [42] (DDR SDRAM) to generate the signals. Fansmitter (computer fan noise) [40] • Requires no special privileges. The transmitting code DiskFiltration (hard disk noise) [37] Ultrasound [47] Acoustic does not require special privileges (e.g., root), kernel MOSQUITO (speaker-to-speaker) [38] [39] drivers, or access to hardware resources. Furthermore, it POWER-SUPPLAY (Play sound from Power-Supply) [26] can be initiated from an ordinary user space process. CD-LEAK (sound from CD/DVD drives) [25] BitWhisper (CPU generated heat) [36] Thermal • Works in virtual machines (VMs). The covert channel HOTSPOT ( CPU generated heat received by a smartphone) [23] works effectively, even from within an isolated virtual LED-it-GO (hard drive LED) [44] machine. VisiSploit (invisible pixels) [30] Optical Keyboard LEDs [55] [41] • Has many potential receivers. Modern IT environments Router LEDs [43] are equipped with many types of Wi-Fi capable devices: aIR-Jumper (security cameras and infrared) [28] smartphones, laptops, IoT devices, sensors, embedded Vibrations AiR-ViBeR (computer fan vibrations) [24] systems and smart watches and other wearables devices. The attacker can potentially hack such equipment to receive the AIR-FI transmissions from air-gapped com- lines [42]. The data is modulated and conducted to the power puters. lines and received by an adversary tapping the wires. Several studies have proposed the use of optical emanations The rest of this paper is organized as follows: Related work from computers for covert communication. Loughry intro- is presented in Section II. The attack model is discussed in duced the use of keyboard LEDs [55]. Guri used the hard Section III. Technical background on DDR SDRAM and Wi- drive indicator LED [44], USB keyboard LEDs [41], router Fi is provided in Section IV. Sections V and VI, respectively, and switch LEDs [43], and security cameras and their IR LEDs contain details on signal generation and modulation, and data [28], in order to exfiltrate data from air-gapped computers. transmission and reception. In Section VII we present the Data can also be leaked optically through fast blinking images evaluation and measurement results. A set of countermeasures or low contrast bitmaps projected on the LCD screen [30]. is discussed in Section VIII, and we conclude in Section IX. Hanspach [47] used inaudible sound to establish a covert channel between air-gapped laptops equipped with speakers II. RELATED WORK and microphones. Guri et al introduced Fansmitter [40], Disk- Air-gap covert channels are classified into seven main cate- filtration [37], and CD-LEAK [25] malware which facilitates gories: electromagnetic, magnetic, electric, acoustic, thermal, the exfiltration of data from an air-gapped computer via optical and vibrational. noise intentionally generated from the PC fans, hard disk Kuhn showed that it is possible to exploit the electromag- drives [37], and CD/DVD drives [25]. In these methods, the netic emissions from the computer display unit to conceal transmitting computer does not need to be equipped with audio data [51]. AirHopper, presented in 2014, is a new exfiltration hardware or an internal or external speaker. Researchers also malware, capable of leaking data from air-gapped computers showed that the computer fans generate vibrations which can to a nearby smartphone via FM radio waves emitted from be sensed by a nearby smartphone using the accelerometer the screen cable [32], [34]. In 2015, Guri et al presented sensor [24]. Other papers presented malware that covertly turns GSMem [31], malware that transmit data from air-gapped the speakers and earphones connected to a PC into a pair computers to nearby mobile-phones using cellular frequencies. of eavesdropping microphones when a standard microphone USBee is malware that uses the USB data buses to generate is muted, turned off, or not present [38] [39]. Recently, electromagnetic signals [33]. researchers demonstrated how malware can turn the computer In order to prevent electromagnetic leakage, Faraday cages power supply into out-of-band speaker in order to exfiltrate can be used to shield sensitive systems. Guri et al presented information [26]. ODINI [46] and MAGNETO [27], two types of malware that Guri et al introduced BitWhisper [36] and HOTSPOT [23], can exfiltrate data from Faraday-caged air-gapped computers thermal-based covert channels enabling bidirectional commu- via magnetic fields generated by the computer’s CPU.
Recommended publications
  • Ereralregister
    ^ O N A L ^ ^ % Av I MANET I \f* ERERAL * s ^ XcQjP ^ ^ REGISTER VOLUME 20 ' V / J 9 3 4 NUMBER 238 O N i T t O ^ Washington, Thursday, December 8, 1955 TITLE 16— COMMERCIAL became, pursuant to § 3.21 of tHe rules CONTENTS of practice, tHe “Decision of tHe Com­ PRACTICES mission”. Agricultural Marketing Service Pa8® THe order to cease and desist is as Proposed rule making: Chapter I— Federal Trade Commission follows: U. S. standards: . [Docket 6384] I t is ordered, THat respondents Novel Cherries, sweet _________ 9017 Mfg. & Distributing Co., Inc., a corpora­ Grapefruit juice, deHydrated- 9020 Part 13—D igest of Cease and D esist tion, and its officers, and Sam Weitz and Orange juice, canned________ 9018 O rders RicHard WeitH, individually and as offi­ Agriculture Department NOVEL MFG. & DISTRIBUTING CO., INC., ET AL. cers of said corporation, and Russell See Agricultural Marketing Serv­ WeitH, individually and as general man­ ice; Commodity Stabilization Subpart—Advertising falsely or mis­ ager of said corporation, and respond­ Service ; Rural Electrification leadingly: § 13.125 Limited offers or sup­ Administration. ents’ representatives, agents and em­ ply; § 13.135 Nature: Product or service; Business and Defense Services § 13.155 Prices: Usual as reduced, special, ployees, directly or tHrougH any corpo­ etc. Subpart—:Misrepresenting oneself rate or otHer device, in connection witH Administration and goods—Goods: § 13.1685 Nature: tHe offering for sale, sale or distribution Rules and regulations: [Misrepresenting oneself and goods] — in commerce, as “commerce” is defined Titanium mill products; limita­ Prices: § 13.1825 Usual as reduced or to in tHe Federal Trade Commission Act, tions on required acceptance of rated orders______________ 9008 l)e increased.
    [Show full text]
  • Icue QL140 RGB 140Mm PWM Single Fan SKU Sheets 1 CORSAIR Icue QL140 RGB 140Mm PWM Single Fan
    CORSAIR iCUE QL140 RGB 140mm PWM Single Fan Embargo Date 14-Nov-19 First Customer Ship Date 8-Nov-19 Product Etail Title CORSAIR QL140 RGB 140mm Fan RGB Product Title CORSAIR iCUE QL140 RGB 140mm PWM Single Fan Product Name CORSAIR QL Series, QL140 RGB, 140mm RGB LED Fan, Single Pack Pre Order Option No Product Imagery Image Asset Overview 25 Word Product Description Give your PC spectacular lighting from any angle with a CORSAIR iCUE QL140 RGB PWM fan, equipped with 34 individually addressable RGB LEDs across four distinct light loops. Overview 50 Word Product Description Give your PC spectacular lighting from any angle with a CORSAIR iCUE QL140 RGB PWM fan, equipped with 34 individually addressable RGB LEDs across four distinct light loops. Pair with an existing QL140 RGB Dual Fan Kit or a CORSAIR iCUE RGB lighting controller (sold separately) to control and synchronize your RGB lighting through CORSAIR iCUE software. Keep your system cool with PWM speeds up to 1,250 RPM. OverviewOverview 100 Word Product Description Give your PC spectacular lighting from any angle with a CORSAIR iCUE QL140 RGB PWM fan, equipped with 34 individually addressable RGB LEDs across four distinct light loops. Pair with an existing QL140 RGB Dual Fan Kit or a CORSAIR iCUE RGB lighting controller (sold separately) to control and synchronize your RGB lighting through CORSAIR iCUE software. Keep your system cool with PWM speeds up to 1,250 RPM with a 140mm fan blade engineered to ensure both low noise operation and outstanding lighting. Complete with front and back-facing metal logos on the hub and anti-vibration rubber dampers to reduce vibration noise, QL140 RGB fans create spectacular lighting that doesn’t choose sides.
    [Show full text]
  • The Air-Gap Jumpers
    Ben-Gurion University of the Negev The Air-Gap Jumpers Mordechai Guri, PhD The Head of R&D, Cyber-Security Research Center Ben-Gurion University of the Negev, Israel About Me Computer scientist (PhD) Head of R&D Cyber-Security Research Center, BGU Co-founder of Morphisec Endpoint Security Research focus Advance Persistent Threats (APTs), Rootkits Security of embedded systems Low-level attacks/defense Mobile security Air-gap security A profile on my research at WIRED by Andy Greenberg: https://www.wired.com/story/air-gap-researcher-mordechai-guri/ Ben-Gurion University of the Negev ‹#› Papers and videos of this presentation can be found in my air-gap research page [1] https://cyber.bgu.ac.il/advanced-cyber/airgap Ben-Gurion University of the Negev ‹#› Agenda Background Threats, attack-vectors Air-gap jumping techniques (‘covert channels’) Demo videos Evaluation Countermeasures Ben-Gurion University of the Negev ‹#› Air Gap Definition: A cyber security measure that secures computer network by physically isolating it from unsecured networks, such as the Internet or another unsecured local area networks. Air Gap Examples of the types of networks or systems that may be air gapped: Military defense system Critical infrastructure command and control centers Computerized medical equipment and healthcare Banking and finance sectors Cryptocurrencies air-gapped (‘cold’) wallets, blockchain Ben-Gurion University of the Negev ‹#› Threats – Chain of Attack Phase Research Question • How attackers can place a malware in Infiltration
    [Show full text]
  • Multiple Documents
    Alex Morgan et al v. United States Soccer Federation, Inc., Docket No. 2_19-cv-01717 (C.D. Cal. Mar 08, 2019), Court Docket Multiple Documents Part Description 1 3 pages 2 Memorandum Defendant's Memorandum of Points and Authorities in Support of i 3 Exhibit Defendant's Statement of Uncontroverted Facts and Conclusions of La 4 Declaration Gulati Declaration 5 Exhibit 1 to Gulati Declaration - Britanica World Cup 6 Exhibit 2 - to Gulati Declaration - 2010 MWC Television Audience Report 7 Exhibit 3 to Gulati Declaration - 2014 MWC Television Audience Report Alex Morgan et al v. United States Soccer Federation, Inc., Docket No. 2_19-cv-01717 (C.D. Cal. Mar 08, 2019), Court Docket 8 Exhibit 4 to Gulati Declaration - 2018 MWC Television Audience Report 9 Exhibit 5 to Gulati Declaration - 2011 WWC TElevision Audience Report 10 Exhibit 6 to Gulati Declaration - 2015 WWC Television Audience Report 11 Exhibit 7 to Gulati Declaration - 2019 WWC Television Audience Report 12 Exhibit 8 to Gulati Declaration - 2010 Prize Money Memorandum 13 Exhibit 9 to Gulati Declaration - 2011 Prize Money Memorandum 14 Exhibit 10 to Gulati Declaration - 2014 Prize Money Memorandum 15 Exhibit 11 to Gulati Declaration - 2015 Prize Money Memorandum 16 Exhibit 12 to Gulati Declaration - 2019 Prize Money Memorandum 17 Exhibit 13 to Gulati Declaration - 3-19-13 MOU 18 Exhibit 14 to Gulati Declaration - 11-1-12 WNTPA Proposal 19 Exhibit 15 to Gulati Declaration - 12-4-12 Gleason Email Financial Proposal 20 Exhibit 15a to Gulati Declaration - 12-3-12 USSF Proposed financial Terms 21 Exhibit 16 to Gulati Declaration - Gleason 2005-2011 Revenue 22 Declaration Tom King Declaration 23 Exhibit 1 to King Declaration - Men's CBA 24 Exhibit 2 to King Declaration - Stolzenbach to Levinstein Email 25 Exhibit 3 to King Declaration - 2005 WNT CBA Alex Morgan et al v.
    [Show full text]
  • User's Manual
    Models: LE39S406/LE39H316 39” Class (38.57” Diagonal) LE32S406/LE32H316 32” Class (31.51” Diagonal) Owner’s Guide Simulated image. Image may differ from actual product. The lightning flash with arrowhead symbol, within an equilateral triangle is intended to alert the user to the presence of uninsulated dangerous voltage within the product's enclosure that may be of sufficient magnitude to constitute a risk of electric shock. CAUTION: TO REDUCE THE RISK OF ELECTRIC SHOCK, DO NOT REMOVE COVER The exclamation point within an equilateral triangle is (OR BACK). NO USER-SERVICEABLE intended to alert the user to the presence of important PARTS INSIDE. REFER SERVICING TO operating and maintenance (servicing) instructions in the QUALIFIED SERVICE PERSONNEL. literature accompanying the appliance. WARNING: TO PREVENT FIRE OR SHOCK HAZARD, DO NOT EXPOSE THIS APPLIANCE TO RAIN OR MOISTURE. TO PREVENT THE SPREAD OF FIRE, KEEP CANDLES OR OPEN FLAMES AWAY FROM THIS PRODUCT AT ALL TIMES. CAUTION: TO PREVENT ELECTRIC SHOCK, DO NOT USE THIS POLARIZED PLUG WITH AN EXTENSION CORD, RECEPTACLE OR OTHER OUTLET UNLESS THE BLADES CAN BE FULLY INSERTED TO PREVENT BLADE EXPOSURE. WARNING: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.
    [Show full text]
  • Hardware Components and Internal PC Connections
    Technological University Dublin ARROW@TU Dublin Instructional Guides School of Multidisciplinary Technologies 2015 Computer Hardware: Hardware Components and Internal PC Connections Jerome Casey Technological University Dublin, [email protected] Follow this and additional works at: https://arrow.tudublin.ie/schmuldissoft Part of the Engineering Education Commons Recommended Citation Casey, J. (2015). Computer Hardware: Hardware Components and Internal PC Connections. Guide for undergraduate students. Technological University Dublin This Other is brought to you for free and open access by the School of Multidisciplinary Technologies at ARROW@TU Dublin. It has been accepted for inclusion in Instructional Guides by an authorized administrator of ARROW@TU Dublin. For more information, please contact [email protected], [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License Higher Cert/Bachelor of Technology – DT036A Computer Systems Computer Hardware – Hardware Components & Internal PC Connections: You might see a specification for a PC 1 such as "containing an Intel i7 Hexa core processor - 3.46GHz, 3200MHz Bus, 384 KB L1 cache, 1.5MB L2 cache, 12 MB L3 cache, 32nm process technology; 4 gigabytes of RAM, ATX motherboard, Windows 7 Home Premium 64-bit operating system, an Intel® GMA HD graphics card, a 500 gigabytes SATA hard drive (5400rpm), and WiFi 802.11 bgn". This section aims to discuss a selection of hardware parts, outline common metrics and specifications
    [Show full text]
  • HP 17 Laptop PC Maintenance and Service Guide
    HP 17 Laptop PC Maintenance and Service Guide © Copyright 2018 HP Development Company, Product notice Software terms L.P. This user guide describes features that are By installing, copying, downloading, or AMD and AMD Radeon are trademarks of common to most models. Some features may otherwise using any software product Advanced Micro Devices, Inc. Bluetooth is a not be available on your computer. preinstalled on this computer, you agree to be trademark owned by its proprietor and used by bound by the terms of the HP End User License HP Inc. under license. Intel and Core are Not all features are available in all editions of Agreement (EULA). If you do not accept these trademarks of Intel Corporation in the U.S. and Windows. This computer may require upgraded license terms, your sole remedy is to return the other countries. Microsoft and Windows are and/or separately purchased hardware, drivers entire unused product (hardware and software) trademarks of the Microsoft group of and/or software to take full advantage of within 14 days for a full refund subject to the companies. Windows functionality. Go to refund policy of your seller. http://www.microsoft.com for details. The information contained herein is subject to For any further information or to request a full change without notice. The only warranties for refund of the price of the computer, please HP products and services are set forth in the contact your seller. express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
    [Show full text]
  • Owner's Guide
    OWNER’S GUIDE Model: 40K31 40” Class (39.50” Diag.) Serial No. CONGRATULATIONS Thank you for purchasing this Hitachi product. Please read these instructions carefully. For additional assistance please call Toll Free 800.HITACHI (800.448.2244) or visit our website at www.hitachi.us/tv. Keep this Owner’s Guide for future reference. Record the model name and serial number of your LCD Television forOG_48C6_09132016 future reference. This information is located on the back of the television. OG_40K31_073118 The lightning flash with arrowhead symbol, within an equilateral triangle is intended to alert the user to the presence of uninsulated dangerous voltage within the product's enclosure that may be of sufficient magnitude to constitute a risk of electric shock. CAUTION: TO REDUCE THE RISK OF ELECTRIC SHOCK, DO NOT REMOVE COVER The exclamation point within an equilateral triangle is (OR BACK). NO USER-SERVICEABLE intended to alert the user to the presence of important PARTS INSIDE. REFER SERVICING TO operating and maintenance (servicing) instructions in the QUALIFIED SERVICE PERSONNEL. literature accompanying the appliance. WARNING: TO PREVENT FIRE OR SHOCK HAZARD, DO not ExPOSE THIS APPLIANCE to RAIN OR moisture. TO PREVENT THE SPREAD OF FIRE, KEEP CANDLES OR OPEN FLAMES AWAY FROM THIS PRODUCT AT ALL TIMES. CAUTION: TO PREVENT ELECTRIC SHOCK, DO NOT USE THIS TELEVISION’S AC PLUG WITH AN ExTENSION CORD, RECEPTACLE OR OTHER OUTLET UNLESS THE BLADES CAN BE FULLY INSERTED TO PREVENT BLADE ExPOSURE LEAD NOTICE This product contains lead. Dispose of this product in accordance with applicable environmental laws. For product recycling and disposal information, contact your local government agency or www.eRecycle.org (in California), the Electronic Industries Alliance at www.
    [Show full text]
  • INSTRUCTIONS 1 Introduction
    2.4 GHz 80-Channel Transceiver 2.4GHz PS16-Mini-R / T PowerSync Mini Digital Radio Slave INSTRUCTIONS 1 Introduction Thank you for choosing Impact. Impact’s PowerSync Mini is a sixteen-channel radio slave system that’s a reliable, professional-grade solution to remotely trigger portable on-camera flashes and studio monolights. Add additional receivers, and the PowerSync Mini system will control multi-light setups and allow you to trigger as many flash units as your setup requires. The PowerSync Mini system features 16 user-selectable channels that allow you to work in the most demanding conditions, without fear of interference from other photographers or radio slave systems in the area. The 2.4 GHz radio signal lets you control your flashes without line-of-sight, and it offers an exceptional operating range of 328 ft. (100 m) as well as a maximum sync speed of 1/200 sec. The receiver is equipped with a multi-use hot shoe that’s compatible with most on-camera flash units. Connecting the receiver to a camera with a compatible release cable (not included) makes it possible to trigger a single- or multi-camera setup by using the transmitter as a handheld remote. 2 Precautions • Please read and follow these instructions, and keep this manual in a safe place. • Keep this unit away from water and any flammable gases or liquids. • Do not attempt to disassemble or repair the equipment—doing so will void the warranty, and Impact will not be responsible for any damage. • The Impact PowerSync is an accessory device for flash photography.
    [Show full text]
  • Airhopper: Bridging the Air-Gap Between Isolated Networks and Mobile Phones Using Radio Frequencies
    AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies Mordechai Guri1, Gabi Kedma1, Assaf Kachlon1, Yuval Elovici1,2 1Department of Information Systems Engineering, Ben-Gurion University 2Telekom Innovation Laboratories at Ben-Gurion University {gurim, gabik, assafka}@post.bgu.ac.il, [email protected] Abstract innovative and persistent attacker will eventually find a way to breach the network, to eavesdrop, and to Information is the most critical asset of modern transmit sensitive data outward. organizations, and accordingly coveted by adversaries. Accordingly, when a network is used to deliver When highly sensitive data is involved, an organization highly sensitive data, or to connect computers that may resort to air-gap isolation, in which there is no store or process such data, the so called 'air gap' networking connection between the inner network and approach is often applied. In an air-gapped network, the external world. While infiltrating an air-gapped there is no physical networking connection (wired or network has been proven feasible in recent years (e.g., wireless) with the external world, either directly or Stuxnet), data exfiltration from an air-gapped network indirectly through another, less secure network. is still considered to be one of the most challenging Nevertheless, employees may carry their mobile phases of an advanced cyber-attack. phones around the organization's workplace, possibly In this paper we present "AirHopper", a bifurcated within the vicinity of a classified computer which is malware that bridges the air-gap between an isolated part of an air-gapped network. This may occur despite network and nearby infected mobile phones using FM reasonable security procedures, and does not require signals.
    [Show full text]
  • Dell Precision Workstation 350 User's Guide
    Dell Precision™ Workstation 350 User's Guide Information About Your Computer Finding Information for Your Computer Specifications Your Computer Front View Back View Inside Your Computer System Board Components Cleaning Your Computer Before Cleaning Your Computer Computer, Keyboard, and Monitor Mouse Floppy Drive CDs and DVDs Advanced Features LegacySelect Technology Control Manageability Security Password Protection System Setup Jumper Settings Power Button Connecting an IEEE 1394 Device TAPI Hyper-Threading Microsoft® Windows® XP Features Overview New User Interface Files and Settings Transfer Wizard Application and Device Compatibility System Restore User Accounts and Fast User Switching Home and Small Office Networking Internet Connection Firewall Removing and Installing Computer Parts Opening the Computer Cover Drives PCI Cards AGP Card Microprocessor Memory Battery Closing the Computer Cover Solving Problems Battery Problems Card Problems Drive Problems Dropped or Damaged Computer E-Mail, Modem, and Internet Problems Error Messages General Problems IEEE 1394 Device Problems Keyboard Problems Memory Problems Mouse Problems Network Problems Power Problems Printer Problems Serial or Parallel Device Problems Sound and Speaker Problems System Board Problems Video and Monitor Problems Advanced Troubleshooting Diagnostic Lights Beep Codes Dell Diagnostics Drivers Using System Restore Resolving Software and Hardware Incompatibilities Getting Help Technical Assistance Problems With Your Order Product Information Returning Items for Warranty Repair or Credit Before You Call Contacting Dell Warranty and Return Policy Ergonomic Computing Habits Regulatory Notices Glossary NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem.
    [Show full text]
  • The Israeli Parliamentary Elections: a Splintering of the Arab Consensus?
    INFO PACK The Israeli Parliamentary Elections: A Splintering of the Arab Consensus? Fatih Şemsettin Işık INFO PACK The Israeli Parliamentary Elections: A Splintering of the Arab Consensus? Fatih Şemsettin Işık The Israeli Parliamentary Elections: A Splintering of the Arab Consensus? © TRT WORLD RESEARCH CENTRE ALL RIGHTS RESERVED PUBLISHER TRT WORLD RESEARCH CENTRE March 2021 WRITTEN BY Fatih Şemsettin Işık PHOTO CREDIT ANADOLU AGENCY TRT WORLD İSTANBUL AHMET ADNAN SAYGUN STREET NO:83 34347 ULUS, BEŞİKTAŞ İSTANBUL / TURKEY TRT WORLD LONDON 200 GRAYS INN ROAD, WC1X 8XZ LONDON / UNITED KINGDOM TRT WORLD WASHINGTON D.C. 1819 L STREET NW SUITE, 700 20036 WASHINGTON DC / UNITED STATES www.trtworld.com researchcentre.trtworld.com The opinions expressed in this Info Pack represent the views of the author(s) and do not necessarily reflect the views of the TRT World Research Centre. 4 The Israeli Parliamentary Elections: A Splintering of the Arab Consensus? Introduction n March 3, 2020, the leader of the alliance, it is clear that the representation of Arab Joint List, an alliance of four Arab citizens of Israel has been undermined by the latest parties in Israel, proudly declared departure. Moreover, Ra’am’s exit also revealed the that they had won a huge achieve- fragility and vulnerability of this alliance, a reality that O ment in the parliamentary elections reflects internal disputes between the parties. by winning 15 seats in the Knesset, a record for Arab parties in Israel. Ayman Odeh, the leader of Hadash This info pack presents the latest situation concern- (The Democratic Front for Peace and Equality) party, ing Arab political parties in Israel ahead of the March urged “actual equality between Arabs and Jews and 23 elections.
    [Show full text]