Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Hacking Air-Gapped Computers Using Heat


  • Please log in to reply
4 replies to this topic

#1 NickAu

NickAu

    Bleepin' Fish Doctor


  • Moderator
  • 13,827 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:127.0.0.1 Australia
  • Local time:02:44 AM

Posted 30 March 2015 - 02:19 AM

 

An air-gapped computer system isolated from the Internet and other computers that are connected to external networks believes to be the most secure computers on the planet -- Yeah?? You need to think again before calling them 'safe'.
 
A group of Israeli security researchers at the Cyber Security Labs from Ben Gurion University have found a new technique to hack ultra-secure air-gapped computers and retrieve data using only heat emissions and a computer’s built-in thermal sensors.
 
WHAT IS AIR-GAPPED COMPUTERS ?
Air-gapped computers or systems are considered to be the most secure and safest computer systems. These systems are isolated from the Internet or any other commuters that are connected to the Internet or external network.
 
 

Air-gapped systems are used in situations that demand high security because it’s very difficult to siphon data from these systems, as it requires a physical access to the machine which is possible by using removable device such as a USB flash drive or a firewire cable.
 
Air-gapped computers are classified military networks, the payment networks that process credit and debit card transactions for retailers, and in industrial control systems that operate critical infrastructure of the Nation. Even journalists use them to prevent intruders from remotely accessing sensitive data.
Hacking Air-Gapped Computers Using Heat

 

Next we will have hacking a pc that's turned off.



BC AdBot (Login to Remove)

 


#2 Animal

Animal

    Bleepin' Animinion


  • Members
  • 35,905 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Where You Least Expect Me To Be
  • Local time:07:44 AM

Posted 30 March 2015 - 11:42 AM

Next we will have hacking a pc that's turned off.


With the perfect environment created and pre-planning in a lab. It can probably be done. :hysterical:

Lets see how feasible this heat exchange hacking is in the real world, where air gapped computers are behind 4, 5, 6 or more layers of physical security. And that one key element of physical access to compromise the computer doesn't happen. Because it can be done in a lab in a controlled environment doesn't mean it can happen that easily in the real world.

The Internet is so big, so powerful and pointless that for some people it is a complete substitute for life.
Andrew Brown (1938-1994)


A learning experience is one of those things that say, "You know that thing you just did? Don't do that." Douglas Adams (1952-2001)


"Imagination is more important than knowledge. Knowledge is limited. Imagination circles the world." Albert Einstein (1879-1955)


Follow BleepingComputer on: Facebook | Twitter | Google+


#3 mjd420nova

mjd420nova

  • Members
  • 1,913 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:44 AM

Posted 30 March 2015 - 08:02 PM

This really sounds like someones pipe dream.  The huge mainframe systems are usually accompanied by dozens of monitors, hundreds of drives and all their peripherals needed to run large systems.  I have yet to see any with a USB port.  Maybe at an outlying modem driven office with PCs emulating a mainframe and using a DSL for local internet,  and their links are seriously secured but when penetration can only be by hand and not some worm on the internet. 



#4 Crazy Cat

Crazy Cat

  • Members
  • 808 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Lunatic Asylum
  • Local time:03:44 AM

Posted 01 April 2015 - 11:04 PM

Imagine an electronic device, using micro Surface Mount Devices (SMD), or 1 wafer thin chip, smaller than 19mm x 23mm, a Pentium sticker. The device is hidden behind the sticker, and can compromise the computer through Tempest methodology.

I can't elaborate further, or give you schematics.

Pipe dream or real?

IntPentXE.jpg
 

Two things are infinite: the universe and human stupidity; and I'm not sure about the universe. ― Albert Einstein ― Insanity is doing the same thing, over and over again, but expecting different results.

 

InternetDefenseLeague-footer-badge.png


#5 mjd420nova

mjd420nova

  • Members
  • 1,913 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:44 AM

Posted 03 April 2015 - 10:09 AM

Of course there are many ways to get a device placed under a sticker on any one of the many chips in aboard.  Having interception equipment close enough to collect those extremely tiny signals is the important detail.  Almost anything is possible if anyone gets unauthorized access to secured spaces.






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users