COVID-bit: Keep a Distance of (at least) 2m From My Air-Gap Computer!

12/07/2022
by   Mordechai Guri, et al.
0

Air-gapped systems are isolated from the Internet due to the sensitive information they handle. This paper presents COVID-bit, a new COVert channel attack that leaks sensitive information over the air from highly isolated systems. The information emanates from the air-gapped computer over the air to a distance of 2m and more and can be picked up by a nearby insider or spy with a mobile phone or laptop. Malware on an air-gapped computer can generate radio waves by executing crafted code on the target system. The malicious code exploits the dynamic power consumption of modern computers and manipulates the momentary loads on CPU cores. This technique allows the malware to control the computer's internal utilization and generate low-frequency electromagnetic radiation in the 0 - 60 kHz band. Sensitive information (e.g., files, encryption keys, biometric data, and keylogging) can be modulated over the emanated signals and received by a nearby mobile phone at a max speed of 1000 bits/sec. We show that a smartphone or laptop with a small $1 antenna carried by a malicious insider or visitor can be used as a covert receiver. Notably, the attack is highly evasive since it executes from an ordinary user-level process, does not require root privileges, and is effective even within a Virtual Machine (VM). We discuss the attack model and provide technical details. We implement air-gap transmission of texts and files, and present signal generation and data modulation. We test the covert channel and show evaluation results. Finally, we present a set of countermeasures to this air-gap attack.

READ FULL TEXT

page 1

page 3

page 6

page 7

page 11

research
09/30/2021

LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables

Air-gapped networks are wired with Ethernet cables since wireless connec...
research
02/04/2020

BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness

Air-gapped computers are systems that are kept isolated from the Interne...
research
05/01/2020

POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers

It is known that attackers can exfiltrate data from air-gapped computers...
research
04/10/2018

PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines

In this paper we provide an implementation, evaluation, and analysis of ...
research
09/21/2020

Using Inaudible Audio and Voice Assistants to Transmit Sensitive Data over Telephony

New security and privacy concerns arise due to the growing popularity of...
research
02/08/2018

ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields

Air-gapped computers are computers which are kept isolated from the Inte...
research
07/15/2022

SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables

This paper introduces a new type of attack on isolated, air-gapped works...

Please sign up or login with your details

Forgot password? Click here to reset