MAGNETO: Covert Channel between Air-Gapped Systems and Nearby Smartphones via CPU-Generated Magnetic Fields

02/07/2018
by   Mordechai Guri, et al.
0

In this paper, we show that attackers can leak data from isolated, air-gapped computers to nearby smartphones via covert magnetic signals. The proposed covert channel works even if a smartphone is kept inside a Faraday shielding case, which aims to block any type of inbound and outbound wireless communication (Wi-Fi, cellular, Bluetooth, etc.). The channel also works if the smartphone is set in airplane mode in order to block any communication with the device. We implement a malware that controls the magnetic fields emanating from the computer by regulating workloads on the CPU cores. Sensitive data such as encryption keys, passwords, or keylogging data is encoded and transmitted over the magnetic signals. A smartphone located near the computer receives the covert signals with its magnetic sensor. We present technical background, and discuss signal generation, data encoding, and signal reception. We show that the proposed covert channel works from a user-level process, without requiring special privileges, and can successfully operate from within an isolated virtual machine (VM).

READ FULL TEXT

page 4

page 5

page 9

research
02/08/2018

ODINI : Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields

Air-gapped computers are computers which are kept isolated from the Inte...
research
08/21/2022

GAIROSCOPE: Injecting Data from Air-Gapped Computers to Nearby Gyroscopes

It is known that malware can leak data from isolated, air-gapped compute...
research
04/13/2020

AiR-ViBeR: Exfiltrating Data from Air-Gapped Computers via Covert Surface ViBrAtIoNs

Air-gap covert channels are special types of covert communication channe...
research
02/04/2020

BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness

Air-gapped computers are systems that are kept isolated from the Interne...
research
09/30/2021

LANTENNA: Exfiltrating Data from Air-Gapped Networks via Ethernet Cables

Air-gapped networks are wired with Ethernet cables since wireless connec...
research
05/01/2020

POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers

It is known that attackers can exfiltrate data from air-gapped computers...
research
04/10/2018

PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines

In this paper we provide an implementation, evaluation, and analysis of ...

Please sign up or login with your details

Forgot password? Click here to reset