'James Bonds' Will Be Able to Steal Data With This New Air Malware
Dec 04, 2013 19:43
Here's some nightmarish news: a bunch of computer scientists have made a new breed of malware which can leap between devices using inaudible audio signals. The malware will then covertly transmit passwords and other sensitive data without a network connection.
Talk about a security network's nightmare. The malware will use built-in microphones and speakers, and can transmit passwords and other small quantities of data over distances of 65 feet. Which means, real life James Bonds will be more adept at espionage.
Talking to Ars Technica, the computer scientists, from Germany's Fraunhofer Institute for Communication, Information Processing, and Ergonomics, explained:
"In our article, we describe how the complete concept of air gaps can be considered obsolete as commonly available laptops can communicate over their internal speakers and microphones and even form a covert acoustical mesh network. Over this covert network, information can travel over multiple hops of infected nodes, connecting completely isolated computing systems and networks (e.g. the internet) to each other."
The technique allowed the team to transmit data between two Lenovo T400 laptops using their built-in microphones and speakers. They achieved a data rate of 20 bits per second, which is plenty enough to grab passwords and other smaller files. They explain:
"This small bandwidth might actually be enough to transfer critical information (such as keystrokes). You don't even have to think about all keystrokes. If you have a keylogger that is able to recognize authentication materials, it may only occasionally forward these detected passwords over the network, leading to a very stealthy state of the network. And you could forward any small-sized information such as private encryption keys or maybe malicious commands to an infected piece of construction."
The HONOR Magic 7 Pro price in ksa makes it an appealing option for those looking for a high-end smartphone. This advanced device stands out with its sleek design and robust build quality. This blog delves into the details, examining what makes the HONOR Magic 7 Pro unique, from the materials used to its overall durability and user experience. If you’re considering purchasing a high-end smartphone that balances aesthetics and functionality, this review of the HONOR Magic 7 Pro’s design and build quality will provide you with all the information you need. Read more
Organizations continue to reside under substantial pressure to provide security and compliance with data in the current-day complex regulatory ambiance. Enter endpoint management — a strategic approach to managing and securing devices, that has become a key tool for achieving these objectives. Endpoint management solutions assist organizations with stringent compliance requirements by establishing a single interface for monitoring, controlling, and securing devices. Read more
Application security is the face of organizational success in today's digital transformation era. It has been brought about by rising cyberattacks against applications that are forcing businesses to choose strong security solutions. With application security software, one is capable of protecting sensitive data, regulating compliance, and maintaining trust with customers. In this blog, we will review how to evaluate and pick the best application security testing tools, with a spotlight on the capabilities of HCL AppScan. Read more