2017
DOI: 10.1007/978-3-319-60876-1_8
|View full text |Cite
|
Sign up to set email alerts
|

LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
60
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
2

Relationship

2
8

Authors

Journals

citations
Cited by 83 publications
(60 citation statements)
references
References 12 publications
0
60
0
Order By: Relevance
“…A Snoopy drone can exploit the WiFi, impersonate the identified network and trick smart devices into joining it, so as to collect all the information entered on this disguised network. In addition, UAVs can perform 3D through-wall mapping [ 116 ], leak data from air-gap computers [ 117 ], or even carry traditional spying devices to eavesdrop on conversations [ 5 ]. With the use of RFID tags, attack targets can be traced by a RFID reader at distances varying from one up to a few hundred meters [ 118 ].…”
Section: Attacks With Drones In Airport Critical Infrastructures: mentioning
confidence: 99%
“…A Snoopy drone can exploit the WiFi, impersonate the identified network and trick smart devices into joining it, so as to collect all the information entered on this disguised network. In addition, UAVs can perform 3D through-wall mapping [ 116 ], leak data from air-gap computers [ 117 ], or even carry traditional spying devices to eavesdrop on conversations [ 5 ]. With the use of RFID tags, attack targets can be traced by a RFID reader at distances varying from one up to a few hundred meters [ 118 ].…”
Section: Attacks With Drones In Airport Critical Infrastructures: mentioning
confidence: 99%
“…Note that several APTs discovered in the last decade are capable of infecting air-gapped networks [40], e.g., Turla [41], RedOctober [42], and Fanny [43]. As a part of the targeted attack, the adversary may infiltrate BitWhisper [35] Optical Hard drive LED (LED-it-GO) [30] VisiSploit (invisible pixels) [32] Keyboard LEDs [30] Router LEDs [31] Infrared (IR) aIR-Jumper (security cameras & infrared) [34] Implanted infrared LEDs [33] the air-gapped networks using social engineering, supply chain attacks, or insiders. Receiver Implantation.…”
Section: Magneticmentioning
confidence: 99%
“…By modulating the blinking pattern, the attacker can exfiltrate some stolen information (e.g., user credentials) to a remote location. This has been demonstrated with hard-drives, monitors, and networking equipment [ 27 ].…”
Section: Attacksmentioning
confidence: 99%