Banking And InsuranceCryptocurrencyDigital MarketingErpFood And BeveragesHealthcareLegalMarketing And AdvertisingMedia And EntertainmentMetals And MiningOil And GasRetailTelecom
Artificial IntelligenceBig DataCloudCyber SecurityE CommerceEducationGaming And VfxIT ServiceMobileNetworkingSAPScience And TechnologySecuritySoftwareStorage
CiscoDatabaseGoogleIBMJuniperM2MMicrosoftOracleRed Hat
CEO ReviewCompany Review

The Silicon Review Asia

Even Air-Gapped Computers Can Covertly Exchange Data: MOSQUITO Attack

Even Air-Gapped Computers Can Covertly Exchange Data: MOSQUITO Attack

Last month, a team of security researchers demonstrated how cyber attackers could pwn air-gapped computers protected inside a Faraday cage and steal data from them. The same team two years also demonstrated how attackers could listen to private conversations by reversing headphones into a microphone, like a bug listening device.

Recently, this outstanding team of researchers has taken their work to the next level and came up with another report showing how two or more air-gapped computers placed inside the same room can secretly communicate and exchange data via ultrasonic waves.

Air-gapped computers are believed to be the most secure setup, but now it seems to be a myth. Dubbed as MOSQUITO, a new attack has been unearthed by a team of researchers at Israel's Ben Gurion University. This attack works by reversing connected speakers into microphones by exploiting a specific audio chip feature.

Since some speakers or headphones or earphones respond really well to the near-ultrasonic range (18 kHz to 24 kHz), the team has found that such hardware can be modified to perform as microphones. Furthermore, when it is about secret communication, it is obvious that two or more computers can never exchange data via audible sounds. So, inaudible ultrasonic waves offer the best acoustic covert route for speaker-to-speaker communication.

The proof-of-concept videos of the MOSQUITO attack scenarios demonstrated by researchers have been uploaded to YouTube. The videos involve two air-gap computers inside a room, which are infected with malware using removable media. The attack scenarios include speaker-to-speaker communication, speaker-to-headphones communication, and headphones-to-headphones communication.

The results are:

  • The speaker-to-speaker communication works pretty well to secretly transmit data between two air-gapped computers positioned at a maximum of nine meters away from one another.
  • Two headphones with microphones can also exchange data from a distance of three meters apart.
  • By using loudspeakers, data can be exchanged over an air-gap computer from a distance of eight meters away with an effective bit rate of 10 to 166 bit per second.


Pine Labs Reaffirms its Commitment to Indian Payments Space with Qfix Acquisition

HDFC Bank is Qfix's main distribution partner Pine Labs has announced that it has acquired Qfix, a Mumbai-based online payments startup. This acquisi...

Salesforce Expands into Thailand, Opens Office in Bangkok

Salesforce has announced permanent presence in Thailand by launching its new office in the country’s capital, Bangkok. The permanent presence wi...

GMLL is expected to soon add two more stores to its retail arm ‘Price Mantra’

Garment Mantra Lifestyle, a popular name in the Indian fashion retail segment, recently made an announcement that the company is expanding its retail ...

Tariff plans will cost higher from the next financial year as telecom companies are gearing up to increase rates

The ongoing Covid pandemic had significantly increased the number of mobile and internet users worldwide. The high amount of usage is expected to drop...