Get Mystery Box with random crypto!

Attacks that require malware implanted in some devices: Exfil | Privacy & Security Goys

Attacks that require malware implanted in some devices:

Exfiltration of Data through a Malware infected Router:


Exfiltration of Data through observation of Light variation in a Backlit keyboard with a compromised camera:


Exfiltration of Data through a compromised Security Camera (that could first use the previous attack)


Communication from outsider to compromised Security Cameras through IR light signals:


Exfiltration of data from a compromised air-gapped computer through acoustic analysis of the FAN noises with a smartphone


Exfiltration of data from a malware-infected air-gapped computer through HD LEDs with a Drone


Exfiltration of data from a USB malware on an air-gapped computer through electromagnetic interferences


Exfiltration of data from a malware-infected HDD drive through covert acoustic noise


Exfiltration of data through GSM frequencies from a compromised (with malware) air-gapped computer


Exfiltration of data through electromagnetic emissions from a compromised Display device


Exfiltration of data through magnetic waves from a compromised air-gapped computer to a Smartphone stored inside a Faraday bag


Communication between two compromised air-gapped computers using ultrasonic soundwaves


Exfiltration of Bitcoin Wallet from a compromised air-gapped computer to a smartphone


Exfiltration of Data from a compromised air-gapped computer using display brightness


Exfiltration of Data from a compromised air-gapped computer through vibrations


Exfiltration of Data from a compromised air-gapped computer by turning RAM into a Wi-Fi emitter


Exfiltration of Data from a compromised air-gapped computer through power lines https://arxiv.org/abs/1804.04014

Attacks that require no malware:

Observing a blank wall in a room from a distance to figure how many people are in a room and what they are doing. Publication with demonstration: http://wallcamera.csail.mit.edu/
Observing a reflective bag of snacks in a room from a distance to reconstruct the entire room. Publication with photographic examples: https://arxiv.org/abs/2001.04642
Measuring floor vibrations to identify individuals and determine their health condition and mood. Publication with demonstration: https://engineering.cmu.edu/news-events/news/2020/02/17-mauraders-map.html
Observing a light bulb from a distance to listen to the sound in the room without any malware: Demonstration:

It should be noted that this type of attack is not new at all and there have been articles about such techniques as far back as 2013 and that you can even buy devices to perform this yourself such as here: http://www.gcomtech.com/ccp0-prodshow/laser-surveillance-laser-listening.html