2021-12-12 20:00:14
Attacks that require malware implanted in some devices:
Exfiltration of Data through a Malware infected Router:
Exfiltration of Data through observation of Light variation in a Backlit keyboard with a compromised camera:
Exfiltration of Data through a compromised Security Camera (that could first use the previous attack)
Communication from outsider to compromised Security Cameras through IR light signals:
Exfiltration of data from a compromised air-gapped computer through acoustic analysis of the FAN noises with a smartphone
Exfiltration of data from a malware-infected air-gapped computer through HD LEDs with a Drone
Exfiltration of data from a USB malware on an air-gapped computer through electromagnetic interferences
Exfiltration of data from a malware-infected HDD drive through covert acoustic noise
Exfiltration of data through GSM frequencies from a compromised (with malware) air-gapped computer
Exfiltration of data through electromagnetic emissions from a compromised Display device
Exfiltration of data through magnetic waves from a compromised air-gapped computer to a Smartphone stored inside a Faraday bag
Communication between two compromised air-gapped computers using ultrasonic soundwaves
Exfiltration of Bitcoin Wallet from a compromised air-gapped computer to a smartphone
Exfiltration of Data from a compromised air-gapped computer using display brightness
Exfiltration of Data from a compromised air-gapped computer through vibrations
Exfiltration of Data from a compromised air-gapped computer by turning RAM into a Wi-Fi emitter
Exfiltration of Data from a compromised air-gapped computer through power lines https://arxiv.org/abs/1804.04014
Attacks that require no malware:
Observing a blank wall in a room from a distance to figure how many people are in a room and what they are doing. Publication with demonstration: http://wallcamera.csail.mit.edu/
Observing a reflective bag of snacks in a room from a distance to reconstruct the entire room. Publication with photographic examples: https://arxiv.org/abs/2001.04642
Measuring floor vibrations to identify individuals and determine their health condition and mood. Publication with demonstration: https://engineering.cmu.edu/news-events/news/2020/02/17-mauraders-map.html
Observing a light bulb from a distance to listen to the sound in the room without any malware: Demonstration:
It should be noted that this type of attack is not new at all and there have been articles about such techniques as far back as 2013 and that you can even buy devices to perform this yourself such as here: http://www.gcomtech.com/ccp0-prodshow/laser-surveillance-laser-listening.html
2.3K viewsedited 17:00