• DocumentCode
    1785294
  • Title

    AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies

  • Author

    Guri, Mordechai ; Kedma, Gabi ; Kachlon, Assaf ; Elovici, Yuval

  • Author_Institution
    Dept. of Inf. Syst. Eng., Ben-Gurion Univ., Beer-Sheva, Israel
  • fYear
    2014
  • fDate
    28-30 Oct. 2014
  • Firstpage
    58
  • Lastpage
    67
  • Abstract
    Information is the most critical asset of modern organizations, and accordingly coveted by adversaries. When highly sensitive data is involved, an organization may resort to air-gap isolation, in which there is no networking connection between the inner network and the external world. While infiltrating an air-gapped network has been proven feasible in recent years (e.g., Stuxnet), data exfiltration from an air-gapped network is still considered to be one of the most challenging phases of an advanced cyber-attack. In this paper we present "AirHopper", a bifurcated malware that bridges the air-gap between an isolated network and nearby infected mobile phones using FM signals. While it is known that software can intentionally create radio emissions from a video display unit, this is the first time that mobile phones are considered in an attack model as the intended receivers of maliciously crafted radio signals. We examine the attack model and its limitations, and discuss implementation considerations such as stealth and modulation methods. Finally, we evaluate AirHopper and demonstrate how textual and binary data can be exfiltrated from physically isolated computer to mobile phones at a distance of 1-7 meters, with effective bandwidth of 13-60 Bps (Bytes per second).
  • Keywords
    invasive software; mobile radio; modulation; AirHopper; FM signals; air-gap isolation; bifurcated malware; cyber-attack; data exfiltration; distance 1 m to 7 m; isolated networks; maliciously crafted radio signals; mobile phones; modulation methods; radio emissions; radio frequencies; stealth methods; video display unit; Computers; Frequency modulation; Mobile handsets; Monitoring; Receivers; Software;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on
  • Conference_Location
    Fajardo, PR
  • Print_ISBN
    978-1-4799-7328-6
  • Type

    conf

  • DOI
    10.1109/MALWARE.2014.6999418
  • Filename
    6999418