Question
-
CreatorTopic
-
January 21, 2025 at 10:37 am #4286439
Air-gapped systems and security
by Oblivion99 · about 3 weeks, 6 days ago
In regard of linked articles:
https://www.techradar.com/pro/security/rambo-attack-uses-ram-in-air-gapped-computers-to-steal-data
https://www.f5.com/labs/articles/cisotociso/attacking-air-gap-segregated-computers
1.
Could my data be stolen throuh the charger cord aswell?2.
Would brick walls, windows etc., prevent the “hacker device” from receiving the crucial RF-signals from the targeted system?3.
Those mentioned devices that can hack air-gapped systems, are they easily available to the average hacker?4.
Could a not-jailbroken Iphone be hacked, and used as the RF-receiver?5.
What measurements can I implement, to make sure my air-gapped system doesn’t get hacked?6.
All the mentioned methods of hacking an air-gapped system, is it NSA-level or something the average hacker could do?Thank you
-
CreatorTopic
All Answers
-
AuthorReplies
-
-
January 21, 2025 at 10:55 am #4286476
Reply To: Air-gapped systems and security
by kees_b · about 3 weeks, 6 days ago
In reply to Air-gapped systems and security
1. Not mentioned in the link. It’s other technology.
2. The receiver must be “near” the source. But if WiFI goes through glass and walls, it’s not sure these signals wouldn’t.
3. I think the software and the hardware can be bought, if you know where.
4. The receiver is a device not onder your control, so irrelevant.
5. Don’t let anyone near the machine. Don’t install the malware needed. Put your desktop and laptop inside Faraday cage.
6. If the hacker has the resources (see #3), he can do it. But I wonder if your laptop is a target worth investing time and money into such an operation,-
January 22, 2025 at 7:20 am #4286642
Further questions
by Oblivion99 · about 3 weeks, 5 days ago
In reply to Reply To: Air-gapped systems and security
1. Not mentioned in the link. It’s other technology.
–
Would you still try to answer it?2. The receiver must be “near” the source. But if WiFI goes through glass and walls, it’s not sure these signals wouldn’t.
–
But we can assume, mentioned materials will greatly reduce the signal?3. I think the software and the hardware can be bought, if you know where.
–
I assume everything can be bought on the dark web4. The receiver is a device not onder your control, so irrelevant.
–
Everything is theoretical.
That the targeted persons Iphone could be hacked, and then used as the receiver, and then the hacked Iphone forward the signal to the hacker – sounds almost impossible.5. Don’t let anyone near the machine. Don’t install the malware needed. Put your desktop and laptop inside Faraday cage.
–
Malware is not needed?Thank you
-
January 30, 2025 at 6:11 am #4287852
Reply To: Air-gapped systems and security
by scaterers88 · about 2 weeks, 4 days ago
In reply to Reply To: Air-gapped systems and security
Air-gapped systems are isolated from the internet to enhance security, protecting sensitive data from online cyber threats. They’re commonly used in high-security environments like military or nuclear facilities.
Benefits: Immune to online attacks and remote hacking.
Challenges: Physical access can still compromise security, and data transfer becomes more manual and risky.Best practices include secure data transfer, limiting physical access, and enforcing strict internal security protocols.
-
January 31, 2025 at 9:17 am #4288092
Followup questions
by Oblivion99 · about 2 weeks, 3 days ago
In reply to Reply To: Air-gapped systems and security
Thank you for your reply and recommendations
The other posters have also answered my questions, do you have anything to add?
What about:
All the methods to hack air-gapped systems, do they all require malware on the targeted system to work?
Also the one with SATA-cables?
-
-
-
January 21, 2025 at 11:02 am #4286477
1. Maybe.
by rproffitt · about 3 weeks, 6 days ago
In reply to Air-gapped systems and security
Depends on your device. Also, a simple charger, no. But hey there are evil chargers.
Consider using your own charger like everyone else. Why risk it?2. No.
3. The Flipper comes to mind. I will NOT detail how to use. No reason to enable would be attackers.
4. iPhone is pre-hacked. Calls, texts, most content is already put on the cloud and governments with proper court orders can get to that.
5. Don’t connect to any network.
6. See #5 and RF proof a room.-
January 22, 2025 at 8:05 am #4286646
Followup questions
by Oblivion99 · about 3 weeks, 5 days ago
In reply to 1. Maybe.
1.
Could my data be stolen throuh the charger cord aswell?
–
Would you still try to answer this?2. No.
–
But we can assume, mentioned materials will greatly reduce the signal?3. The Flipper comes to mind.
–
For it to work, it requires malware on the targeted system?4. iPhone is pre-hacked.
–
“Here’s the real twist: that receiving device can be nothing more than an ordinary smartphone running the attacker’s decoder software.”
“Defenders need to be aware that ordinary smart phones can be turned into spy tools.”
–
Do you believe, that iPhones (not hacked by a hacker) are already capable of receving the signals explained in the air-gapped scenarios?7.
All the methods to hack air-gapped systems, do they all require malware on the targeted system to work?
Also the one with SATA-cables?Thank you
-
January 22, 2025 at 12:20 pm #4286699
1. Also yes.
by rproffitt · about 3 weeks, 5 days ago
In reply to Followup questions
The OMG cable is out there.
2. Why bother. Turn off the WiFi, done.
3. Flipper. Again I will not ENABLE or ASSIST would be attackers. It’s out there, how and what it does is there for the reading. I will not write about it here.
4. iPhone. Pre-hacked. Apple controls the device, any communication is logged. No mystery here. Use at your own risk.7. No. Again I will not enable or assist would be attackers.
-
January 29, 2025 at 7:32 am #4287717
Followup questions 2
by Oblivion99 · about 2 weeks, 5 days ago
In reply to 1. Also yes.
1.
I use a normal laptop-charger, so I am not concerned regarding this2.
But the examples in the articles does not use WIFI:
RAMBO / RAM – electromagnetic emissionsSATA cables – electromagnetic emissions in various frequency bands; 1 GHz, 2.5 GHz, 3.9 GHz, and +6 GHz
The processors or even a long USB cable can be converted to a radio transmitter that can send signals on FM radio or cell phone frequencies
-
-
-
January 23, 2025 at 5:57 pm #4286924
I remember many years ago a radio Station going off line
by oh smeg · about 3 weeks, 4 days ago
In reply to Air-gapped systems and security
When they arrived at the transmission shack with the aerial all air gaped to the highest standard there was nothing left of the aerial or building not even any of the concrete floor.
Granted it was a lighting strike and very little can stop those but at the very least it should only have been the aerial which had suffered damage not the entire structure which had nothing recognizable left.
The point being if Electricity can jump wide air gaps low frequency and power RF can to so relying on Air Gaping to make something secure is wasting your time and effort. Much better to enclose everything in a Faraday Cage and ground it in several different locations.
-
February 7, 2025 at 7:29 am #4289565
Thank you for your recommendation
by Oblivion99 · about 1 week, 3 days ago
In reply to I remember many years ago a radio Station going off line
The other posters have also answered my questions, do you have anything to add?
What about:
All the methods to hack air-gapped systems, do they all require malware on the targeted system to work?
Also the one with SATA-cables?
-
-
January 27, 2025 at 1:04 pm #4287323
Air-gapped systems and security
by pelorustechnologies · about 3 weeks ago
In reply to Air-gapped systems and security
The security of air-gapped systems is not guaranteed, as attacks can still be made via indirect channels such as USB ports or power cables, although chargers themselves do not pose a direct security risk. RF signal transmission can be reduced by physical barriers, such as brick walls, but sophisticated attacks may still be possible. Many of the tools used for hacking air-gapped systems are not widely available to average hackers, but highly skilled hackers may be able to access them. Make sure your system is secured by implementing strict access controls, disabling unused ports, and shielding sensitive devices as needed.
-
February 3, 2025 at 10:10 am #4288518
Air-gapped systems and security
by pelorustechnologies · about 2 weeks ago
In reply to Air-gapped systems and security
1. Charger cords can potentially transmit malware if compromised, but it’s less likely unless specifically designed for that purpose.
2. Brick walls and other barriers may block RF signals, but hackers can use techniques to bypass such obstacles.
3. Specialized devices for hacking air-gapped systems are generally not easily accessible to average hackers but require advanced knowledge.
4. A non-jailbroken iPhone could potentially be used as an RF receiver if exploited through vulnerabilities, though it’s complex.
5. To protect your air-gapped system, use physical isolation, data encryption, and restrict any external connections.These hacking techniques often involve high-level expertise, likely associated with advanced agencies like the NSA, rather than average hackers.
-
February 7, 2025 at 7:37 am #4289572
Thank you for your reply
by Oblivion99 · about 1 week, 3 days ago
In reply to Air-gapped systems and security
What about?:
…as attacks can still be made via indirect channels such as USB ports or power cables
–
But that requires physical access to the system?All the methods to hack air-gapped systems, do they all require malware on the targeted system to work?
Also the one with SATA-cables?Thank you
-
-
February 13, 2025 at 2:37 am #4290672
Reply To: Air-gapped systems and security
by robertparkar · about 4 days, 23 hours ago
In reply to Air-gapped systems and security
thank you for sharing valuable information
-
-
AuthorReplies