Question

You are posting a reply to: Air-gapped systems and security

The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our Community FAQs for details. All submitted content is subject to our Terms of Use.

All Answers

  • Author
    Replies
    • #4286476
      Avatar photo

      Reply To: Air-gapped systems and security

      by kees_b ·

      In reply to Air-gapped systems and security

      1. Not mentioned in the link. It’s other technology.
      2. The receiver must be “near” the source. But if WiFI goes through glass and walls, it’s not sure these signals wouldn’t.
      3. I think the software and the hardware can be bought, if you know where.
      4. The receiver is a device not onder your control, so irrelevant.
      5. Don’t let anyone near the machine. Don’t install the malware needed. Put your desktop and laptop inside Faraday cage.
      6. If the hacker has the resources (see #3), he can do it. But I wonder if your laptop is a target worth investing time and money into such an operation,

      • #4286642

        Further questions

        by Oblivion99 ·

        In reply to Reply To: Air-gapped systems and security

        1. Not mentioned in the link. It’s other technology.

        Would you still try to answer it?

        2. The receiver must be “near” the source. But if WiFI goes through glass and walls, it’s not sure these signals wouldn’t.

        But we can assume, mentioned materials will greatly reduce the signal?

        3. I think the software and the hardware can be bought, if you know where.

        I assume everything can be bought on the dark web

        4. The receiver is a device not onder your control, so irrelevant.

        Everything is theoretical.
        That the targeted persons Iphone could be hacked, and then used as the receiver, and then the hacked Iphone forward the signal to the hacker – sounds almost impossible.

        5. Don’t let anyone near the machine. Don’t install the malware needed. Put your desktop and laptop inside Faraday cage.

        Malware is not needed?

        Thank you

      • #4287852

        Reply To: Air-gapped systems and security

        by scaterers88 ·

        In reply to Reply To: Air-gapped systems and security

        Air-gapped systems are isolated from the internet to enhance security, protecting sensitive data from online cyber threats. They’re commonly used in high-security environments like military or nuclear facilities.

        Benefits: Immune to online attacks and remote hacking.
        Challenges: Physical access can still compromise security, and data transfer becomes more manual and risky.

        Best practices include secure data transfer, limiting physical access, and enforcing strict internal security protocols.

        • #4288092

          Followup questions

          by Oblivion99 ·

          In reply to Reply To: Air-gapped systems and security

          Thank you for your reply and recommendations

          The other posters have also answered my questions, do you have anything to add?

          What about:
          All the methods to hack air-gapped systems, do they all require malware on the targeted system to work?
          Also the one with SATA-cables?

    • #4286477
      Avatar photo

      1. Maybe.

      by rproffitt ·

      In reply to Air-gapped systems and security

      Depends on your device. Also, a simple charger, no. But hey there are evil chargers.
      Consider using your own charger like everyone else. Why risk it?

      2. No.
      3. The Flipper comes to mind. I will NOT detail how to use. No reason to enable would be attackers.
      4. iPhone is pre-hacked. Calls, texts, most content is already put on the cloud and governments with proper court orders can get to that.
      5. Don’t connect to any network.
      6. See #5 and RF proof a room.

      • #4286646

        Followup questions

        by Oblivion99 ·

        In reply to 1. Maybe.

        1.
        Could my data be stolen throuh the charger cord aswell?

        Would you still try to answer this?

        2. No.

        But we can assume, mentioned materials will greatly reduce the signal?

        3. The Flipper comes to mind.

        For it to work, it requires malware on the targeted system?

        4. iPhone is pre-hacked.

        “Here’s the real twist: that receiving device can be nothing more than an ordinary smartphone running the attacker’s decoder software.”
        “Defenders need to be aware that ordinary smart phones can be turned into spy tools.”

        Do you believe, that iPhones (not hacked by a hacker) are already capable of receving the signals explained in the air-gapped scenarios?

        7.
        All the methods to hack air-gapped systems, do they all require malware on the targeted system to work?
        Also the one with SATA-cables?

        Thank you

        • #4286699
          Avatar photo

          1. Also yes.

          by rproffitt ·

          In reply to Followup questions

          The OMG cable is out there.

          2. Why bother. Turn off the WiFi, done.
          3. Flipper. Again I will not ENABLE or ASSIST would be attackers. It’s out there, how and what it does is there for the reading. I will not write about it here.
          4. iPhone. Pre-hacked. Apple controls the device, any communication is logged. No mystery here. Use at your own risk.

          7. No. Again I will not enable or assist would be attackers.

        • #4287717

          Followup questions 2

          by Oblivion99 ·

          In reply to 1. Also yes.

          1.
          I use a normal laptop-charger, so I am not concerned regarding this

          2.
          But the examples in the articles does not use WIFI:
          RAMBO / RAM – electromagnetic emissions

          SATA cables – electromagnetic emissions in various frequency bands; 1 GHz, 2.5 GHz, 3.9 GHz, and +6 GHz

          The processors or even a long USB cable can be converted to a radio transmitter that can send signals on FM radio or cell phone frequencies

    • #4286924

      I remember many years ago a radio Station going off line

      by oh smeg ·

      In reply to Air-gapped systems and security

      When they arrived at the transmission shack with the aerial all air gaped to the highest standard there was nothing left of the aerial or building not even any of the concrete floor.

      Granted it was a lighting strike and very little can stop those but at the very least it should only have been the aerial which had suffered damage not the entire structure which had nothing recognizable left.

      The point being if Electricity can jump wide air gaps low frequency and power RF can to so relying on Air Gaping to make something secure is wasting your time and effort. Much better to enclose everything in a Faraday Cage and ground it in several different locations.

      • #4289565

        Thank you for your recommendation

        by Oblivion99 ·

        In reply to I remember many years ago a radio Station going off line

        The other posters have also answered my questions, do you have anything to add?

        What about:
        All the methods to hack air-gapped systems, do they all require malware on the targeted system to work?
        Also the one with SATA-cables?

    • #4287323

      Air-gapped systems and security

      by pelorustechnologies ·

      In reply to Air-gapped systems and security

      The security of air-gapped systems is not guaranteed, as attacks can still be made via indirect channels such as USB ports or power cables, although chargers themselves do not pose a direct security risk. RF signal transmission can be reduced by physical barriers, such as brick walls, but sophisticated attacks may still be possible. Many of the tools used for hacking air-gapped systems are not widely available to average hackers, but highly skilled hackers may be able to access them. Make sure your system is secured by implementing strict access controls, disabling unused ports, and shielding sensitive devices as needed.

    • #4288518

      Air-gapped systems and security

      by pelorustechnologies ·

      In reply to Air-gapped systems and security

      1. Charger cords can potentially transmit malware if compromised, but it’s less likely unless specifically designed for that purpose.
      2. Brick walls and other barriers may block RF signals, but hackers can use techniques to bypass such obstacles.
      3. Specialized devices for hacking air-gapped systems are generally not easily accessible to average hackers but require advanced knowledge.
      4. A non-jailbroken iPhone could potentially be used as an RF receiver if exploited through vulnerabilities, though it’s complex.
      5. To protect your air-gapped system, use physical isolation, data encryption, and restrict any external connections.

      These hacking techniques often involve high-level expertise, likely associated with advanced agencies like the NSA, rather than average hackers.

      • #4289572

        Thank you for your reply

        by Oblivion99 ·

        In reply to Air-gapped systems and security

        What about?:

        …as attacks can still be made via indirect channels such as USB ports or power cables

        But that requires physical access to the system?

        All the methods to hack air-gapped systems, do they all require malware on the targeted system to work?
        Also the one with SATA-cables?

        Thank you

    • #4290672

      Reply To: Air-gapped systems and security

      by robertparkar ·

      In reply to Air-gapped systems and security

      thank you for sharing valuable information

Viewing 5 reply threads