@genepix
Air-fi
Air-fi
In this paper, we show that attackers can exfiltrate data from air-gapped computers via Wi-Fi signals. Malware in a compromised air-gapped computer can generate signals in the Wi-Fi frequency bands. The signals are generated through the memory buses - no special hardware is required. Sensitive data can be modulated and secretly exfiltrated on top of the signals. We show that nearby Wi-Fi capable devices (e.g., smartphones, laptops, IoT devices) can intercept these signals, decode them, and send them to the attacker over the Internet. To extract the signals, we utilize the physical layer information exposed by the Wi-Fi chips. We implement the transmitter and receiver and discuss design considerations and implementation details. We evaluate this covert channel in terms of bandwidth and distance and present a set of countermeasures. Our evaluation shows that data can be exfiltrated from air-gapped computers to nearby Wi-Fi receivers located a distance of several meters away.
ReVoLTE Attack
ReVoLTE Attack
Spikey
Spikey
Lamphone
Lamphone
My name is Ben Nassi.
View on mobile
Explore other Linktrees
Heather Traska
@heathertraska
Substack
@substackinc
jimgaffigan
@jimgaffigan
Deuxmoi
@deuxmoi
Are We Still Friends
@awsfpod
Raedio
@raedio
BNC Map
@bncmap
davestewart
@davestewart
Katie Lynn
@katielynnteaches
Julian Sewell
@juliansewell
previous
next
Discover more
See all
@MercadoAzahar
@Itskylarmartin
@gbtyouth
@frontlinepropertiesgroup
@leindesigns.mn
@alvaroapsantos
@bobo.mrabet
@Harshinigrandhe
@babyspankem
@bakerstuff
@Rgrante
@cupidodegenerado
@adpclubpitt
@ladobdaciencia
@bruttounpodcastbello
@MiraiKay
@somersetdragonsfutsal
@eykatekstil
@mateusolira22
@ferrarap
@surrealmansion
@shekinahsg
@firstredeemerchurch
@zweik0
@miyixart
@MermaidManila
@revelava
@sitiodemalaecuia
@diuxart
@emmamurr
@itssmeangie
@tytacademy
@DrHarmony
@choralunion
@fashiongold.hb
@puskesmasgembong
@lulusomething
@molamarket
@eurovisionin
@chia_wei_billy
@rayytarot
@bestiefeb
@ParceirosRW
@Tino.Phone
@jikanium