MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication

03/09/2018
by   Mordechai Guri, et al.
0

In this paper we show how two (or more) airgapped computers in the same room, equipped with passive speakers, headphones, or earphones can covertly exchange data via ultrasonic waves. Microphones are not required. Our method is based on the capability of a malware to exploit a specific audio chip feature in order to reverse the connected speakers from output devices into input devices - unobtrusively rendering them microphones. We discuss the attack model and provide technical background and implementation details. We show that although the reversed speakers/headphones/earphones were not originally designed to perform as microphones, they still respond well to the near-ultrasonic range (18kHz to 24kHz). We evaluate the communication channel with different equipment, and at various distances and transmission speeds, and also discuss some practical considerations. Our results show that the speaker-tospeaker communication can be used to covertly transmit data between two air-gapped computers positioned a maximum of nine meters away from one another. Moreover, we show that two (microphone-less) headphones can exchange data from a distance of three meters apart. This enables 'headphones-to-headphones' covert communication, which is discussed for the first time in this paper.

READ FULL TEXT

page 5

page 6

research
08/21/2022

GAIROSCOPE: Injecting Data from Air-Gapped Computers to Nearby Gyroscopes

It is known that malware can leak data from isolated, air-gapped compute...
research
12/12/2020

AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers

In this paper, we show that attackers can exfiltrate data from air-gappe...
research
09/21/2020

Using Inaudible Audio and Voice Assistants to Transmit Sensitive Data over Telephony

New security and privacy concerns arise due to the growing popularity of...
research
05/01/2020

POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers

It is known that attackers can exfiltrate data from air-gapped computers...
research
07/10/2019

CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs

Using the keyboard LEDs to send data optically was proposed in 2002 by L...
research
07/15/2022

SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables

This paper introduces a new type of attack on isolated, air-gapped works...
research
12/09/2019

OfdmFi: Enabling Cross-Technology Communication Between LTE-U/LAA and WiFi

Despite exhibiting very high theoretical data rates, in practice, the pe...

Please sign up or login with your details

Forgot password? Click here to reset