MOSQUITO is new technique devised by a team of researchers at Israel’s Ben Gurion University, led by the expert Mordechai Guri, to exfiltrate data from an air-gapped network. The technique leverage connected speakers (passive speakers, headphones, or earphones) to acquire the sound from surrounding environment by exploiting a specific audio chip feature. Once again the team demonstrated […]
A team of Israeli researchers has devised a new technique to exfiltrate data from a machine by using a malware that controls router LEDs. A few months ago a group of researchers from Israeli Ben-Gurion University devised a new technique to exfiltrate data from a machine by using a malware that controls hard drive LEDs, now […]
A security duo designed a hacking UAV dubbed Danger Drone, with it a drone equipped with a tiny PC that run a suite of hacking tools. What do you think if I propose you to use a drone to hack into a network? And what about air-gapped networks hacking? In order to hack into an isolated network, the […]
Two of security researchers have shown how hackers can target connected lightbulbs to exfiltrate sensitive data from Air-Gapped networks. Two of security researchers from the Weizmann Institute have shown how hackers can target connected lightbulbs to steal sensitive data from Air-Gapped networks. The two researchers are Adi Shamir, the popular co-inventor of the RSA algorithm, and PHD student […]
The former British defence secretary Des Browne is warning that the Trident nuclear weapons system could be vulnerable to cyber-attack. According to the Guardian, the former British defence secretary Des Browne called on the British Prime Minister to assess the resilience to cyber attacks of the Trident nuclear weapons system. “The UK Trident programme encompasses the […]
Researchers at FireEye uncovered a new threat actor dubbed APT30 that run a decade-long cyber espionage campaign backed by the Chinese Government. Security experts at FireEye have uncovered a new long-running cyber espionage campaign, the researchers speculate that the campaign is active since at least 2005. The threat actor behind the campaign was dubbed APT30 by the researchers, […]
A group of Israeli researchers has demonstrated at the last Black Hat Conference how to hack air gapped networks by using lasers and drones. A lot of people believe that it is possible to secure a computer keeping it off, security specialists define a network separated by the Internet, or by any other unsecure networks, as “Air gapped […]