A new technique allows hackers to break into computers via headphones or speakers, even if it the computer is physically disconnected from the internet or any other network.
A new data access technique discovered by a research team from Israel’s Ben-Gurion University Cybersecurity Research Center allows data to be extracted using a computer’s speakers and headphones. What this means is that the “air gap,” the ultimate way to protect computers from hacking from the outside, has been breached for the first time ever.
The technique, published online as a PDF through the Cornell University Library, describes how data can be transformed and transmitted as a form of inaudible ultrasound audio signals. Yes, the “inaudible” part here is most concerning, because people normally don’t hear ultrasound, unless you stick a transmitter in your ear.
For the hacking to work, a target computer must be infected with a virus that will convert files to audio format. It can then be made to start transmitting them via a custom-made protocol.
“Well, I can just unplug my microphone and I’m safe,” you might think. But you couldn’t be more wrong, because this technique does not even need a microphone! How?
According to the researchers, most contemporary chipsets allow the jack port (where you stick your headphone connector) to switch functionalities, making it either a microphone port or headphone port on demand. On a physical level, every microphone and speaker are more or less the same: they convert physical air oscillations into electric voltage or vice versa. Therefore, the malefactor might utilize your speakers to create a data transmission scheme, if no microphone or headphone is available.
“The fact that loudspeakers, headphones, earphones and earbuds are physically built like microphones, coupled with the fact that an audio port’s role in the PC can be altered programmatically, changing it from output to input, creates a vulnerability which can be abused by attackers,” the paper reads.
How effective is this method, though? According to the team, this method, named MOSQUITO, can work on computers standing up to 9 meters away.
The transmission is also quite slow. During their experiment, the researchers managed to get a stable 166 bit/second transmission speed with a margin of error of 1 percent. At the maximum distance of 9 meters, the speed dropped to 10 bit/second but still worked.
Previously, “air-gapped” or physically separated computers were considered impervious to an outside hack, even if infected with malware or a virus from a USB storage device. And still, the hardest part for the hacker would be to get the virus file to the air-gapped computer in the first place.
Other than updating conventional antivirus software, are there any other means of protection? Yes, but all have their own limitations. The most “spy movie” kind of protection would be an ultrasonic jammer: a device that constantly emits ultrasound and jams the transmission. There are certain health restrictions, though, as prolonged exposure to ultrasound can lead to headaches, dizziness and hearing damage.
The authors also suggest monitoring ultrasound frequencies, but they warn that this method is prone to raising false alarms.
One could also develop software to prevent jack port retasking or use BIOS to disable audio devices completely.
The method is still in its assessment phase and requires further study, the researchers conclude.
Sourse: sputniknews.com