In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-08 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)05/31 Report--
This article is about how Mosquito attacks work. The editor thinks it is very practical, so share it with you as a reference and follow the editor to have a look.
Recently, security researchers from Ben-Gurion University in Israel demonstrated an attack technique called "Mosquito", which allows attackers to extract data from physically isolated (air gaps) or networked computers through loudspeakers or headphones.
In the study entitled "Mosquito attacks: covert Communication between Air Gap computers," the researchers explained that the attack method is so concealed that it can send and receive data through ultrasonic signals from loudspeakers. This technology converts an audio output Jack into an input Jack, and then converts the speaker into a microphone. This is a function of modern audio chipset, it can also be said to be a feature, and can be converted through software. However, attackers can also take advantage of this feature through specially crafted malware, and then convert the speaker or headset of the target host into a microphone. and the ultrasonic signal is used to extract data between the two computer devices (the maximum distance is about 9 meters).
Researchers Mordechai Guri, Yosef Solwicz, Andrey Daidakulov and Yuval Elovici also designed another data extraction technology specifically for air gap systems, including:
1. Odini: using the low-frequency magnetic signal generated by the CPU core
2. Magneto: use magnetic signals to extract data from the air gap system to a nearby smartphone
3. LED-it-Go: using light emitting diode (LED) to extract data from air gap network
4. AIR-Jumper: remote communication with air gap network using infrared LED and security surveillance camera
5. BitWhisper: use the temperature change of the CPU/GPU in the target host to communicate with the nearby air gap system
The researchers explain that microphones are not a must-have component in Mosquito attacks because the malware they develop can use functions in specific audio chipsets to convert connected speakers (output devices) into microphones (input devices).
Demo video: "how attackers use Internet speakers to steal your data"
At present, the Mosquito attack is still in the experimental stage, but according to the current experimental results, almost all platforms will be affected by this security risk, especially the Internet of things devices, and this security loophole may further expose personal data and even the data of the whole enterprise to network threats. In addition, Stephen Hilt of trend Technology Frontier threat Research team (FTR) analyzed the two most popular loudspeaker systems and successfully used Mosquito attacks to extract data from the target system. This means that many computer / network systems running in the enterprise environment will be exposed to this security risk.
In fact, the results of these two studies suggest that security issues should not be considered "after the event". According to the current network security situation, whether individual users, enterprises or online service providers, or equipment designers / manufacturers, should deploy multi-layer security protection to the software or hardware they use.
Thank you for reading! This is the end of the article on "how Mosquito attacks work". I hope the above content can be of some help to you, so that you can learn more knowledge. if you think the article is good, you can share it for more people to see!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.