Air-gapped networks are not completely secure and can be compromised through various sophisticated attack vectors, including air gap cover channels. These channels can be classified into seven main categories: physical media, acoustical channels, electromagnetic, magnetic, electric, travel channel, optical, and thermal.
- Air-gapped networks are used by various organizations and industries to maintain their data, including critical infrastructure command and control centers, healthcare, banking, and finance sectors.
- Attackers can use educated attack vectors to compromise air-gapped networks, such as supply chain attacks and malicious insiders.
- Air gap cover channels are non-standard or non-conventional out-of-band communication methods that attackers can use to exfiltrate information from isolated air-gapped networks.
- Air gap cover channels can be classified into seven main categories: physical media, acoustical channels, electromagnetic, magnetic, electric, travel channel, optical, and thermal.
- Physical media is the conventional way to jump the air gap, using flash drives or similar devices to transfer files and data.
- Acoustical channels use ultrasonic range to modulate and transmit data over a six-kilohertz band, which can be received by a hidden microphone or smartphone in the room.
- Electromagnetic cover channels use the display cable to generate electromagnetic radiation, which can be controlled and modulated to the FM radio band and received by a smartphone with an FM receiver.
- An anecdote illustrates how a nearby smartphone can receive top-secret data from an air-gapped computer through electromagnetic cover channels.
- Other cover channels include magnetic, electric, travel channel, optical, and thermal, which are briefly discussed in the presentation.
The presentation shows how a nearby smartphone can receive top-secret data from an air-gapped computer through electromagnetic cover channels. The display cable generates electromagnetic radiation, which can be controlled and modulated to the FM radio band. The FM transmitter from the computer can be received by a mobile phone with an FM receiver in the engine room or outside the room, creating a link between the computer and the mobile phone. This research is called 'Bridging the Air Gap between Isolated Networks and Mobile Phone Using Radio Frequencies.'