Omega Owners Forum

Chat Area => General Discussion Area => Topic started by: Rods2 on 27 July 2015, 23:26:38

Title: Interesting Hack
Post by: Rods2 on 27 July 2015, 23:26:38
I have always been aware that all security sensitive facilities have used careful screening since the Russians were caught reading US teleprinter machines from their EM radiation, but this is an interesting hack anyway.

How researchers have managed to hack an air gapped computer using a simple mobile phone as the receiver.

http://www.wired.com/2015/07/researchers-hack-air-gapped-computer-simple-cell-phone (http://www.wired.com/2015/07/researchers-hack-air-gapped-computer-simple-cell-phone)
Title: Re: Interesting Hack
Post by: BigAl on 28 July 2015, 00:31:05
from the article:-
"The attack requires both the targeted computer and the mobile phone to have malware installed on them, but once this is done the attack exploits the natural capabilities of each device to exfiltrate data"

It only works if the air-gapped PC has already been compromised - so they havent hacked anything!
Title: Re: Interesting Hack
Post by: biggriffin on 28 July 2015, 07:01:46
Well it is a daily mail story,posted by our resident, Russian lover so its true and we need to be aware of these activities, ;)
Title: Re: Interesting Hack
Post by: Gaffers on 28 July 2015, 08:32:20
Not that difficult to compromise an Air-gapped PC ot system from a distance, it has been done many times.  The key weakness being the CKI ::)
Title: Re: Interesting Hack
Post by: Rods2 on 28 July 2015, 22:01:54
from the article:-
"The attack requires both the targeted computer and the mobile phone to have malware installed on them, but once this is done the attack exploits the natural capabilities of each device to exfiltrate data"

It only works if the air-gapped PC has already been compromised - so they havent hacked anything!

Secure computers with sensitive data are often not connected to a network to stop it being hacked and then it is a case of how the data is got out of the secure facility by those interested in doing so.

Many data compromises use inside people to do this and this is a very big issue.

Alternatively, if you are the US government you invite 3rd parties to tender for your secure computers maintenance, award it to the cheapest Chinese bid and give them all the root passwords and then wonder why all your employees data for the last 20 years has been downloaded. Now who would of guessed this happening. :-[ :-[ :-[ ;D ;D ;D
Title: Re: Interesting Hack
Post by: biggriffin on 29 July 2015, 04:34:14
from the article:-
"The attack requires both the targeted computer and the mobile phone to have malware installed on them, but once this is done the attack exploits the natural capabilities of each device to exfiltrate data"

It only works if the air-gapped PC has already been compromised - so they havent hacked anything!

Secure computers with sensitive data are often not connected to a network to stop it being hacked and then it is a case of how the data is got out of the secure facility by those interested in doing so.

Many data compromises use inside people to do this and this is a very big issue.

Alternatively, if you are the US government you invite 3rd parties to tender for your secure computers maintenance, award it to the cheapest Chinese bid and give them all the root passwords and then wonder why all your employees data for the last 20 years has been downloaded. Now who would of guessed this happening. :-[ :-[ :-[ ;D ;D ;D

There's an Iron Maiden song keeps coming to mind "run to the hills"  ::)
Title: Re: Interesting Hack
Post by: Gaffers on 29 July 2015, 06:25:05
Other ways include:

- dropping an unmarked cd or usb in the car parkin the hope they will put it into a computer that they shouldn't  (more of a sucess rate than you think )
- deliberately targetting someone's personal computer or usb (this believed to be how stuxnet found its way on to a certain computer in iran)
Title: Re: Interesting Hack
Post by: Kevin Wood on 29 July 2015, 10:01:36
The thing I can't understand is why people talk about secure computers and PCs in the same context. ::)
Title: Re: Interesting Hack
Post by: aaronjb on 29 July 2015, 10:30:59
Other ways include:

- dropping an unmarked cd or usb in the car parkin the hope they will put it into a computer that they shouldn't  (more of a sucess rate than you think )
- deliberately targetting someone's personal computer or usb (this believed to be how stuxnet found its way on to a certain computer in iran)

I thought the former of those two were how stuxnet was distributed?
Title: Re: Interesting Hack
Post by: Gaffers on 29 July 2015, 12:16:16
The thing I can't understand is why people talk about secure computers and PCs in the same context. ::)

It's not the computers themselves that is the problem.  90% of issues and infections as well as 70% of confidential information lost come from the CKI ;)
Title: Re: Interesting Hack
Post by: Kevin Wood on 29 July 2015, 17:12:35
The thing I can't understand is why people talk about secure computers and PCs in the same context. ::)

It's not the computers themselves that is the problem.  90% of issues and infections as well as 70% of confidential information lost come from the CKI ;)

True, but, if you're going to the expense of building the nuclear power plant used as an example, why control it using a £400 Dell box that has the interfaces that allow it to be compromised by the CKI in the first place?
Title: Re: Interesting Hack
Post by: aaronjb on 29 July 2015, 17:29:19
True, but, if you're going to the expense of building the nuclear power plant used as an example, why control it using a £400 Dell box that has the interfaces that allow it to be compromised by the CKI in the first place?

Because you're an idiot. ;) (Not you, you, them, you)
Title: Re: Interesting Hack
Post by: Kevin Wood on 29 July 2015, 18:32:48
True, but, if you're going to the expense of building the nuclear power plant used as an example, why control it using a £400 Dell box that has the interfaces that allow it to be compromised by the CKI in the first place?

Because you're an idiot. ;) (Not you, you, them, you)

.. or a bean counter. ::)
Title: Re: Interesting Hack
Post by: Gaffers on 29 July 2015, 19:43:35
True, but, if you're going to the expense of building the nuclear power plant used as an example, why control it using a £400 Dell box that has the interfaces that allow it to be compromised by the CKI in the first place?

Because you're an idiot. ;) (Not you, you, them, you)

.. or a bean counter. ::)

 ::)