Matthew Griffin, described as “The Adviser behind the Advisers” and a “Young Kurzweil,” is the founder and CEO of the World Futures Forum and the 311 Institute, a global Futures and Deep Futures consultancy working between the dates of 2020 to 2070, and is an award winning futurist, and author of “Codex of the Future” series. Regularly featured in the global media, including AP, BBC, Bloomberg, CNBC, Discovery, RT, Viacom, and WIRED, Matthew’s ability to identify, track, and explain the impacts of hundreds of revolutionary emerging technologies on global culture, industry and society, is unparalleled. Recognised for the past six years as one of the world’s foremost futurists, innovation and strategy experts Matthew is an international speaker who helps governments, investors, multi-nationals and regulators around the world envision, build and lead an inclusive, sustainable future. A rare talent Matthew’s recent work includes mentoring Lunar XPrize teams, re-envisioning global education and training with the G20, and helping the world’s largest organisations envision and ideate the future of their products and services, industries, and countries. Matthew's clients include three Prime Ministers and several governments, including the G7, Accenture, Aon, Bain & Co, BCG, Credit Suisse, Dell EMC, Dentons, Deloitte, E&Y, GEMS, Huawei, JPMorgan Chase, KPMG, Lego, McKinsey, PWC, Qualcomm, SAP, Samsung, Sopra Steria, T-Mobile, and many more.
WHY THIS MATTERS IN BRIEF
Air gapped systems are used to hold and protect top secret data, and they’re becoming increasingly vulnerable to hacks.
Air gapped computer systems have always held a special fascination for hackers – firstly because of the challenge that surrounds being able to hack a system that’s logically and physically isolated from the rest of its tribe, and secondly, and probably more importantly because of the classified and sensitive data they hold. Air gapped systems, after all, are par for the course within organisations, such as defence, government and national security agencies that create and collect highly sensitive, top secret information.
Over the past twelve months we’ve seen a few new hacks that steal information from these isolated systems – everything from listening to hard drives to creating new viruses that use microphones to jump between the air gaps.
Now security experts in Israel have managed to demonstrate for the first time that you can also steal data from these systems by blinking and reading the LED’s on the front of them, and to prove it they enlisted the help of a drone.
Security researchers from Ben Gurion University recently demonstrated an attack in which they infected an air gapped machine with malware that could control the systems LED and cause it to blink in a pattern which transmitted sensitive, encoded data from the machine – just like Morse Code.
In a YouTube video put together by the researchers, a drone with a camera is flown up multiple stories outside of an office building until it locates the blinking HDD LED, and once it’s in the line of sight of the LED, it records the blinks and steals the data.
According to the researchers report, the LED can be forced to blink at up to 5,800 blinks per second, far beyond the rate that can be detected by the human eye. And even if the blinking was detected then LED’s are always blinking, and this makes the attack covert in a way that makes it likely it wouldn’t be noticed by the user in any case.
“Our experiment shows that sensitive data can be successfully leaked from air gapped computers via the HDD LED at a maximum bit rate of 4,000 bits per second – depending on the type of receiver and its distance from the transmitter,” the report said, “notably, this speed is 10 times faster than the existing optical covert channels for air gapped computers. These rates allow fast exfiltration of encryption keys, keystroke logging, and text and binary files.”
Citing other research, the report noted that the computer LED could be detected by certain cameras from 30 meters away or further and to encode the actual data, the report cited three main methods; On-Off Keying (OOK), Manchester Encoding and Binary Frequency Shift Keying (B-FSK).
While the new hack is unlikely to trick the more advanced security organisations though, like the NSA whose systems are buried deep in data centres below ground and out of the sight of cameras, it will still be an effective way to extricate sensitive data from millions of other commercial organisations, such as banks and energy companies.
In order to protect themselves though companies could ban cameras, cover or disconnect LEDs and shield windows, as well as invest in LED activity monitoring software, an LED activity monitoring camera, or signal jamming software.
Ultimately the new hack is just another step in the war of one upmanship but, again, it’s another hack that organisations now need to protect themselves against that didn’t exist before.