Close Menu
techskyss.comtechskyss.com

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    RSS Feed Generator, Create RSS feeds from URL

    September 14, 2024

    Cyber Community Celebrates Documentary Premiere

    September 14, 2024

    Govt assures data privacy with satellite-based tolling, Auto News, ET Auto

    September 14, 2024
    Facebook X (Twitter) Instagram
    Trending
    • RSS Feed Generator, Create RSS feeds from URL
    • Cyber Community Celebrates Documentary Premiere
    • Govt assures data privacy with satellite-based tolling, Auto News, ET Auto
    • Best Antivirus Deals: Protect your PC or Mac from just $25
    • Nigeria Alternative Lending Market Business Report 2024:
    • REWIND: Top New Music Industry News Last Week
    • 2024 cohort of CU Boulder’s Embark Deep Tech Startup Creator launches new startups | Venture Partners at CU Boulder
    • Is voice control the answer to more accessible computing?
    Facebook X (Twitter) Instagram
    techskyss.comtechskyss.com
    Subscribe
    Monday, December 29
    • Home
    • AI & Robots
      • AI Trends
      • Automation & Machine Learning
      • Robotic Technology
    • Apps
      • Mobile Apps
      • Productivity Tools
      • Web Apps
    • Gadgets
      • Headphones & Speakers
      • Laptops
      • Smartphones
    • Security
      • Antivirus & Protection
      • Cybersecurity
      • Data Privacy
    • Tech News
      • Industry Updates
      • Product Launches
      • Startups & Innovations
    techskyss.comtechskyss.com
    Home » New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks
    Cybersecurity

    New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks

    admehmet1984@gmail.comBy admehmet1984@gmail.comSeptember 9, 2024No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Sep 09, 2024Ravie LakshmananVulnerability / Hardware Security

    New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks

    A novel side-channel attack has been found to leverage radio signals emanated by a device’s random access memory (RAM) as a data exfiltration mechanism, posing a threat to air-gapped networks.

    The technique has been codenamed RAMBO by Dr. Mordechai Guri, the head of the Offensive Cyber Research Lab in the Department of Software and Information Systems Engineering at the Ben Gurion University of the Negev in Israel.

    “Using software-generated radio signals, malware can encode sensitive information such as files, images, keylogging, biometric information, and encryption keys,” Dr. Guri said in a newly published research paper.

    “With software-defined radio (SDR) hardware, and a simple off-the-shelf antenna, an attacker can intercept transmitted raw radio signals from a distance. The signals can then be decoded and translated back into binary information.”

    Cybersecurity

    Over the years, Dr. Guri has concocted various mechanisms to extract confidential data from offline networks by taking advantage of Serial ATA cables (SATAn), MEMS gyroscope (GAIROSCOPE), LEDs on network interface cards (ETHERLED), and dynamic power consumption (COVID-bit).

    Some of the other unconventional approaches devised by the researcher entail leaking data from air-gapped networks via covert acoustic signals generated by graphics processing unit (GPU) fans (GPU-FAN), (ultra)sonic waves produced by built-in motherboard buzzers (EL-GRILLO), and even printer display panels and status LEDs (PrinterLeak).

    Last year, Guri also demonstrated AirKeyLogger, a hardwareless radio frequency keylogging attack that weaponizes radio emissions from a computer’s power supply to exfiltrate real-time keystroke data to a remote attacker.

    “To leak confidential data, the processor’s working frequencies are manipulated to generate a pattern of electromagnetic emissions from the power unit modulated by keystrokes,” Guri noted in the study. “The keystroke information can be received at distances of several meters away via an RF receiver or a smartphone with a simple antenna.”

    As always with attacks of this kind, it requires the air-gapped network to be first compromised through other means – such as a rogue insider, poisoned USB drives, or a supply chain attack – thereby allowing the malware to trigger the covert data exfiltration channel.

    RAMBO is no exception in that the malware is used to manipulate RAM such that it can generate radio signals at clock frequencies, which are then encoded using Manchester encoding and transmitted so as to be received from a distance away.

    The encoded data can include keystrokes, documents, and biometric information. An attacker on the other end can then leverage SDR to receive the electromagnetic signals, demodulate and decode the data, and retrieve the exfiltrated information.

    Cybersecurity

    “The malware utilizes electromagnetic emissions from the RAM to modulate the information and transmit it outward,” Dr. Guri said. “A remote attacker with a radio receiver and antenna can receive the information, demodulate it, and decode it into its original binary or textual representation.”

    The technique could be used to leak data from air-gapped computers running Intel i7 3.6GHz CPUs and 16 GB RAM at 1,000 bits per second, the research found, with keystrokes being exfiltrated in real-time with 16 bits per key.

    “A 4096-bit RSA encryption key can be exfiltrated at 41.96 sec at a low speed and 4.096 bits at a high speed,” Dr. Guri said. “Biometric information, small files (.jpg), and small documents (.txt and .docx) require 400 seconds at the low speed to a few seconds at the fast speeds.”

    “This indicates that the RAMBO covert channel can be used to leak relatively brief information over a short period.”

    Countermeasures to block the attack include enforcing “red-black” zone restrictions for information transfer, using an intrusion detection system (IDS), monitoring hypervisor-level memory access, using radio jammers to block wireless communications, and using a Faraday cage.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    AirGapped Attack Data Networks Radio RAM RAMBO Signals steal
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article1.7M potentially pwned by payment services provider breach • The Register
    Next Article EarFun Unveils Three New Wireless Audio Products for 2024: UBOOM X Speaker, OpenJump Earbuds, and Tune Pro ANC Headphones
    admehmet1984@gmail.com
    • Website

    Related Posts

    Cybersecurity

    Cyber Community Celebrates Documentary Premiere

    By admehmet1984@gmail.comSeptember 14, 2024
    Data Privacy

    Govt assures data privacy with satellite-based tolling, Auto News, ET Auto

    By admehmet1984@gmail.comSeptember 14, 2024
    Cybersecurity

    Pakistan gets top tier cybersecurity status

    By admehmet1984@gmail.comSeptember 14, 2024
    Data Privacy

    Govt assures protecting data privacy with satellite-based tolling on highways

    By admehmet1984@gmail.comSeptember 14, 2024
    Cybersecurity

    Indonesia launches cybersecurity training programme to empower one million people

    By admehmet1984@gmail.comSeptember 13, 2024
    Web Apps

    Asian, European IIS servers subjected to novel DragonRank attack campaign

    By admehmet1984@gmail.comSeptember 13, 2024
    Add A Comment
    Leave A Reply Cancel Reply

    Don't Miss

    RSS Feed Generator, Create RSS feeds from URL

    By admehmet1984@gmail.comSeptember 14, 2024

    RSS Feed IntegrationsMake your RSS feed work better by integrating with your favorite platforms. Save…

    Cyber Community Celebrates Documentary Premiere

    September 14, 2024

    Govt assures data privacy with satellite-based tolling, Auto News, ET Auto

    September 14, 2024

    Best Antivirus Deals: Protect your PC or Mac from just $25

    September 14, 2024
    Top Posts

    RSS Feed Generator, Create RSS feeds from URL

    September 14, 202428 Views

    HONOR 200 Lite smartphone review – Root-Nation.com

    September 13, 202411 Views

    Cyber Community Celebrates Documentary Premiere

    September 14, 20247 Views

    AI-Powered Age Verification Apps : Privately ‘AgeAI’

    September 13, 20247 Views
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us

    Welcome to Techskyss, your premier source for comprehensive and up-to-date information on the ever-evolving world of technology. We are dedicated to delivering insightful content that keeps you informed and engaged with the latest trends, innovations, and developments in the tech industry.

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    categories
    • AI & Robots
    • Tech News
    • Security
    • Gadgets
    • Apps
    Useful links
    • About Us
    • Contact Us
    • Privacy & Policy
    • Terns & Conditions

    Type above and press Enter to search. Press Esc to cancel.