SlideShare una empresa de Scribd logo
1 de 34
Descargar para leer sin conexión
Mind the (Air)Gap
Data Exfiltration via NFC and Smart Bulbs
Email – pedro@char49.com
IRC – kripthor irc.overthewire.org
Twitter - @kripthor
http://pgp.mit.edu:11371/pks/lookup?search=0x64490c55
Pedro Umbelino
Senior Security Researcher
@Checkmarx Research Team
Mind the (Air)Gap | 2
~$ whoami
~$ ls -la
What is this talk about?
Airgap Covert Channels
Data Exfiltration
NFC Research and Demo
BLE Smart Bulb Research and Demo
Mind the Air(Gap)| 3
~$ ls -la
Why Research Airgaps?
High security environments are
increasing, new data exfiltration
methods needed
Low fingerprint or stealthy requirements
Low permissions bypass
Extra challenging, it’s fun and
Hollywood has nothing on us
Mind the Air(Gap)| 4
~$ cat what_is_an_airgap.txt
Mind the (Air)Gap | 5
Airgap
Definition
Air-gapping is a measure or set of measures to ensure a secure computer is physically isolated from unsecured
networks, such as the public Internet or an unsecured local area network.
The name arises from the technique of creating a network that is physically separated (with a conceptual air gap)
from all other networks.
The concept represents nearly the maximum protection one network can have from another (save turning the device
off).
Applications where air-gapping are seen most often:
Military/governmental computer networks/systems
Financial computer systems
Industrial control systems nuclear power plants, aviation, medical equipment
~$ cat what_is_an_airgap.txt
Mind the (Air)Gap | 6
Airgap covert channel
Definition
An air-gap covert channel could be defined as any unintentional channel that is used to transmit and/or receive data
between systems in which air-gapping measures were taken at the emitter, receiver or both.
Unintentional means that the channel was not originally designed to be used as a data communications channel in the
way that it is being used. In this sense, it could also be called out-of-band.
Although there might be some additional software (malware) needed at the target system to make a particular covert
channel viable, there is no additional hardware installed on such systems.
~$ cat what_is_an_airgap.txt
Mind the (Air)Gap | 7
Airgap covert channel supports
Physical Media
Acoustic
Light
Seismic
Magnetic
Thermal
Electromagnetic
Real World Examples
From the 80s to Today
~$ cat examples.txt
Mind the (Air)Gap | 9
Examples
Electromagnetic emissions
Van Eck Phreaking (1985)
Markus Kuhn (2004)
~$ cat examples.txt
Mind the (Air)Gap | 10
Examples
Electromagnetic emissions
Barisani and Bianco (2009, PS/2 ground)
Vuagnoux and Pasini (2009, EMF leak, all keyboards)
Light emissions
Loughry and Umphress (2002, CapsLock)
~$ cat examples.txt
Mind the (Air)Gap | 11
Examples
Sound emissions
Asonov and Agrawal (2004, Neural Network for keyboards)
Hanspach and Goetz (2013, Acoustic mesh)
~$ cat state_of_the_art.txt
Mind the (Air)Gap | 12
Latest research
Electromagnetic
Ben-Gurion University (2014, AirHopper, FM transmitter)
Ben-Gurion University (2015, GSMem)
Ben-Gurion University (2016, USBee)
Magnetic
Ben-Gurion University (2018, ODINI)
Acoustic
Tromer, Shamer and Genkin (2014, Acoustic Crypto)
~$ cat state_of_the_art.txt
Mind the (Air)Gap | 13
Latest research
Thermal
Ben-Gurion University (2015, BitWhisper)
Light
Ben-Gurion University (2014, Scanner / Laser Drone)
Seismic
Deshotels (2014, smartphone ultrashort vibrations)
Data Exfiltration Research
#1 - Light bulbs Are Getting Smart
~$ cat lightbulb_tale.txt
Mind the (Air)Gap | 15
A BLE tale, from failed root to data exfiltration via a lightbulb
How it began
I like to research stuff. Random stuff. Sometimes even security related stuff.
Turns out I’m not alone. David Sopas shares the same illness.
David nowadays is researching a lot in IoT, when he is not overseeing a bunch of crazy researchers.
Some months ago, he told me about a light bulb he was hacking into and so the story begins…
~$ cat lightbulb_tale.txt
Mind the (Air)Gap | 16
A BLE light bulb, from China with love
Plan A failed
The main idea was, well, to get root on the light bulb.
It wasn’t feasible with the research but there was still something that was possible to control, the light itself.
We were very surprised to see that there were no authentication when it comes to use the lamp. /s
Basic BLE security fails.
~$ cat lightbulb_tale.txt
Mind the (Air)Gap | 17
Enumeration and reversing
BLEAH
BLEAH enumeration
One writable characteristic
Reversing the Android app
Profit, RGB color set
~$ cat lightbulb_tale.txt
Mind the (Air)Gap | 18
Implementation and Testing
The blue channel
Preamble TrailerByte 1
The transmitter was implemented using a simple scheme, by changing the blue light intensity, weaker for binary 1,
stronger for binary 0.
The blue channel was chosen because the human eye has more difficulties in distinguish shades of blue.
The demonstration protocol is simple, for each byte, a preamble and trailer. There is lots of room for improvement.
The low speed of change in light allows for a regular smartphone camera to be able to detect and process the data
(low FPS). A low cost, off the shelf solution.
~$ cat lightbulb_tale.txt
Mind the (Air)Gap | 19
BLEExfil – Data exfiltration from a compromised device via a BLE
light bulb
Attack scenario example
A BLE enabled device has been compromised by malware that steals users credentials
The malware wants to leak the information to an attacker and must be completely stealthy or there is an air-gap in effect
disabling “normal” transmissions (Wifi, Ethernet, GSM/GPRS, etc…), so it uses a nearby BLE lightbulb for exfiltration.
The attacker receives the credentials across the street using a normal smartphone, maybe using a telescope if the light
bulb is far away.
BLEExfil - Live Demo
Let the Sacrifice of a Small Penguin Appease the Demo Gods
Data Exfiltration Research
#2 - Android and NFC
~$ cat android_tale.txt
Mind the (Air)Gap | 22
An Android tale, from OS audit to NFC data exfiltration
How it began
I like to research stuff. Random stuff. Sometimes even security related stuff.
My overlords are awesome! :)
An Android device audit turned into full Android 6.0 OS audit
Previous experience on Android (CVE-2013-6271 Remove locks, CVE-2013-6272 + Kolme)
Permissions and opportunity
android.nfc.NfcAdapter -> enableReaderMode(…);
~$ cat android_tale.txt
Mind the (Air)Gap | 23
--- Near Field Communications ---
NFC 101
Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which
can be a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each
other.
NFC always involves an initiator and a target; the initiator actively generates an RF field that can power a passive
target, by means of electromagnetic induction between two loop antennas located within each other's near field.
It operates in the radio frequency band of 13.56 MHz.
A device can be a reader and/or a writer. A device (or cards) can be configured as Type A, Type B and others. The
main differences between types concern modulation methods, coding schemes and protocol initialization procedures.
~$ cat android_tale.txt
Mind the (Air)Gap | 24
An Android tale, from OS audit to NFC data exfiltration
Being creative
android.nfc.NfcAdapter -> enableReaderMode(…);
No permissions needed, despite NFC permission blocks everything else
But what does it do exactly?
~$ cat android_tale.txt
Mind the (Air)Gap | 25
An android tale, from OS audit to NFC data exfiltration
Normal Type-A pooling:
RTL-SDR to the rescue
~$ cat android_tale.txt
Mind the (Air)Gap | 26
An Android tale, from OS audit to NFC data exfiltration
Different modes for NFC operation were tested and visualized with the SDR.
If the device is configured as FLAG_READER_NFC_F (among others), the device immediately starts to pool for
nearby tags.
If the device is configured as FLAG_READER_SKIP_NDEF_CHECK, the device immediately is in radio silence (for
our purposes).
What if:
Abusing
~$ cat android_tale.txt
Mind the (Air)Gap | 27
An Android tale, from OS audit to NFC data exfiltration
Are you OOK?
NFC controllable bursts:
Timing not completely controllable
Data exfiltration via bursts
On-Off Keying is the immediate idea
~$ cat android_tale.txt
Mind the (Air)Gap | 28
An Android tale, from OS audit to NFC data exfiltration
Implementation and Testing
We can control the NFC radio (without any permissions); let’s implement a data exfiltration method!
Using radio bursts for binary 1 and silence for binary 0, the simplest ASK implementation = OOK.
Transmission protocol includes Hamming(7,4) correction codes for each nibble, to compensate for interference.
Preamble
Nibble 1 EC1 Nibble 2 EC2
TrailerByte 1 Byte N. . .
~$ cat android_tale.txt
Mind the (Air)Gap | 29
An Android tale, from OS audit to NFC data exfiltration
Implementation and Testing
How can we receive the signal? Custom hardware? SDR decoding?
Remember 13.56Mhz? AKA High Frequency waves, aka Short waves.
A high end receiver is probably nice, a cheap one works as well :).
The receiver is an Android app that collects data from the mic jack.
Practical, low cost receiver with off the shelf components.
~$ cat android_tale.txt
Mind the (Air)Gap | 30
An Android tale, from OS audit to NFC data exfiltration
Ultra low cost long range NFC data exfiltration
Nice. Wait, what do you mean long range? N.F.C. - the N is for near, right?
Turns out that no. Remember the pooling process? It’s sort of a strong signal…
Data exfiltration, one way.
Ok so more than 4cm. How much more then? 40cm? 400cm?
Over forty meters – 40m.
~$ cat android_tale.txt
Mind the (Air)Gap | 31
NFCDrip – Data exfiltration from a compromised device via NFC
Attack scenario example
A NFC enabled device has been compromised by malware that steals users credentials
The malware wants to leak the information to an attacker and must be completely stealthy or there is an air-gap in effect
disabling “normal” transmissions (Wi-Fi, Ethernet, Bluetooth, GSM/GPRS, etc…), so it uses NFC for exfiltration.
The attacker receives the credentials across the street using a normal inconspicuous AM radio connected to his
smartphone.
NFCDrip - Live Demo
As he stands in the room, he looks around.
- ”Murphy… are you there?...”
~$ cat conclusion.txt
Mind the (Air)Gap | 33
Research conclusions
“To him that will, ways are not wanting”
Imagination knows no boundaries. As long as a device is on, people will find a way
to exfiltrate data out of it.
The IoT brings extra challenges to security that come into effect with air
gapping processes and policies.
Even a BLE light bulb can be used to exfiltrate data from kilometers away.
NFC should no longer be considered a short range channel. It is demonstrated
that it can be abused effectively on long range, using low cost equipment.
~$ apropos wtf?
Mind the (Air)Gap | 34
Q / A

Más contenido relacionado

La actualidad más candente

Citylab programmable converged networks for smartcities
Citylab programmable converged networks for smartcitiesCitylab programmable converged networks for smartcities
Citylab programmable converged networks for smartcitiesJohann Marquez-Barja
 
OW2con'14 - XLcloud, a demonstation of 3D remote rendering in the cloud
OW2con'14 - XLcloud, a demonstation of 3D remote rendering in the cloudOW2con'14 - XLcloud, a demonstation of 3D remote rendering in the cloud
OW2con'14 - XLcloud, a demonstation of 3D remote rendering in the cloudOW2
 
Introduction to Software Defined Radio (SDR)
Introduction to Software Defined Radio (SDR)Introduction to Software Defined Radio (SDR)
Introduction to Software Defined Radio (SDR)Pamela O'Shea
 
Enabling 5G through end-to-end wireless and optical orchestration
Enabling 5G through end-to-end wireless and optical orchestrationEnabling 5G through end-to-end wireless and optical orchestration
Enabling 5G through end-to-end wireless and optical orchestrationJohann Marquez-Barja
 
A gen2 based rfid authentication protocol
A gen2 based rfid authentication protocolA gen2 based rfid authentication protocol
A gen2 based rfid authentication protocolSunil Rm
 
[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개
[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개
[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개NUGU developers
 
Essential principles of jitter part 2 the components of jitter
Essential principles of jitter part 2 the components of jitterEssential principles of jitter part 2 the components of jitter
Essential principles of jitter part 2 the components of jitterteledynelecroy
 
Essentials of jitter part 3 webinar slides
Essentials of jitter part 3 webinar slidesEssentials of jitter part 3 webinar slides
Essentials of jitter part 3 webinar slidesteledynelecroy
 
[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...
[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...
[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...NUGU developers
 
SCA Next Part 1 - Software Defined Radio (SDR) Webcast Slides
SCA Next Part 1 - Software Defined Radio (SDR) Webcast SlidesSCA Next Part 1 - Software Defined Radio (SDR) Webcast Slides
SCA Next Part 1 - Software Defined Radio (SDR) Webcast SlidesADLINK Technology IoT
 
Universal software defined radio development platform
Universal software defined radio development platformUniversal software defined radio development platform
Universal software defined radio development platformBertalan EGED
 
Software defined radio
Software defined radioSoftware defined radio
Software defined radioDevesh Samaiya
 
BLE_Indoor_Report
BLE_Indoor_ReportBLE_Indoor_Report
BLE_Indoor_ReportTianhao Li
 
PRLSAMP PP Presentation
PRLSAMP PP PresentationPRLSAMP PP Presentation
PRLSAMP PP Presentationkotorr
 
Lab based ppt pluto-sdr_final
Lab based ppt pluto-sdr_finalLab based ppt pluto-sdr_final
Lab based ppt pluto-sdr_finalBhavna Singh
 

La actualidad más candente (20)

Usrp family-09-open
Usrp family-09-openUsrp family-09-open
Usrp family-09-open
 
Citylab programmable converged networks for smartcities
Citylab programmable converged networks for smartcitiesCitylab programmable converged networks for smartcities
Citylab programmable converged networks for smartcities
 
OW2con'14 - XLcloud, a demonstation of 3D remote rendering in the cloud
OW2con'14 - XLcloud, a demonstation of 3D remote rendering in the cloudOW2con'14 - XLcloud, a demonstation of 3D remote rendering in the cloud
OW2con'14 - XLcloud, a demonstation of 3D remote rendering in the cloud
 
Introduction to Software Defined Radio (SDR)
Introduction to Software Defined Radio (SDR)Introduction to Software Defined Radio (SDR)
Introduction to Software Defined Radio (SDR)
 
Enabling 5G through end-to-end wireless and optical orchestration
Enabling 5G through end-to-end wireless and optical orchestrationEnabling 5G through end-to-end wireless and optical orchestration
Enabling 5G through end-to-end wireless and optical orchestration
 
A gen2 based rfid authentication protocol
A gen2 based rfid authentication protocolA gen2 based rfid authentication protocol
A gen2 based rfid authentication protocol
 
[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개
[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개
[NUGU CONFERENCE 2019] 트랙 A-2 : NUGU call 적용 기술 및 서비스 소개
 
Essential principles of jitter part 2 the components of jitter
Essential principles of jitter part 2 the components of jitterEssential principles of jitter part 2 the components of jitter
Essential principles of jitter part 2 the components of jitter
 
Essentials of jitter part 3 webinar slides
Essentials of jitter part 3 webinar slidesEssentials of jitter part 3 webinar slides
Essentials of jitter part 3 webinar slides
 
[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...
[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...
[NUGU CONFERENCE 2019] 트랙 A-4 : Zero-shot learning for Personalized Text-to-S...
 
SCA Next Part 1 - Software Defined Radio (SDR) Webcast Slides
SCA Next Part 1 - Software Defined Radio (SDR) Webcast SlidesSCA Next Part 1 - Software Defined Radio (SDR) Webcast Slides
SCA Next Part 1 - Software Defined Radio (SDR) Webcast Slides
 
Universal software defined radio development platform
Universal software defined radio development platformUniversal software defined radio development platform
Universal software defined radio development platform
 
Introduction to tms320c6745 dsp
Introduction to tms320c6745 dspIntroduction to tms320c6745 dsp
Introduction to tms320c6745 dsp
 
Software defined radio
Software defined radioSoftware defined radio
Software defined radio
 
RFID - MIMO Prototype based on GnuRadio
RFID - MIMO Prototype based on GnuRadioRFID - MIMO Prototype based on GnuRadio
RFID - MIMO Prototype based on GnuRadio
 
BLE_Indoor_Report
BLE_Indoor_ReportBLE_Indoor_Report
BLE_Indoor_Report
 
Software defined radio
Software defined radioSoftware defined radio
Software defined radio
 
PRLSAMP PP Presentation
PRLSAMP PP PresentationPRLSAMP PP Presentation
PRLSAMP PP Presentation
 
Jg3515961599
Jg3515961599Jg3515961599
Jg3515961599
 
Lab based ppt pluto-sdr_final
Lab based ppt pluto-sdr_finalLab based ppt pluto-sdr_final
Lab based ppt pluto-sdr_final
 

Similar a Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration

Operating System Fingerprinting Prevention
Operating System Fingerprinting PreventionOperating System Fingerprinting Prevention
Operating System Fingerprinting Preventiondcalhoun1984
 
Chapter 3. sensors in the network domain
Chapter 3. sensors in the network domainChapter 3. sensors in the network domain
Chapter 3. sensors in the network domainPhu Nguyen
 
20081114 Friday Food iLabt Bart Joris
20081114 Friday Food iLabt Bart Joris20081114 Friday Food iLabt Bart Joris
20081114 Friday Food iLabt Bart Jorisimec.archive
 
IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...
IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...
IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...IRJET Journal
 
Plan_design and FPGA implement of MIMO OFDM SDM systems
Plan_design and FPGA implement of MIMO OFDM SDM systemsPlan_design and FPGA implement of MIMO OFDM SDM systems
Plan_design and FPGA implement of MIMO OFDM SDM systemsTan Vo
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwoAKHIL969626
 
Adam_Mcconnell_Revision3
Adam_Mcconnell_Revision3Adam_Mcconnell_Revision3
Adam_Mcconnell_Revision3Adam McConnell
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSDr. Edwin Hernandez
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
 
slide_rftrack_22082015
slide_rftrack_22082015slide_rftrack_22082015
slide_rftrack_22082015Marco Rainone
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area NetworksDilum Bandara
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMIRJET Journal
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection finalAkshay Bansal
 
USRP Project Final Report
USRP Project Final ReportUSRP Project Final Report
USRP Project Final ReportArjan Gupta
 
Embedded computer system
Embedded computer systemEmbedded computer system
Embedded computer systemGovind Kaintura
 

Similar a Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration (20)

Operating System Fingerprinting Prevention
Operating System Fingerprinting PreventionOperating System Fingerprinting Prevention
Operating System Fingerprinting Prevention
 
Chapter 3. sensors in the network domain
Chapter 3. sensors in the network domainChapter 3. sensors in the network domain
Chapter 3. sensors in the network domain
 
SIGFOX Makers Tour - Porto
SIGFOX Makers Tour - PortoSIGFOX Makers Tour - Porto
SIGFOX Makers Tour - Porto
 
Bayisa Taye.pptx
Bayisa Taye.pptxBayisa Taye.pptx
Bayisa Taye.pptx
 
20081114 Friday Food iLabt Bart Joris
20081114 Friday Food iLabt Bart Joris20081114 Friday Food iLabt Bart Joris
20081114 Friday Food iLabt Bart Joris
 
IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...
IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...
IRJET- Autonomous Underwater Vehicle: Electronics and Software Implementation...
 
Plan_design and FPGA implement of MIMO OFDM SDM systems
Plan_design and FPGA implement of MIMO OFDM SDM systemsPlan_design and FPGA implement of MIMO OFDM SDM systems
Plan_design and FPGA implement of MIMO OFDM SDM systems
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Adam_Mcconnell_Revision3
Adam_Mcconnell_Revision3Adam_Mcconnell_Revision3
Adam_Mcconnell_Revision3
 
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONSIntellectual Property for Sale/License - EGLA COMMUNICATIONS
Intellectual Property for Sale/License - EGLA COMMUNICATIONS
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
2-3-IoT Deployments: Smart City Case Study - Marc Nader
2-3-IoT Deployments: Smart City Case Study - Marc Nader2-3-IoT Deployments: Smart City Case Study - Marc Nader
2-3-IoT Deployments: Smart City Case Study - Marc Nader
 
slide_rftrack_22082015
slide_rftrack_22082015slide_rftrack_22082015
slide_rftrack_22082015
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 
Ccnafile
CcnafileCcnafile
Ccnafile
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEM
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection final
 
SIGFOX Makers Tour - Dublin
SIGFOX Makers Tour - DublinSIGFOX Makers Tour - Dublin
SIGFOX Makers Tour - Dublin
 
USRP Project Final Report
USRP Project Final ReportUSRP Project Final Report
USRP Project Final Report
 
Embedded computer system
Embedded computer systemEmbedded computer system
Embedded computer system
 

Último

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration

  • 1. Mind the (Air)Gap Data Exfiltration via NFC and Smart Bulbs
  • 2. Email – pedro@char49.com IRC – kripthor irc.overthewire.org Twitter - @kripthor http://pgp.mit.edu:11371/pks/lookup?search=0x64490c55 Pedro Umbelino Senior Security Researcher @Checkmarx Research Team Mind the (Air)Gap | 2 ~$ whoami
  • 3. ~$ ls -la What is this talk about? Airgap Covert Channels Data Exfiltration NFC Research and Demo BLE Smart Bulb Research and Demo Mind the Air(Gap)| 3
  • 4. ~$ ls -la Why Research Airgaps? High security environments are increasing, new data exfiltration methods needed Low fingerprint or stealthy requirements Low permissions bypass Extra challenging, it’s fun and Hollywood has nothing on us Mind the Air(Gap)| 4
  • 5. ~$ cat what_is_an_airgap.txt Mind the (Air)Gap | 5 Airgap Definition Air-gapping is a measure or set of measures to ensure a secure computer is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network. The name arises from the technique of creating a network that is physically separated (with a conceptual air gap) from all other networks. The concept represents nearly the maximum protection one network can have from another (save turning the device off). Applications where air-gapping are seen most often: Military/governmental computer networks/systems Financial computer systems Industrial control systems nuclear power plants, aviation, medical equipment
  • 6. ~$ cat what_is_an_airgap.txt Mind the (Air)Gap | 6 Airgap covert channel Definition An air-gap covert channel could be defined as any unintentional channel that is used to transmit and/or receive data between systems in which air-gapping measures were taken at the emitter, receiver or both. Unintentional means that the channel was not originally designed to be used as a data communications channel in the way that it is being used. In this sense, it could also be called out-of-band. Although there might be some additional software (malware) needed at the target system to make a particular covert channel viable, there is no additional hardware installed on such systems.
  • 7. ~$ cat what_is_an_airgap.txt Mind the (Air)Gap | 7 Airgap covert channel supports Physical Media Acoustic Light Seismic Magnetic Thermal Electromagnetic
  • 8. Real World Examples From the 80s to Today
  • 9. ~$ cat examples.txt Mind the (Air)Gap | 9 Examples Electromagnetic emissions Van Eck Phreaking (1985) Markus Kuhn (2004)
  • 10. ~$ cat examples.txt Mind the (Air)Gap | 10 Examples Electromagnetic emissions Barisani and Bianco (2009, PS/2 ground) Vuagnoux and Pasini (2009, EMF leak, all keyboards) Light emissions Loughry and Umphress (2002, CapsLock)
  • 11. ~$ cat examples.txt Mind the (Air)Gap | 11 Examples Sound emissions Asonov and Agrawal (2004, Neural Network for keyboards) Hanspach and Goetz (2013, Acoustic mesh)
  • 12. ~$ cat state_of_the_art.txt Mind the (Air)Gap | 12 Latest research Electromagnetic Ben-Gurion University (2014, AirHopper, FM transmitter) Ben-Gurion University (2015, GSMem) Ben-Gurion University (2016, USBee) Magnetic Ben-Gurion University (2018, ODINI) Acoustic Tromer, Shamer and Genkin (2014, Acoustic Crypto)
  • 13. ~$ cat state_of_the_art.txt Mind the (Air)Gap | 13 Latest research Thermal Ben-Gurion University (2015, BitWhisper) Light Ben-Gurion University (2014, Scanner / Laser Drone) Seismic Deshotels (2014, smartphone ultrashort vibrations)
  • 14. Data Exfiltration Research #1 - Light bulbs Are Getting Smart
  • 15. ~$ cat lightbulb_tale.txt Mind the (Air)Gap | 15 A BLE tale, from failed root to data exfiltration via a lightbulb How it began I like to research stuff. Random stuff. Sometimes even security related stuff. Turns out I’m not alone. David Sopas shares the same illness. David nowadays is researching a lot in IoT, when he is not overseeing a bunch of crazy researchers. Some months ago, he told me about a light bulb he was hacking into and so the story begins…
  • 16. ~$ cat lightbulb_tale.txt Mind the (Air)Gap | 16 A BLE light bulb, from China with love Plan A failed The main idea was, well, to get root on the light bulb. It wasn’t feasible with the research but there was still something that was possible to control, the light itself. We were very surprised to see that there were no authentication when it comes to use the lamp. /s Basic BLE security fails.
  • 17. ~$ cat lightbulb_tale.txt Mind the (Air)Gap | 17 Enumeration and reversing BLEAH BLEAH enumeration One writable characteristic Reversing the Android app Profit, RGB color set
  • 18. ~$ cat lightbulb_tale.txt Mind the (Air)Gap | 18 Implementation and Testing The blue channel Preamble TrailerByte 1 The transmitter was implemented using a simple scheme, by changing the blue light intensity, weaker for binary 1, stronger for binary 0. The blue channel was chosen because the human eye has more difficulties in distinguish shades of blue. The demonstration protocol is simple, for each byte, a preamble and trailer. There is lots of room for improvement. The low speed of change in light allows for a regular smartphone camera to be able to detect and process the data (low FPS). A low cost, off the shelf solution.
  • 19. ~$ cat lightbulb_tale.txt Mind the (Air)Gap | 19 BLEExfil – Data exfiltration from a compromised device via a BLE light bulb Attack scenario example A BLE enabled device has been compromised by malware that steals users credentials The malware wants to leak the information to an attacker and must be completely stealthy or there is an air-gap in effect disabling “normal” transmissions (Wifi, Ethernet, GSM/GPRS, etc…), so it uses a nearby BLE lightbulb for exfiltration. The attacker receives the credentials across the street using a normal smartphone, maybe using a telescope if the light bulb is far away.
  • 20. BLEExfil - Live Demo Let the Sacrifice of a Small Penguin Appease the Demo Gods
  • 21. Data Exfiltration Research #2 - Android and NFC
  • 22. ~$ cat android_tale.txt Mind the (Air)Gap | 22 An Android tale, from OS audit to NFC data exfiltration How it began I like to research stuff. Random stuff. Sometimes even security related stuff. My overlords are awesome! :) An Android device audit turned into full Android 6.0 OS audit Previous experience on Android (CVE-2013-6271 Remove locks, CVE-2013-6272 + Kolme) Permissions and opportunity android.nfc.NfcAdapter -> enableReaderMode(…);
  • 23. ~$ cat android_tale.txt Mind the (Air)Gap | 23 --- Near Field Communications --- NFC 101 Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which can be a portable device such as a smartphone, to establish communication by bringing them within 4 cm of each other. NFC always involves an initiator and a target; the initiator actively generates an RF field that can power a passive target, by means of electromagnetic induction between two loop antennas located within each other's near field. It operates in the radio frequency band of 13.56 MHz. A device can be a reader and/or a writer. A device (or cards) can be configured as Type A, Type B and others. The main differences between types concern modulation methods, coding schemes and protocol initialization procedures.
  • 24. ~$ cat android_tale.txt Mind the (Air)Gap | 24 An Android tale, from OS audit to NFC data exfiltration Being creative android.nfc.NfcAdapter -> enableReaderMode(…); No permissions needed, despite NFC permission blocks everything else But what does it do exactly?
  • 25. ~$ cat android_tale.txt Mind the (Air)Gap | 25 An android tale, from OS audit to NFC data exfiltration Normal Type-A pooling: RTL-SDR to the rescue
  • 26. ~$ cat android_tale.txt Mind the (Air)Gap | 26 An Android tale, from OS audit to NFC data exfiltration Different modes for NFC operation were tested and visualized with the SDR. If the device is configured as FLAG_READER_NFC_F (among others), the device immediately starts to pool for nearby tags. If the device is configured as FLAG_READER_SKIP_NDEF_CHECK, the device immediately is in radio silence (for our purposes). What if: Abusing
  • 27. ~$ cat android_tale.txt Mind the (Air)Gap | 27 An Android tale, from OS audit to NFC data exfiltration Are you OOK? NFC controllable bursts: Timing not completely controllable Data exfiltration via bursts On-Off Keying is the immediate idea
  • 28. ~$ cat android_tale.txt Mind the (Air)Gap | 28 An Android tale, from OS audit to NFC data exfiltration Implementation and Testing We can control the NFC radio (without any permissions); let’s implement a data exfiltration method! Using radio bursts for binary 1 and silence for binary 0, the simplest ASK implementation = OOK. Transmission protocol includes Hamming(7,4) correction codes for each nibble, to compensate for interference. Preamble Nibble 1 EC1 Nibble 2 EC2 TrailerByte 1 Byte N. . .
  • 29. ~$ cat android_tale.txt Mind the (Air)Gap | 29 An Android tale, from OS audit to NFC data exfiltration Implementation and Testing How can we receive the signal? Custom hardware? SDR decoding? Remember 13.56Mhz? AKA High Frequency waves, aka Short waves. A high end receiver is probably nice, a cheap one works as well :). The receiver is an Android app that collects data from the mic jack. Practical, low cost receiver with off the shelf components.
  • 30. ~$ cat android_tale.txt Mind the (Air)Gap | 30 An Android tale, from OS audit to NFC data exfiltration Ultra low cost long range NFC data exfiltration Nice. Wait, what do you mean long range? N.F.C. - the N is for near, right? Turns out that no. Remember the pooling process? It’s sort of a strong signal… Data exfiltration, one way. Ok so more than 4cm. How much more then? 40cm? 400cm? Over forty meters – 40m.
  • 31. ~$ cat android_tale.txt Mind the (Air)Gap | 31 NFCDrip – Data exfiltration from a compromised device via NFC Attack scenario example A NFC enabled device has been compromised by malware that steals users credentials The malware wants to leak the information to an attacker and must be completely stealthy or there is an air-gap in effect disabling “normal” transmissions (Wi-Fi, Ethernet, Bluetooth, GSM/GPRS, etc…), so it uses NFC for exfiltration. The attacker receives the credentials across the street using a normal inconspicuous AM radio connected to his smartphone.
  • 32. NFCDrip - Live Demo As he stands in the room, he looks around. - ”Murphy… are you there?...”
  • 33. ~$ cat conclusion.txt Mind the (Air)Gap | 33 Research conclusions “To him that will, ways are not wanting” Imagination knows no boundaries. As long as a device is on, people will find a way to exfiltrate data out of it. The IoT brings extra challenges to security that come into effect with air gapping processes and policies. Even a BLE light bulb can be used to exfiltrate data from kilometers away. NFC should no longer be considered a short range channel. It is demonstrated that it can be abused effectively on long range, using low cost equipment.
  • 34. ~$ apropos wtf? Mind the (Air)Gap | 34 Q / A