How NSA Can Spy on Air-Gapped Networks? Meet FIREWALK (www.youtube.com)
from kugmo@sh.itjust.works to cybersecurity@sh.itjust.works on 02 May 17:25
https://sh.itjust.works/post/37162345

Came out in 2008 and leaked in 2013, the glowies have been able to send out malicious packets from air-gapped networks for exuberant prices.

#cybersecurity

threaded - newest

sun_is_ra@sh.itjust.works on 02 May 19:41 next collapse

Anyone watched the video willing to share how?

kugmo@sh.itjust.works on 02 May 20:46 next collapse

Work for the NSA, seize package of a computer from person you want to spy on, install RJ45 port with hardware backdoor that also has RF emitter, gather the intercepted packets with RF receiver within distance.

higgsboson@dubvee.org on 02 May 20:46 next collapse

www.schneier.com/blog/…/firewalk_nsa_ex.html

FIREWALK is a bidirectional network implant, capable of passively collecting Gigabit Ethernet network traffic, and actively injecting Ethernet packets onto the same target network.

sun_is_ra@sh.itjust.works on 02 May 21:01 collapse

Thank you kind stranger.

I also found another website that has some images and bit more details if anyone interested

www.cryptomuseum.com/covert/bugs/…/index.htm

kmartburrito@lemmy.world on 02 May 20:51 next collapse

It’s a combination of compromising the hardware gigabit connector on the motherboard, and embedding within that connector a hidden rf device that can exfiltrate data over a wireless signal, effectively jumping across that air gap in place.

It details how the NSA captured hardware shipments in transit and replaced them with the firewalk compromised hardware and then let the shipments proceed to their intended recipient.

It’s an 11 minute video, and a decent watch.

socsa@piefed.social on 03 May 00:45 collapse

They put an SDR into Ethernet ports. This let them inject exploits and exfil data across air gaps using local agents or proxies who merely got close to the device.

index@sh.itjust.works on 02 May 21:21 next collapse

“Came out in 2008 and leaked in 2013”

17 years ago they had this…

Cyber@feddit.uk on 02 May 23:12 next collapse

Ah, there’s other ways too… see the video with a drone watching HDD LEDs.

Needs malware to do the LED thing of course, oh, and deaf security that aren’t concerned by a drone hovering outside a window every night, but apart from that, it’s foolproof.

mindbleach@sh.itjust.works on 03 May 16:09 collapse

“How can NSA–?” is a question.

“How NSA can–” is a statement.