2017
DOI: 10.48550/arxiv.1706.01140
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

5
0

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…Loughry and Umphress proposed using the PC keyboard LEDs (caps-lock, num-lock and scroll-lock) to modulate data [19]. In 2017, Guri et al presented a covert channel that uses the hard drive indicator LED [13] and router LEDs [20] in order to leak data from air-gapped computers and networks. VisiSploit [21] is another optical covert channel in which data is leaked through fast blinking images or low contrast bitmaps projected on the computer screen.…”
Section: Related Workmentioning
confidence: 99%
“…Loughry and Umphress proposed using the PC keyboard LEDs (caps-lock, num-lock and scroll-lock) to modulate data [19]. In 2017, Guri et al presented a covert channel that uses the hard drive indicator LED [13] and router LEDs [20] in order to leak data from air-gapped computers and networks. VisiSploit [21] is another optical covert channel in which data is leaked through fast blinking images or low contrast bitmaps projected on the computer screen.…”
Section: Related Workmentioning
confidence: 99%
“…In 2002, Loughry and Umphress proposed a malicious code that exfiltrates data by blinking the Caps Lock, Num Lock, and Scroll Lock LEDs on the PC keyboard [29]. More recently, Guri et al presented a covert channel that uses the hard drive indicator LED [30] the router LEDs [31] in order to leak data from air-gapped computers and networks. VisiSploit [32] is another optical based covert channel in which data is leaked through fast blinking images or low contrast bitmaps projected on the computer screen.…”
Section: B Acoustic Optical and Thermalmentioning
confidence: 99%
“…Note that several APTs discovered in the last decade are capable of infecting air-gapped networks [40], e.g., Turla [41], RedOctober [42], and Fanny [43]. As a part of the targeted attack, the adversary may infiltrate BitWhisper [35] Optical Hard drive LED (LED-it-GO) [30] VisiSploit (invisible pixels) [32] Keyboard LEDs [30] Router LEDs [31] Infrared (IR) aIR-Jumper (security cameras & infrared) [34] Implanted infrared LEDs [33] the air-gapped networks using social engineering, supply chain attacks, or insiders. Receiver Implantation.…”
Section: Magneticmentioning
confidence: 99%
“…In 2017, Guri et al presented LED-it-GO, a covert channel that uses the hard drive indicator LED in order to exfiltrate data from air-gapped computers [32]. Guri et al also presented a method for data exfiltration from air-gapped networks via router and switch LEDs [30]. Data can also be leaked optically through fast blinking images or low contrast bitmaps projected on the LCD screen [21].…”
Section: Opticalmentioning
confidence: 99%
“…Thermal BitWhisper [26] (heat emission) Optical LED-it-GO [32] (hard drive LED) VisiSploit [21] (invisible pixels) Keyboard LEDs [37] Router LEDs [30] Optical (infrared) aIR-Jumper [19] (security cameras & infrared) which prevents passing any signal from output to input.…”
Section: E Acousticmentioning
confidence: 99%