The Computer Security Threat From Ultrasonic Networks 121
KentuckyFC (1144503) writes Security researchers in Germany have demonstrated an entirely new way to attack computer networks and steal information without anybody knowing. The new medium of attack is ultrasonic sound. It relies on software that uses the built-in speakers on a laptop to broadcast at ultrasonic frequencies while nearby laptops listen out for the transmissions and pass them on, a set up known as a mesh network. The team has tested this kind of attack on a set of Lenovo T400 laptops infected with key-logging software. They say it is possible to transmit ultrasonic signals covertly at data rates of 20 bits per second at distances of up to 20 metres in an office environment. Interestingly, the team created the covert system by adapting a protocol designed for underwater acoustic communication. They've also tested various strategies for defeating this kind of attack. An obvious option is to disable all speakers and microphones but this also prevents ordinary activities such as VOIP communication. Instead, they suggest filtering the audio signals to prevent ultrasonic transmissions or converting them into an audible frequency. This may be newer than most attack vectors, but it's not the first time that ultrasonic transmission has been demonstrated as a vulnerability; in November of last year we mentioned malware operating along the same lines, as investigated byPwn2Own creator Dragos Ruiu.
Hardware sampling rates (Score:2)
Re: (Score:3)
I have not researched the subject a lot, but these are what I have read across the many years of the discussion reemerging.
Personally, if I listen to an 256kbit MP3, then switch back to FLAC, I hear a slight difference, but it'
Re:Hardware sampling rates (Score:5, Interesting)
I was under the impression that while humans mostly cannot hear ultrasonic sounds, the existence of them can be perceived as a kind of "texture" to other sounds that we can hear. Removing these frequencies all together from all sounds sources can make stuff sounds more artificial.
The timbre of any sound is due to harmonics -- frequencies higher than the fundamental. MP3 and other lossy compression schemes do indeed remove some of the quieter harmonics. However, if the harmonics are outside the hearing range, well, then you can't hear them.
However, there may be nonlinear effects which convert some of the ultrasound to lower frequencies. Also, when a frequency exceeds the Nyquist limit (half the sampling rate), it is aliased to a frequency within the sampling range. (Hence "anti-aliasing", which is simply filtering out too high frequencies to prevent this effect.)
Re: Hardware sampling rates (Score:1)
Yes. Monster Cables can transmit this audio texture more accurately due to the unicorn poop mixed in with their enchanted copper.
Also, no, you're wrong.
Re: (Score:2)
I was under the impression that while humans mostly cannot hear ultrasonic sounds, the existence of them can be perceived as a kind of "texture" to other sounds that we can hear. Removing these frequencies all together from all sounds sources can make stuff sounds more artificial.
Nope, it's 100% bullshit. Audiophiles cling to it as justification for spending money on 96 or 192 kHz shit.
When recording a physical sound, the sum total of all frequency components interfering with each other will be recorded by the microphone. A microphone does not record individual frequency components, it records a physical pressure wave. Your ear picks up the effects of frequency components outside of its range interfering with frequency components inside its range. A microphone does the exact sam
Re: (Score:3)
48kHz (98kHz sample rate) is only one octave higher than 24kHz (48kHz sample rate). I most certainly can hear that difference.
And even if we couldn't hear it, audio engineers still need it. Even one octave below the Nyquist limit, you can still lose up to 30% of your original signal.
Re: (Score:2)
You can't hear a difference. You can't hear 24 kHz, let alone 48 kHz. Human hearing stops at around 20 kHz. Twice that is 40 kHz, so both 44.1 and 48 kHz are sufficient to cover everything audible completely transparently.
You're a moron for saying "only one octave higher" when the definition of an octave is the doubling (or halving) of frequency between two tones.
800 Hz is only one octave higher than 400 Hz. 800 GHz is "only" one octave higher than 400 GHz.
Audio engineers don't need it because none of t
Re: (Score:2)
A good pair of headphones and analog signal generator says I can hear a difference.
The Nyquist limit, if you weren't familiar, takes energy out of waveforms, canceling it out if you're lucky, but usually turning it into a lower frequency. Try it yourself, generate a sine wave sweep from 1kHz to 22kHz and take a listen to all the noise that appears even at two octaves below the limit.
Two octaves below the Nyquist limit of a CD is about 5.5kHz, as you very kindly point out, which I would call rather audible.
T
Re: (Score:3)
Most music these days is not produced via an analog signal to a microphone. Rather, a digital process creates an analog waveform in software like Ableton Live, Cubase, etc. If an overtone or other sonic artifacts are applied, you can definitely hear the effects on the music even though these ar
Re: (Score:3)
You use profanity to refer to audiophiles and you clearly have no idea what you're talking about. 96 or 192kHZ sampling rate doesn't have much to do with frequency response , which is what we are takling about.
Of course I use profanity. Audiophiles are fucking morons. They're dumber than people who wage political campaigns against vaccines. People who are afraid of vaccines at least have minor blips of correlation to base their fears off of, while the science simply shows no connection. Audiophiles have hard science and experimental data that actually proves they're wrong.
I'm not talking about frequency response, I'm talking about sample rate because the person I was replying to was talking about sample rate
Re: (Score:2)
Of course I use profanity. Audiophiles are fucking morons. They're dumber than people who wage political campaigns against vaccines. People who are afraid of vaccines at least have minor blips of correlation to base their fears off of, while the science simply shows no connection. Audiophiles have hard science and experimental data that actually proves they're wrong.
Sometimes, there is scientific data about audiophiles being wrong (like FLAC vs 320k MP3), but no..any idiot can tell the difference between a Cerwin-Vega PA and a Funktion One. Klippel tests can provide scientific data to analyze why this is the case. So, your argument is far too broad to be true. Also, inserting profanity rather than logic or anything to backup your claims shows you're making emotional arguments rather than scientific ones.
I'm not talking about frequency response, I'm talking about sample rate because the person I was replying to was talking about sample rate in relation to FLAC, MP3, etc., and the discussion thread is about limiting the sample rate of the sound card. Please read before you post.
FLAC vs MP3 is largely a result of the cutoff at 16khz of
Re: (Score:3)
Every couple of years when I get my hearing test, the frequency response plot stops at 20kHz and the actual test signals stop at 18hKz. Because people can't hear higher than that.
Re: (Score:2)
I was under the impression that while humans mostly cannot hear ultrasonic sounds, the existence of them can be perceived as a kind of "texture" to other sounds that we can hear. Removing these frequencies all together from all sounds sources can make stuff sounds more artificial.
Nope, it's 100% bullshit. Audiophiles cling to it as justification for spending money on 96 or 192 kHz shit.
When recording a physical sound, the sum total of all frequency components interfering with each other will be recorded by the microphone. A microphone does not record individual frequency components, it records a physical pressure wave. Your ear picks up the effects of frequency components outside of its range interfering with frequency components inside its range. A microphone does the exact same thing.
96K and 192K sample rates with 24 or even 32 bit float sample widths have nothing to do with audiophile gear. It has to do with digital audio processing. Processing at higher sample rates during mixing and editing reduces losses and aliasing errors that creep into the audible portion of the signal from effects, filters, and summing. During final mastering the sample rate is down converted back to 44.1Khz 16 bit as the last step. If you do all the post-processing at 44.1Khz, 16 bit your effective SNR go
Re: (Score:1)
While this is true, in that "warmth" is perceived by human ears somewhere in the 16KHZ-25KHZ range, over 30KHZ won't even create a "warm" sensation to human ears. In the range of this network, which from TFA appears to be 20khz, many humans will be able to hear something.
If music is properly recorded and mastered, it will typically not contain any artifacts above the 25-30KHZ range. If you are playing music on a high-end system above this range, typically one will apply a high pass filter on their di
Re: (Score:3)
The easiest way to eliminate this threat is to lock down hardware sampling rates such that ultrasonic frequencies cannot be reliably reproduced (e.g. in the BIOS), and allow the user to flip the switch for higher rate support. At least, that's the first idea that came to mind. I'm sure it's not perfect, but it's better than "kill all audio!"
Obviously anything that is vulnerable to software tampering is less secure than some elegant hardware based solution; but surely one could apply ACLs to the audio device, to at least ensure that only suitably blessed applications can interact with it? Doesn't stop a root/kernel level exploit, or a blessed application being subverted; but right now, the default is that any program that can run can make noises, which is certainly easier to slip malice through.
Re:Hardware sampling rates (Score:4, Funny)
Ah, but you're missing an entire other defensive mechanism. One that, I will point out, did not escape the genius of Apple. Recall the recent angst about Apple's acquisition of Beats Audio [slashdot.org]. The two theories judged most likely centered around either gratuitously spending money to annoy the Slashdot hive mind or strategically buying up an inconsequential streaming audio business. Of course, careful consideration (yes, I understand that contradiction here) would lead one to realize that neither is very likely, so I offer a more technically sound rationale:
If you've ever listened to a set of Beats headphones, the second thing you notice (the first is that they are ugly and cheap) is that it is engineered to be unable to pass frequencies higher than 4000 Hz. You're not going to hear a set of cymbals or a piccolo to save your life.
So, these nefarious persons can attempt to stuff whatever data they'd like into the higher registers - it will do them no good at all. You don't need complex software rules, you don't need specially constructed DACs. You just need bass. Furthermore, if all you are going to do is to listen to DC to 4 kHz noise, you don't need a particularly robust audio platform to do it (like an iPhone). And, as an added bonus, this limited bandwidth will save on your precious monthly allotment of data.
Apple has you covered, folks.
Re: (Score:3)
Yes, it's amazing what money tech companies will spend to piss off the average slashdotter. We truly are special.
Re: (Score:2)
I presume you mean as in 'short bus' special.
Re: (Score:2)
Re: (Score:1)
Even better would be to install an analog filter on the speakers that limited frequencies to below 20kHz or so. Component cost less than ten cents.
Re: Hardware sampling rates (Score:1)
20 bits per second.
I type 80wpm. 5 characters per word. 400 chars per minute, or 6.7 chars per second, or about 53 bits per second.
Therefore I type almost three times faster than this channel's data rate.
Re: (Score:2)
20 bits per second.
I type 80wpm. 5 characters per word. 400 chars per minute, or 6.7 chars per second, or about 53 bits per second.
Therefore I type almost three times faster than this channel's data rate.
Log keystrokes.
Optionally, filter (look for the @ symbol for email addresses, a known bank in a browser window's title, symbols / cAPs near eachother for passwords, whatever).
Compress.
Send.
Unless you type > 20 bps after compression (and filtering), the entire time your computer is on, it will keep up.
Even if you do outpace it by a factor of infinity, it will still be transmitting at 20 bps, so it'll still be getting your shit. As hits something interesting (login credentials, your Harry Potter fanfic, w
Re: (Score:2)
Simple analog filters (that you coudl build with 10 cents worth of components) have a slow rolloff. You can't just say "pass everything up to 20KHz, reject everything above that" or even "pass everything up to 15KHZ reject everything over 25KHz" and design a simple analog circuit to do it.
This is one of the big reasons we use high sample rates and filter digitally nowadays. You can get arbiterally close to an ideal "brick wall" filter digitally (though you do pay a price in time delay and computing power) w
Re:Hardware sampling rates (Score:5, Funny)
The easiest way to eliminate this threat is to lock down hardware sampling rates such that ultrasonic frequencies cannot be reliably reproduced
Nope. The easiest way to eliminate this threat is to keep a pet bat next to your computer to scramble any ultrasonic transmission.
Re: (Score:2)
OR...issue whistles to everyone in your office, to be used at random intervals.
Re: (Score:2)
That's very short-sighted. The ultrasonics are only a matter of making the communications stealthier. Systems unable to produce ultrasonics could still communicate with each other, using audible ranges.
Doing so, undetected, just requires a little intelligence. It could wait until late at night, when all the systems have been idle for some time. The malware could
Re: (Score:2)
I swear on some late night upgrades I've heard the machines talking to me, but NOW I know it was true...
Re: (Score:2)
An easier way is just cheap speakers doing what they do best.
Re: (Score:2)
Just a technology arms race (Score:2)
Another exploit undermines a heretofore unknown weakness.
Exploitation that doesn't kill you makes you stronger.
A (hidden) communication channel is not an attack (Score:5, Insightful)
WTF ? That's a covert communication channel, not an attack.
At least the original source gets that right. But what idiot writes the slashdot version of the article?
Re: (Score:3)
Probably the same one who wrote a similar article about a year back.
Re: (Score:1)
To be more specific it is this story [slashdot.org] - same exact paper from November of last year.
Re: (Score:2)
This. It is NOT an attack. And let's face it, very very few people have an air gap on their computers. Since that's the case, it's so much easier to just use the existing wired network or wireless network to ferret data out. 20 bits per second is hardly practical anyway, even for small amounts of data (which, today, would be classified as megabytes.)
Re: A (hidden) communication channel is not an att (Score:1)
Re: (Score:2)
That's absolutely true. If you're one of the 0.00002% who does own a car, well, then obviously you should be thinking about seatbelts. But car owners are so rare that I'll probably never meet one, ever. Seatbelts have zero effect on my life.
Re: (Score:3)
Over 5 million people in the US hold secret-level or higher security clearances. [washingtonpost.com] Nearly all of them have work that involves classified computer systems, ALL of which are air-gapped. And that doesn't even count commercial applications where the company is concerned about industrial espionage.
Your objections here only display your ignorance, not your wisdom.
BTW, you've met at least one now.
I will take the 5 million number at face value.
I laugh at the idea that nearly all of those people access classified computer systems.
And the idea that they're all air gapped? That's just complete bullshit, as recent history has shown.
Re: (Score:2)
Over 5 million people in the US hold secret-level or higher security clearances.
I'm not from the US; as a proportion of population, 5 million is a very high number indeed -- and I believe the proportion in the civilized world is much lower.
Re: (Score:2)
Re: (Score:3)
http://superuser.com/questions... [superuser.com]
So 20 bps is about 24 words per minute. Compare this to a skilled telegraph operator, who can manage 40 wpm.
http://en.wikipedia.org/wiki/M... [wikipedia.org]
So yeah, it's slow, BUT for keylogging it couldn't keep up only if users typed constantly, which they don
Re: (Score:3)
Depends on the data, doesn't it?
If I've installed something which is designed to capture passwords, your 20 bits/sec means I can transmit your password in just a few seconds.
So if all it does it say "got it, user X has this password" ... that can be pretty valuable and is likely do-able in under 30 seconds.
This may not be an attack, but it is an attack vector.
Re: (Score:2)
Store the data in a file on a local drive (hard drive or even USB flash drive)
Transmit it over Ethernet.
Transmit it over Wi-Fi.
Transmit it over bluetooth.
Transmit it over IRDA.
Or, my favorite, just have the machine use text to voice to shout out the us
Re: (Score:2)
Well, given the prevalence of things like spear phishing and the like, maybe it's not all that tough.
And the point of the cloak and dagger is, if they don't know you're listening, and you're using a channel they're not scanning for ... you can keep doing it with impunity.
So, say I worked for an agency which relied on
Re: (Score:1)
IKR... I read the article summary and was double face palming.
You can't install malware via the microphone inputs lol. You can only receive inputs from a preconfigured machine and the attacks still have to happen in other ways.
Re: (Score:2)
You are correct - this is utter and complete nonsense. No uninfected computer is going to consider what comes into the mic channel as potentially sensible to execute, or, indeed do anything other than save it as audio data.
If your computer is in the habit of executing WAV of MP3 files, or saving audio as .exe files, you are already more than truely and completely stuffed.
Re: (Score:3)
Re: (Score:1)
Re: (Score:2)
You will be disappointed to learn that the disablement of the speaker and mic are done in a fly-by-wire manner. I became aware of this firsthand when I discoverd that a bad audio driver was allowing the audio I was listening to to go both to my headphones and my speakers. I wasn't aware of it until a co-worker tapped me on the shoulder. Fixing the mixer settings caused the audio not to go to the speakers.
Further to that, BT is an even bigger fly-by-wire. With BT, you are essentially putting an additiona
Re: (Score:2)
Re: (Score:2)
Not that new (Score:5, Informative)
I worked on a COMSEC job back in the '90s, and both our device and our building (particularly the windows) had countermeasures for this kind of attack.
Perhaps this is a new thing for garage hackers, but intelligence agencies have known about it for decades.
Re: (Score:2)
Yeah you could read old punch cipher locks if you listed closely.
Re: (Score:1)
> Yup, more effective to point a laser at the window and measure the vibrations from the noises within the building.
Laser microphones are not that precise. [npr.org]
Re:Not that new (Score:4, Insightful)
FWIW, Back in the 90's people were also worried about tempest-like stuff (e.g., EM emissions), but simply disabling the speakers isn't enough to inhibit the sonic transmission path. Electronics can "hum" at ultra-sonic frequencies (and fans can transmit audible frequencies), so by running of a suitable thermal virus actions, it is possible to leak information from a previously compromised machine that was not network connected.
However, disabling the microphone would certain make it harder to control such a compromised, air-gapped machine...
Re: (Score:2)
Back in the 90's people were also worried about tempest-like stuff (e.g., EM emissions),
TEMPEST [wikipedia.org] was one of a set of code-words that were themselves unclassified, but their exact meaning was classified. This allowed people like myself to put them on their resume without the resume becoming classified.
It looks like folks (or at least Wikipedia editors) may have pieced together a meaning for this particular one.
Re: (Score:1)
Re: (Score:2)
No it wouldn't. Your speakers transmit the signal and the microphone on the agents laptop recieves it. Disabling your microphone would not help.
Disabling your microphone on an already air-gapped most certainly makes it much harder to clandestinely *control* your machine. Maybe you could send a signal in through the grounding and pick it up somehow in a harmonic of the voltage regulator (amplifying it with a thermal virus so it is detectible), but that's much harder to do (which means the bandwidth will be much-much lower)...
Of course simply disabling a microphone obviously doesn't do much to eliminate *emanations* from your already compromised mach
Ultrasonic reception? (Score:2)
Re: (Score:2)
Does it really matter? (Score:5, Insightful)
Re: (Score:2)
Computer viruses spread long before there was networking... One infected file on a CD, DVD, USB Flash drive, etc. Or it could be even more covert, like a USB mouse/keyboard modified with data storage.
It's still significant. It may offer the only method of getting information in/out of an otherwise isolated network.
While fully auto
Re: (Score:2)
A simple defense (Score:2)
The folks who designed my desktop computer were really thinking ahead on this one: it was built without a speaker. Besides enhancing security, an auxiliary benefit of their clever "no-speaker defense" is that saved the manufacturer cost and space.
Re: (Score:2)
The folks who designed my desktop computer were really thinking ahead on this one: it was built without a speaker. Besides enhancing security, an auxiliary benefit of their clever "no-speaker defense" is that saved the manufacturer cost and space.
Virtually no PC desktops have internal speakers connected to the sound card, and even fewer of them have a microphone. Many PCs no longer even have a speaker connector for POST code beeps, and depend solely on a flush-mount piezo buzzer. But virtually all laptops today have both speakers and mic...
Re: (Score:2)
Fix (Score:4, Insightful)
Headphones. Or dummy jack-plugs.
In what way is this a "vulnerabilty"? (Score:2)
stupid (Score:2)
Re: (Score:2)
Of course,
Re: (Score:1)
Re: (Score:2)
There are plenty of noise sources around us -- fluorescent lamp ballasts are in the 10s of KHz, CRT
Re: (Score:1)
Re: (Score:1)
Better yet, you can remotely execute pre-installed code. Think less of information gathering and more of weaponizing.
If I may be really long winded, let's imagine a system where there is a secure machine that is air gapped by say 30" from a non secured machine. The secure machine has privilleged access to $Doomsday_weapon_001, let's say a missle or better yet the control surface of a critical peice of infrastructure. Once infection has occured, and a payload delivered the two machines can lay in wait. A
As others have pointed out... (Score:2)
... Its a covert transmission channel, not an attack...
A camera pointed at a computer monitor slowly shifts its average hue (a la 'f.lux') is another such example.
My computer talks to me (Score:2)
It tells me things that no one else knows. Things that I'm not supposed to hear.
Sometime it tells me to do things. It told me not to tell you what they are.
Computers only talk to very special people. You wouldn't understand.
It told me to shut up now. Bye.
"Threat" from last year??? (Score:4, Insightful)
Dragos Ruiu's findings from last year were never able to be reproduced by an outsider, and were highly suspect. Sometimes you can be a brilliant security guy, and also a delusional paranoid-- and I think the general consensus was that in that scenario, Dragos was being delusionally paranoid.
The idea that various laptop speakers (all of varying and generally poor quality) will be able to reliably form a wireless network is really far-fetched, no matter how you cut it. Every laptop's mic is different, the speakers are all in different locations, some mics are gonna be off, the acoustics of the room are unknown....
Theres just no way for this to reliably work.
Re: (Score:3, Insightful)
> Every laptop's mic is different, the speakers are all in different locations, some mics are gonna be off, the acoustics of the room are unknown....
Says the guy demonstrating his utter lack of knowledge about DSP. All of those things can be compensated for with the right software, The price is simply reduced throughput. But when you've got days or weeks to run because no one even knows to look for you, even just 1bps can be sufficient.
Dragos being right or wrong says absolutely nothing about the via
Linux not susceptible to attack (Score:5, Funny)
(Joking, joking...built-in and USB soundcards work just fine on all my Linux computers.)
Solution: office dog (Score:5, Funny)
.
Already filtered? (Score:2)
I thought most soundcards had a capacitor on the inputs that already filters out the higher frequencies. I read this when reading about using sound cards directly as software defined radios for receiving VLF signals. To receive higer frequencies some people have shorted the input capacitor out.
Re: (Score:2)
A quick googling found
http://www.clarisonus.com/Rese... [clarisonus.com]
It seems to vary but even if the filtering is present there is likely to be a range just above 20KHz where human hearing is poor but the filters in the soundcard are still passing enough signal to be useful.
20 bits per second (Score:2)
Simple defence (Score:1)
Of course, the average user wouldn't need or probably want this (unless they're security paranoid/enthusiasts), but it might be useful in environments where information security is essential. Maybe even 'hardened' secure devices could have built in noise generators that can't be software disabled as an extra defence feature.
Is this a troll article? (Score:1)
Re: (Score:3)