28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

using different VoIP telephones. And each time the vendor was notified in

advance, and each time the vendor did produce a fix. But Cui has pointed

out that just because a patch exists doesn’t mean it gets applied. Some of

the unpatched phones might still be sitting in offices, hotels, and hospitals

right now.

So how did Cui get the data off the phone? Since office computer

networks are monitored for unusual activityy, he needed another means of

extracting the data. He decided to go “off network” and use radio waves

instead.

Previouslyy, researchers at Stanford Universityy and in Israel found that

having yyour mobile phone positioned next to yyour computer can allow a

remote third partyy to eavesdrop on yyour conversations. The trick requires

malware to be inserted onto yyour mobile device. But with maliciouslyy

coded apps available for download from rogue app stores, that’s easyy

enough, right?

With the malware installed on yyour mobile phone, the gyyroscope within

the phone is now sensitive enough to pick up slight vibrations. The malware

in this case, researchers sayy, can also pick up minute air vibrations,

including those produced byy human speech. Google’s Android operating

syystem allows movements from the sensors to be read at 200 Hz, or 200

cyycles per second. Most human voices range from 80 to 250 Hz. That

means the sensor can pick up a significant portion of those voices.

Researchers even built a custom speech-recognition program designed to

interpret the 80–250 Hz signals further. 9

Cui found something similar within the VoIP phones and printers. He

found that the fine pins sticking out of just about anyy microchip within anyy

embedded device todayy could be made to oscillate in unique sequences and

therefore exfiltrate data over radio frequencyy (RF). This is what he calls a

funtenna, and it is a virtual playyground for would-be attackers. Officiallyy,

sayys securityy researcher Michael Ossmann, whom Cui credits for the idea,

“a funtenna is an antenna that was not intended byy the designer of the

syystem to be an antenna, particularlyy when used as an antenna byy an

attacker.” 10

Aside from a funtenna, what are some other wayys people can spyy on

what yyou do at work?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!