February 23, 2024


Technology can't be beat

SATAn Turns Hard Drive Cable Into Antenna To Defeat Air-Gapped Security


It seems like [Mordechai Guri]’s lab at Ben-Gurion College is the area exactly where air-gapped pcs go to die, or at minimum to give up their secrets and techniques. And this hack employing a computer’s SATA cable as an antenna to exfiltrate details is one more instance of just how lots of aspect-channel attacks the normal Pc can make obtainable.

The exploit, deliciously selected “SATAn,” depends on the actuality that the SATA 3. interface employed in many pcs has a bandwidth of 6. Gb/s, which means that manipulating the computer’s IO would make it attainable to transmit information from an air-gapped machine at around 6 GHz. It is a difficult exploit, of training course, and includes placing a transmitting application on the concentrate on equipment utilizing the regular solutions, these kinds of as phishing or zero-day exploits. When in spot, the transmitting plan takes advantage of a combination of read and publish functions on the SATA disk to produce RF signals that encode the info to be exfiltrated, with the knowledge traces inside the SATA cable acting as antennae.

SATAn is revealed in motion in the movie under. It takes a whilst to transmit just a couple of bytes of knowledge, and the range is fewer than a meter, but that could be plenty of for the exploit to succeed. The exam setup takes advantage of an SDR — specifically, an ADALM PLUTO — and a notebook, but you can very easily imagine a a lot scaled-down deal staying developed for a stealthy walk-by type assault. [Mordechai] also offers a possible countermeasure for SATAn, which in essence thrashes the difficult travel to crank out RF sound to mask any created signals.

Even though probably minimal in its realistic purposes, SATAn is an attention-grabbing aspect-channel assault to insert to [Dr. Guri]’s record of exploits. From optical exfiltration making use of stability cameras to turning electrical power materials into speakers, the vulnerabilities just retain piling up.


Many thanks to [chuckt] for the tip.

[via Bleeping Computer]



Resource hyperlink