Many methods have failed in the effort to secure digital communications, but one has remained relatively reliable: Faraday cages. These metallic enclosures prevent all incoming and outgoing electrical charges, and have successfully been used in the past by those hoping to conceal their wireless communications. You may remember Chelsea Manning used a makeshift Faraday cage last year when she asked New York Times reporters to dump their phones in a microwave to prevent prying ears from listening in.
Despite their often unorthodox appearance, Faraday cages are largely considered an effective, if not extreme, additional step in securing communications. While many have utilized this technology for personal uses (A bar owner in the UK even created his own Faraday cage to keep drinkers off their phones), larger institutions like banks, governments, and other corporations turn to Faraday cages to house some of their most sensitive data. These systems also vary in size. Smaller Faraday cages and Faraday bags may be used for individuals while larger corporations may create entire Faraday conference rooms.
It appears, however, that these metal mesh cages may have a chink in their armor.
A new attack method laid out in two recently released papers from researchers at the Cyber Security Research Center in Ben Gurion University in Israel, show how data could potentially be compromised even when encased in a Faraday cage.
The extraction method, dubbed MAGNETO, works by infecting an “air-gapped” device—a computer that isn’t connected to the internet—with a specialized malware called ODINI that regulates that device’s magnetic fields. From there, the malware can overload the CPU with calculations, forcing its magnetic fields to increase. A local smartphone, (located a maximum of 12 to 15 centimeters from the computer) can then receive the covert signals emanating off the magnetic waves to decode encryption keys, credential tokens, passwords and other sensitive information.
Mordechai Guri, who heads research and development at the Cyber Security Research Center, said he and his fellow researchers wanted to show that Faraday cages are not foolproof.
“Faraday cages are known for years as good security for electromagnetic covert channels,” Guri told Motherboard in an email. “Here we want to show that they are not hermetic and can be bypassed by a motivated attacker.”
According to the research, even if phones are placed on airplane mode in secure locations, these extraction techniques could still work. Since the phone’s magnetic sensors are not considered communication interfaces, they would remain active even in airplane mode.
The foundations for the researcher’s breakthrough were built off of previous public examples of offline computer vulnerabilities. Last July, Wikileaks released documents allegedly demonstrating how the CIA used malware to infect air-gapped machines. The tool suite, called “Brutal Kangaroo,” allegedly allowed CIA attackers to infiltrate closed networks by using a compromised USB flash drive. The researchers at the Cyber Security Research Center highlighted “Brutal Kangaroo” in their paper as a real life example of the fallibility of air-gapped computers.
The papers point out that air-gapped computer networks are being used by banks to store confidential information and by the military and defense sectors as well. Guri said that institutions hoping to addresses these security issues may face some difficulty.
“In [the] case of the Magnetic covert channel, its fairly challenging, since the computer must be shielded with a special ferromagnetic shield.” Guri said. “The practical countermeasures is the ‘zoning’ approach, where you define a perimeter in which not [every] receiver/smartphone allowed in.”
The information contained in this website is for general information purposes only. The information is provided by Motherboard Vice and while we endeavour to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services, or related graphics contained on the website for any purpose. Any reliance you place on such information is therefore strictly at your own risk.
Through this website you are able to link to other websites which are not under the control of CSIRT-CY. We have no control over the nature, content and availability of those sites. The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.
Every effort is made to keep the website up and running smoothly. However, CSIRT-CY takes no responsibility for, and will not be liable for, the website being temporarily unavailable due to technical issues beyond our control.