TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Air-Gap Attack Turns Memory Modules into Wi-Fi Radios

174 pointsby fridekover 3 years ago

17 comments

closeparenover 3 years ago
It has been the case for a long time that a proper &quot;airgap&quot; is not made out of just air but also electromagnetic and acoustic isolation.<p><a href="https:&#x2F;&#x2F;www.dni.gov&#x2F;files&#x2F;NCSC&#x2F;documents&#x2F;Regulations&#x2F;Technical-Specifications-SCIF-Construction.pdf" rel="nofollow">https:&#x2F;&#x2F;www.dni.gov&#x2F;files&#x2F;NCSC&#x2F;documents&#x2F;Regulations&#x2F;Technic...</a>
评论 #28395914 未加载
评论 #28396210 未加载
marcan_42over 3 years ago
Not this one again...<p>It&#x27;s not Wi-Fi. The article title is misleading clickbait. They are just using a simple script to exercise the RAM in a way that produces more or less radio noise, and then using a debug feature in an off the shelf Wi-Fi chipset to measure the channel noise and transfer data that way (at an extremely low rate of a few bits per second). At no point are Wi-Fi signals involved. Both sides need to collude to make this work. It only takes a few hours to put together this kind of demo.<p>He did the same thing with GSM a few years ago - the exact same concept with 800MHz RAM - but he&#x27;s so bad at it that even though he was using an open source fully documented GSM stack as a base for his receiver (osmocombb), he couldn&#x27;t get more than a few bits per second out of it, even though you could obviously get a <i>lot</i> more data through with access to the DSP hardware at the receiver like he did.<p>This guy basically runs a paper mill where every few months he comes up with a new side channel, builds the minimum viable PoC, and produces no research of value. He makes no attempt to measure theoretical maximum channel bandwidths, he doesn&#x27;t optimize the data coding, nothing. He just picks a new random idea, like using screen brightness or network activity LEDs to encode information, and cranks out a paper. And he&#x27;s <i>really</i> good at clickbaiting his way through news cycles, which I&#x27;m sure keeps the funding going.<p>You can implement a PoC at the same level of some of his papers in a one line shell script that blinks the camera LED on a machine to transfer a file bit by bit:<p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;marcan42&#x2F;status&#x2F;1339156243517095936?s=19" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;marcan42&#x2F;status&#x2F;1339156243517095936?s=19</a>
robocatover 3 years ago
&gt; The memory buses generate electromagnetic radiation at a frequency correlated to its clock frequency and harmonics. For example, DDR4-2400 emits electromagnetic radiation at around 2400 MHz,” researchers wrote.<p>The IO clock runs at 1.2GHz, and the data lines run at double that.<p>As an overview of the issues designing for DDR4, I liked this technical note: <a href="https:&#x2F;&#x2F;media-www.micron.com&#x2F;-&#x2F;media&#x2F;client&#x2F;global&#x2F;documents&#x2F;products&#x2F;technical-note&#x2F;dram&#x2F;tn4040_ddr4_point_to_point_design_guide.pdf" rel="nofollow">https:&#x2F;&#x2F;media-www.micron.com&#x2F;-&#x2F;media&#x2F;client&#x2F;global&#x2F;documents...</a><p>“Prior to designing the card, it is useful to decide how much of the timing budget to allocate to routing mismatch. This can be determined by thinking in terms of time or as a percentage of the clock period. For example, 1% (±0.5%) at 800 MHz clock is 6.25ps (1250ps&#x2F;200). Typical flight times for FR4 PCB are near 6.5 ps&#x2F;mm. So matching to ±1mm (±0.040 inch) allocates 1% of the clock period to route matching.”
fouricover 3 years ago
A few months ago I read a comment lamenting about all of these &quot;novel&quot; airgap &quot;attacks&quot; that are just all variants on the same theme of &quot;figure out a new side-channel to send data between two complicit devices over&quot;. You can use memory module busses, power&#x2F;camera&#x2F;keyboard LEDs, fan speeds, ultrasound emitted from speakers...it&#x27;s not very interesting, at this point.<p>I bet that I can come up with a new one off the top of my head...alright, how about malware that imperceptibly dims&#x2F;brightens the screen, which could be interpreted as a 1-bit symbol and picked up even when the screen is facing away from the receiver (by observing the reflection off of a nearby surface)?<p>See also <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=28394826" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=28394826</a>. These aren&#x27;t &quot;attacks&quot; - these are methods of data exfiltration between two compromised devices. There <i>are</i> attacks that e.g. steal private RSA keys by capturing the EM radiation during cryptographic operations, but this is not that.
评论 #28397561 未加载
评论 #28397688 未加载
评论 #28397716 未加载
评论 #28397108 未加载
cesisover 3 years ago
These types of attack are known as Van Eck phreaking<p><a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Van_Eck_phreaking" rel="nofollow">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Van_Eck_phreaking</a>
评论 #28395615 未加载
JoshTriplettover 3 years ago
This appears to be the same work published in the USENIX Security Symposium in 2015 as &quot;GSMem&quot;: <a href="https:&#x2F;&#x2F;www.usenix.org&#x2F;system&#x2F;files&#x2F;conference&#x2F;usenixsecurity15&#x2F;sec15-paper-guri.pdf" rel="nofollow">https:&#x2F;&#x2F;www.usenix.org&#x2F;system&#x2F;files&#x2F;conference&#x2F;usenixsecurit...</a><p>It was impressive then, and it&#x27;s still impressive.
nonameiguessover 3 years ago
That has to be one of the more amazing attacks I&#x27;ve ever seen, but of course it only works in a really weak environment where someone is trying to use a single disconnected machine otherwise close to other machines with normal capabilities.<p>I&#x27;m actually curious if something like this is behind the logic of why a minimum 6-foot gap is required between classified and unclassified workstations in the same building. But actual SCIFs don&#x27;t allow radio waves through the walls and don&#x27;t allow any sort of radio-enabled devices that may be able to read this signal and send it back home inside. You <i>definitely</i> can&#x27;t bring IOT devices anywhere remotely close to a high-security environment.
datametaover 3 years ago
DDR5 enterprise modules will be able to hit the 5GHz of the IEEE standard for a &gt;2x data transfer boost over the ~100bps
titzerover 3 years ago
Funny anecdote. Back in 1999 or so, I noticed by happenstance that when I had the cover of my PC off during a HDD defrag (yeah, that was a Windows thing back then), that I could easily pick up the noise from the bus at exactly 100Mhz on a radio I had in the room. At first I suspected I was bugged, because the HDD made noise in the same rhythmic pattern as that data being transferred across the bus, which was creating the EM noise. Can you imagine tuning your radio and coming across the ambient sounds in your room? Kinda terrifying.
评论 #28399521 未加载
coupdejarnacover 3 years ago
I love this stuff. I wonder if anyone has tried modulating the system fan to send Morse code vibrations or something similar.
评论 #28395632 未加载
评论 #28395257 未加载
javajoshover 3 years ago
I&#x27;d like to see an attack that communicates in the infrared by loading and unloading the CPU (or any other heat generating component) and then the attacker reads with line-of-site thermal imaging. You&#x27;ll get like 6bpm, but hey, it&#x27;s somethin&#x27;.
评论 #28398224 未加载
rkagererover 3 years ago
This is impressive, though would be even more so if they could figure out how to do the reverse and arbitrarily plant bits <i>in</i> the memory of an air-gapped, uncompromised machine.
评论 #28399578 未加载
titzerover 3 years ago
AFAICT the covert channel created is write-only, so maybe the appropriate title is &quot;AirGap Attack Turns Memory Modules into Wi-Fi <i>Transmitters</i>&quot;?
gazeover 3 years ago
Awful article, lol. They&#x27;re not making a WiFi basestation or something. They&#x27;re literally just making some broadcast in the 2.4 GHz ISM band.
评论 #28398571 未加载
sodality2over 3 years ago
I remember reading a massive list of airgap malware like this... really interesting to read the ideas they come up with to escape airgaps
bart__over 3 years ago
Wow that really is ingenious! Wonder what other ways, maybe with high pitched audio, are possible.
ngcc_hkover 3 years ago
How about Apple m1 integrated memory ?