Professional Documents
Culture Documents
Security Cameras Are Vulnerable To Attacks Using Infrared Light - Study
Security Cameras Are Vulnerable To Attacks Using Infrared Light - Study
cameras are vulnerable to attacks using infrared light: study
This website uses cookies to ensure you get the best experience on our website. More info
phys.org
search
Security cameras are vulnerable to attacks using infrared light:
study
September 19, 2017
Driverless hovertaxi makes first
'concept' flight in Dubai Sep 25, 2017
17
Russia, US shoot for the moon with
joint lunar station project (Update)
19 hours ago 8
Large meteorite impacts drove plate
tectonic processes on the early Earth
Sep 26, 2017 13
BenGurion University of the Negev (BGU) researchers have demonstrated LIGO and Virgo observatories detect
that security cameras infected with malware can receive covert signals and gravitational wave signals from black
leak sensitive information from the very same surveillance devices used to hole collision 16 hours ago 22
protect facilities.
IceCube helps demystify strange radio
The method, according to researchers, will work on both professional and bursts from deep space Sep 25, 2017
home security cameras, and even LED doorbells, which can detect infrared 6
light (IR), not visible to the human eye.
more »
In the new paper, the technique the researchers have dubbed "aIRJumper"
also enables the creation of bidirectional, covert, optical communication
between airgapped internal networks, which are computers isolated and Phys.org
disconnected from the internet that do not allow for remote access to the
organization. Seguir
The cyber team led by Dr. Mordechai Guri, head of research and
development for BGU's Cyber Security Research Center (CSRC), shows how
IR can be used to create a covert communication channel between malware
installed on an internal computer network and an attacker located hundreds Phys.org on facebook
of yards outside or even miles away with direct line of sight. The attacker can
use this channel to send commands and receive response messages. 1,3 millones personas siguen a Phys.org. Sé el
Seguir primero de tus amigos.
To transmit sensitive information, the attacker uses the camera's IRemitting
LEDs, which are typically used for night vision. The researchers showed how
malware can control the intensity of the IR to communicate with a remote Relevant PhysicsForums posts
attacker that can receive signals with a simple camera without detection.
Then the attacker can record and decode these signals to leak sensitive
Brainstorm: Is absolute zero relative 33 minutes
information. ago
The researchers shot two videos to highlight their technique. The first video Effect of Player Size in Distance Hitting Baseball
1 hour ago
shows an attacker hundreds of yards away sending infrared signals to a
camera. The second video shows the camera infected with malware Breakdown of Gauss's Law? 2 hours ago
responding to covert signals by exfiltration data, including passwords.
How exactly is energy transferred in grad(B)
drifts? 3 hours ago
hidden communication via security cameras
design diameter of transmission shaft 3 hours
ago
https://phys.org/news/201709camerasvulnerableinfrared.html 1/4
28/9/2017 Security cameras are vulnerable to attacks using infrared light: study
Force Needed to Push Manual Treadmill 4
hours ago
More from General Physics
According to Dr. Guri, "Security cameras are unique in that they have 'one
leg' inside the organization, connected to the internal networks for security
purposes, and 'the other leg' outside the organization, aimed specifically at a
nearby public space, providing very convenient optical access from various
directions and angles."
Attackers can also use this novel covert channel to communicate with
malware inside the organization. An attacker can infiltrate data, transmitting
hidden signals via the camera's IR LEDs. Binary data such as command and
control (C&C) messages can be hidden in the video stream, recorded by the
surveillance cameras, and intercepted and decoded by the malware residing
in the network.
"Theoretically, you can send an infrared command to tell a highsecurity
system to simply unlock the gate or front door to your house," Guri says.
Explore further: Cyber researchers discover how any network router
can covertly leak data
More information: aIRJumper: Covert AirGap Exfiltration/Infiltration via
Security Cameras & Infrared (IR), arXiv:1709.05742 [cs.CR]
arxiv.org/abs/1709.05742
Provided by: American Associates, BenGurion 1409 shares
University of the Negev
feedback to editors
Related Stories Recommended for you
Cyber researchers discover how any Amazon turns up the volume on rivals
network router can covertly leak data with Echo price cut (Update) September 27,
June 5, 2017 2017
Researchers at the BenGurion University of the Negev Amazon will head into the holiday shopping season with a
(BGU) Cyber Security Research Center (CSRC) have simple wish list: It wants voicecontrolled devices featuring its
demonstrated for the first time that it is possible to covertly digital assistant Alexa to become as ubiquitous in people's
siphon sensitive files, passwords or other critical data ... homes as televisions.
Cameras can steal data from computer hard drive Researchers design soft, flexible origamiinspired
LED lights: study February 22, 2017 robot September 27, 2017
Researchers at the BenGurion University of the Negev (BGU) Cyber A Case Western Reserve University researcher has turned the origami she
Security Research Center have demonstrated that data can be stolen from enjoyed as a child into a patentpending soft robot that may one day be used
on an assembly line, in surgery or even outer space.
https://phys.org/news/201709camerasvulnerableinfrared.html 2/4
28/9/2017 Security cameras are vulnerable to attacks using infrared light: study
an isolated "airgapped" computer's hard drive reading the
pulses of light on the LED ...
5 comments
2.5 Adjust slider to filter visible comments by rank
Display comments: newest first
Yawn.
I think the first article I read on this subject was that compromised computers could use
floppy disc access lights to bridge an air gap. That was a long time ago.
There have been many similar articles since then and I'm waiting for one that reports that
data can be transmitted via infrared by controlling the cpu load of a compromised
computer. Or whatever.
First you would need to compromise the airgapped computer if it isn't already
compromised, it won't make any difference how you blink your floppy lights or IR sources.
Small matter of compromising a camera with code. I guess disassembly on a ladder? Or
internal access. My question is how two separate networks then use light to get info with
the cam net from the data network.
From the article it looks like you need two separate chunks of malware installed, one on
the camera and the other on some device within the network. Then the two pieces of
malware would need to find each other in order to communicate. Truthfully, if you can do
those three things on an airgapped network then you could probably do some **far**
more interesting things on that network.
The question is not how; the question is the threat surface. This is simple to interdict, but
requires that the feed from the camera be scanned by a stateful firewall. If you're looking,
and you're not firewalled, you're vulnerable.
When is a vandalised security camera a 'hack attack' ??
Please sign in to add a comment. Registration is free, and takes less than a minute. Read more
password
Sign in
Click here to reset your password.
Sign in to get notified via email when new comments are made.
Trending News Powered by Ideal Media
Will Hydrogen Break the Battery Scientific 'Facts' That Aren't True
Market? Revealed In New Book
Hydrogen energy storage is making waves in the clean In medical school, they tell you half of what you are about to
energy sector, and ... learn won’t ...
https://phys.org/news/201709camerasvulnerableinfrared.html 3/4
28/9/2017 Security cameras are vulnerable to attacks using infrared light: study
Electric Vehicles: The High Cost of Scientists Find Underwater City Built by
Going Green Octopuses
It has become raison d’être that electric vehicles will keep Marine biologists have discovered a veritable underwater
increasing in ... ‘settlement’ ...
Mysterious Creature Washes Up on The Incredible Impact of White TShirt
Texas Beach on the Environment
The decaying carcass of a mysterious sea creature found In the animated TED Ed lesson, “The Life Cycle of a TShirt ,
on a Texas beach ... educator and ...
46 Cosplay Ladies Who Will Make You Tesla Model X Beats Lamborghini at
Up Your Game Drag Race
Best shots ever A Tesla Model X beat a Lamborghini Aventador SV in a
quartermile drag race ...
https://phys.org/news/201709camerasvulnerableinfrared.html 4/4