Page 184 - Cyber Defense eMagazine January 2024
P. 184

The  Nordic  Semiconductor  nRF24L01+  can  be  used  to  promiscuously  sniff  radio  frequency  packets
            transmitted  between  the  wireless  peripheral  devices  and the  dongle  connected  to the computer.  This
            attack  does  not  require  any  specially  crafted  hardware.  Also,  this  can  be  used  to  reverse  engineer
            manufacturer proprietary protocols like Nike+ and study lower levels of ANT+ protocol.


            In this exploit the sniffing of the radio packets is achieved by reducing the MAC address to 2 bytes by
            disabling checksums,  setting the MAC address to the same as the preamble, and forcing the dongle to
            accept the noise as a valid MAC address (T. Goodspeed,  2011). The trick used here is to make a few
            illegal register  settings,  disable  the checksum,  and generate  background  noise  that is consumed  as a
            valid MAC address.

            Once the MAC address is spoofed, the next step is to break the packet encryption. Usually, the packet
            header is in cleartext and only the payload is XOR encrypted using the MAC address. Just by applying
            XOR to the right regions, it is possible to decrypt the USB HID events and derive the key positions. Thus,
            this technique can be successfully used to sniff keystrokes and mouse clicks promiscuously.

                   2.2 NATO Tempest


            TEMPEST  is  a  United  States  National  Security  Agency  specification  and  a  North  Atlantic  Treaty
            Organization (NATO) certification. This specification refers to spying on information systems by listening
            to electrical or radio signals,  vibrations,  sounds,  and other leaking emanations.  TEMPEST  does cover
            some methods that can be used to spy on wireless equipment like logging user keystrokes.  It classifies
            the emitted signals as sensitive because if these signals are sniffed and analyzed, they may disclose all
            the data that is transmitted and processed by the wireless device.  Along with covering details on how to
            spy on other information systems, it also defines ways to prevent/protect  devices from such spying. The
            protection  efforts are also known as emission security (EMSEC),  which is a subset of communications
            security (COMSEC).  Prevention of spying can be achieved by shielding, masking, monitoring,  filtering,
            and defining the distance an attacker can get without being able to sniff the leaked signals. The standards
            defined go from level A to C, with level A being the strictest for critical devices that operate in NATO zone
            0.

                   2.3 SATAn: Air-Gap Exfiltration Attack

            Air-gapped  systems  usually  do  not  have  any  public  internet  connection  and  are  used  in  critical
            environments  like  industrial  OT  networks,  government,  military,  nuclear  plants,  and  other  industrial
            networks.  They are  isolated  from  other  less  secure  networks  that have  access  to  the internet.  It was
            discovered that it is possible to exfiltrate data from air-gapped systems through Serial ATA (SATA) cables
            that are in the form of wireless antennae inside the computers.

            To perform this attack, the hacker must first gain physical  access to the air-gapped  system and install
            the malware software. The software then prepares the sensitive data to be exfiltrated through modulation
            and  encoding.  The  SATA  cables  can  deliver  over  a radio  channel  between  5.9995  and  5.9996  GHz
            electromagnetic  signals  that  correspond  to  specific  characters  (Mordechai  Guri,  2022).  Thus,  this
            malware can be used to hijack legitimate processes on air-gapped systems and emit radio signals during
            specific read-and-write operations.  In real real-world scenario, the receiver will be embedded in a piece
            of hardware  equipment  placed close  to the air-gapped  system or realized  as a process  in a computer





            Cyber Defense eMagazine – January 2024 Edition                                                                                                                                                                                                          184
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   179   180   181   182   183   184   185   186   187   188   189