Page 187 - Cyber Defense eMagazine January 2024
P. 187

devices  are found vulnerable,  they must  be discarded  as their firmware  cannot  be updated  once they
            leave  the  factory.  Devices  with  flash  memory  can  be  fixed  if  updated  firmware  is  available  from  the
            manufacturers. It is recommended to upgrade to the latest firmware before continuing to use the affected
            wireless devices.




               4.  Conclusion

            The  various  exploits  like  Mousejack,  KeyJack,  and  electromagnetic  side-channel  attacks  prove  that
            wireless products even from trusted manufacturers  may be vulnerable to serious security exploits. Also,
            this  shows  how  creative  hackers  can  get  to  compromise  computer  networks.  Before  the  pandemic,
            organizations  had to only worry about physical security in company onsite locations. But now the threat
            landscape  is  changing  as  the  workforce  moves  from  traditional  onsite  spaces  to  home  offices.
            Organizations must perform due diligence to make sure the peripheral devices that they have issued are
            not vulnerable  to these  exploits.  The IT department  must  frequently  check  the list of affected  devices
            published  by  researchers  and  take  appropriate  measures.  If  updated  firmware  is  available  from  the
            manufacturers, it must be pushed to all the devices. All vulnerable devices with no firmware updates must
            be  discarded.  Organizations  must  maintain  a thorough  inventory  of all  devices  used  to keep  track  of
            vulnerable and end-of-life systems. It is important to create awareness among users about these exploits
            so that they can take simple measures like locking their laptops before stepping away from their desks
            or  removing  the  USB  dongle  when  not  in  use.  This  also  helps  them  identify  irregular  unexpected
            behaviors in their workstations.




            Reference:

            Bastille Research Team (2017). Rogue Cell Towers. Bastille Wireless Threat Intelligence. Retrieved from
            https://www.bastille.net/vulnerabilities/rogue-cell-towers


            Marc Newlin (2016). MouseJack Technical Details. Bastille Wireless Threat Intelligence. Retrieved from
            https://www.bastille.net/research/vulnerabilities/mousejack/technical-details

            Marc  Newlin  (2016a).  Keysniffer.  GitHub  -  Bastille  Wireless  Threat  Intelligence.  Retrieved  from
            https://github.com/BastilleResearch/keysniffer

            Marc  Newlin  (2016b).  Keyjack.  GitHub  -  Bastille  Wireless  Threat  Intelligence.  Retrieved  from
            https://github.com/BastilleResearch/keyjack

            Marc      Newlin      (2016c).     BastilleResearch/mousejack.       Github.     Retrieved      from
            https://github.com/BastilleResearch/mousejack

            Marc    Newlin    (2016d).    BastilleResearch/nrf-research-firmware.    Github.   Retrieved    from
            https://github.com/BastilleResearch/nrf-research-firmware

            Mordechai  Guri  (2022).  SATAn:  Air-Gap  Exfiltration  Attack  via  Radio  Signals  From  SATA  Cables.
            Retrieved from https://browse.arxiv.org/pdf/2207.07413.pdf




            Cyber Defense eMagazine – January 2024 Edition                                                                                                                                                                                                          187
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   182   183   184   185   186   187   188   189   190   191   192