Re: ARLA/CLUSTER: Vídeo demonstra como aceder a um vulgar telemóvel através da rede GSM

Carlos Pinheiro karlus.pinheiro gmail.com
Quinta-Feira, 30 de Julho de 2015 - 15:29:12 WEST


Caro João Costa,

Acho que o título não está muito correcto, pois lendo o artigo conclui-se
que a ideia é aceder aos dados de um PC através de um simples telemóvel e
não " aceder a um vulgar telemóvel através da rede GSM ".


73 de CT1PT
CP


2015-07-30 12:25 GMT+01:00 João Costa > CT1FBF <ct1fbf  gmail.com>:

> Researchers hack air-gapped computer with simple cell phone
>
> THE MOST SENSITIVE work environments, like nuclear power plants, demand
> the strictest security. Usually this is achieved by air-gapping computers
> from the Internet and preventing workers from inserting USB sticks into
> computers. When the work is classified or involves sensitive trade secrets,
> companies often also institute strict rules against bringing smartphones
> into the workspace, as these could easily be turned into unwitting
> listening devices.
>
> But researchers in Israel have devised a new method for stealing data that
> bypasses all of these protections—using the GSM network, electromagnetic
> waves and a basic low-end mobile phone. The researchers are calling the
> finding a “breakthrough†in extracting data from air-gapped systems and say
> it serves as a warning to defense companies and others that they need to
> immediately “change their security guidelines and prohibit employees and
> visitors from bringing devices capable of intercepting RF signals,†says
> Yuval Elovici, director of the Cyber Security Research Center at Ben-Gurion
> University of the Negev, where the research was done.
>
> The attack requires both the targeted computer and the mobile phone to
> have malware installed on them, but once this is done the attack exploits
> the natural capabilities of each device to exfiltrate data. Computers, for
> example, naturally emit electromagnetic radiation during their normal
> operation, and cell phones by their nature are “agile receivers†of such
> signals. These two factors combined create an “invitation for attackers
> seeking to exfiltrate data over a covert channel,†the researchers write in
> a paper about their findings.
>
> The research builds on a previous attack the academics devised last year
> using a smartphone to wirelessly extract data from air-gapped computers.
> But that attack involved radio signals generated by a computer’s video card
> that get picked up by the FM radio receiver in a smartphone.
>
> Read the full story at:
>
> http://www.wired.com/2015/07/researchers-hack-air-gapped-computer-simple-cell-phone/
>
> _______________________________________________
> CLUSTER mailing list
> CLUSTER  radio-amador.net
> http://radio-amador.net/cgi-bin/mailman/listinfo/cluster
>
>


-- 
Carlos Pinheiro
-------------- próxima parte ----------
Um anexo em HTML foi limpo...
URL: http://radio-amador.net/pipermail/cluster/attachments/20150730/94ad450d/attachment.html


Mais informações acerca da lista CLUSTER