Jumping Airgaps with a Laser and a Scanner
Researchers have configured two computers to talk to each other using a laser and a scanner.
Scanners work by detecting reflected light on their glass pane. The light creates a charge that the scanner translates into binary, which gets converted into an image. But scanners are sensitive to any changes of light in a room—even when paper is on the glass pane or when the light source is infrared—which changes the charges that get converted to binary. This means signals can be sent through the scanner by flashing light at its glass pane using either a visible light source or an infrared laser that is invisible to human eyes.
There are a couple of caveats to the attack—the malware to decode the signals has to already be installed on a system on the network, and the lid on the scanner has to be at least partially open to receive the light. It’s not unusual for workers to leave scanner lids open after using them, however, and an attacker could also pay a cleaning crew or other worker to leave the lid open at night.
The setup is that there’s malware on the computer connected to the scanner, and that computer isn’t on the Internet. This technique allows an attacker to communicate with that computer. For extra coolness, the laser can be mounted on a drone.
Who? • April 28, 2017 1:17 PM
I would say this attack is too complicated.
In case you are able to infect the airgapped network with malware —a requisite for this attack become successful— then you only need to pay a cleaning crew or other worker to plug a small USB device on a computer of the airgapped network. Malware can exfiltrate information using that USB drive. That USB key can even be the vector to infect the computer!
Do you think plugging a USB drive can be noticed? Then do not look at a laser targeting a scanner!
A much easier attack would be pointing a laser to one of the multiple webcams attached to computers these days and receive the replies from the webcam activity LED. This attack is even easier on Apple computers as the webcam LED is software controlled.
I think this one is another drone-targeting-airgapped-network uninspired research.