Air-Gapped Networks Vulnerable to Acoustic Attack via LCD Screens

Air-Gapped Networks Vulnerable to Acoustic Attack via LCD Screens

September 10, 2024 at 04:52PM

A new method called “Pixhell” can breach air gaps by using sound waves to transmit data via LCD screens. This covert channel attack works by manipulating screen pixels to create sound waves that encode stolen data. High-level security organizations are at risk, though some have built elaborate air gaps to mitigate such attacks.

From the meeting notes, it is clear that there is a growing concern around covert channel attacks, specifically the “Pixhell” attack method, which aims to breach air-gapped networks using sound waves generated by computer screens. The potential impact of such attacks on highly sensitive organizations, such as military, government, and industrial sites, is a cause for significant concern.

The Pixhell attack requires the infection or control of devices on both sides of the air gap, with the latter half potentially being achieved through Internet-based attacks. Once control is achieved, the attacker can use the sound waves produced by the screen’s capacitor and inductor to transmit encoded data to a receiving computer on the other side of the air gap.

In addition to acoustic channel attacks, the notes also mention the potential for covert channel attacks using Ethernet wiring, LED modems, power consumption differentials, and temperature differentials.

The most secure air gaps are observed in extremely sensitive operational technology (OT) sites, where separate server rooms for OT and IT equipment are connected by a unidirectional fiber-optic gateway, minimizing the risk of covert channel attacks.

Ultimately, the decision to implement such advanced defenses against covert channel attacks will depend on the organization’s risk profile and tolerance. While the countermeasures discussed may be less practical for real-life deployment, it is important for highly sensitive organizations to be aware of the potential threat posed by covert channel attacks and to consider appropriate mitigation strategies.

If you need any additional information or specific action items drawn from the meeting notes, please feel free to ask.

Full Article