eHam

eHam Forums => Misc => Topic started by: AC7CW on September 05, 2016, 10:38:08 AM



Title: Malware turns usb drive into a transmitter
Post by: AC7CW on September 05, 2016, 10:38:08 AM
This is, like most hacks, technically interesting. The malware generates the fundamental frequency by toggling a bit and modulates by shifting said bit. I wonder if ham digital equipment is that simple? It could be if one was making a digital-only rig If voice goes digital they all might be digital-only at some point.

https://thehackernews.com/2016/09/usbee-airgap-computer.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29&_m=3n.009a.1315.eh0ao09rcy.rnr


Title: RE: Malware turns usb drive into a transmitter
Post by: WA2ISE on September 05, 2016, 11:56:17 AM
For this to mean anything, there has to be a receiver.  Maybe the 'net connected computer near the air gapped computer.  Would the 'net machine's USB act as that receiver?


Title: RE: Malware turns usb drive into a transmitter
Post by: KD1I on September 08, 2016, 11:05:13 AM
This is all very nice but here is the catch for this to work.   "The protected computer must be infected with the malware, most probably, with the help of an insider. "      In short, it takes an insider to install the malware and then the 'receiver' must be within a few meters of the infected computer.    I suppose this could be a problem for corporations or universities or even government facilities but not likely a private home. My secret stash of Kate Upton photos is safe.  ::)  73, Jim