xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs. Guri, M., Zadov, B., Daidakulov, A., & Elovici, Y. arXiv:1706.01140 [cs], June, 2017. arXiv: 1706.01140Paper abstract bibtex In this paper we show how attackers can covertly leak data (e.g., encryption keys, passwords and files) from highly secure or air-gapped networks via the row of status LEDs that exists in networking equipment such as LAN switches and routers. Although it is known that some network equipment emanates optical signals correlated with the information being processed by the device ('side-channel'), intentionally controlling the status LEDs to carry any type of data ('covert-channel') has never studied before. A malicious code is executed on the LAN switch or router, allowing full control of the status LEDs. Sensitive data can be encoded and modulated over the blinking of the LEDs. The generated signals can then be recorded by various types of remote cameras and optical sensors. We provide the technical background on the internal architecture of switches and routers (at both the hardware and software level) which enables this type of attack. We also present amplitude and frequency based modulation and encoding schemas, along with a simple transmission protocol. We implement a prototype of an exfiltration malware and discuss its design and implementation. We evaluate this method with a few routers and different types of LEDs. In addition, we tested various receivers including remote cameras, security cameras, smartphone cameras, and optical sensors, and also discuss different detection and prevention countermeasures. Our experiment shows that sensitive data can be covertly leaked via the status LEDs of switches and routers at a bit rates of 10 bit/sec to more than 1Kbit/sec per LED.
@article{guri_xled_2017,
title = {{xLED}: {Covert} {Data} {Exfiltration} from {Air}-{Gapped} {Networks} via {Router} {LEDs}},
shorttitle = {{xLED}},
url = {http://arxiv.org/abs/1706.01140},
abstract = {In this paper we show how attackers can covertly leak data (e.g., encryption keys, passwords and files) from highly secure or air-gapped networks via the row of status LEDs that exists in networking equipment such as LAN switches and routers. Although it is known that some network equipment emanates optical signals correlated with the information being processed by the device ('side-channel'), intentionally controlling the status LEDs to carry any type of data ('covert-channel') has never studied before. A malicious code is executed on the LAN switch or router, allowing full control of the status LEDs. Sensitive data can be encoded and modulated over the blinking of the LEDs. The generated signals can then be recorded by various types of remote cameras and optical sensors. We provide the technical background on the internal architecture of switches and routers (at both the hardware and software level) which enables this type of attack. We also present amplitude and frequency based modulation and encoding schemas, along with a simple transmission protocol. We implement a prototype of an exfiltration malware and discuss its design and implementation. We evaluate this method with a few routers and different types of LEDs. In addition, we tested various receivers including remote cameras, security cameras, smartphone cameras, and optical sensors, and also discuss different detection and prevention countermeasures. Our experiment shows that sensitive data can be covertly leaked via the status LEDs of switches and routers at a bit rates of 10 bit/sec to more than 1Kbit/sec per LED.},
urldate = {2020-06-28},
journal = {arXiv:1706.01140 [cs]},
author = {Guri, Mordechai and Zadov, Boris and Daidakulov, Andrey and Elovici, Yuval},
month = jun,
year = {2017},
note = {arXiv: 1706.01140},
keywords = {Computer Science - Cryptography and Security},
}
Downloads: 0
{"_id":"hN6Qzbfzd6B73D3th","bibbaseid":"guri-zadov-daidakulov-elovici-xledcovertdataexfiltrationfromairgappednetworksviarouterleds-2017","authorIDs":[],"author_short":["Guri, M.","Zadov, B.","Daidakulov, A.","Elovici, Y."],"bibdata":{"bibtype":"article","type":"article","title":"xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs","shorttitle":"xLED","url":"http://arxiv.org/abs/1706.01140","abstract":"In this paper we show how attackers can covertly leak data (e.g., encryption keys, passwords and files) from highly secure or air-gapped networks via the row of status LEDs that exists in networking equipment such as LAN switches and routers. Although it is known that some network equipment emanates optical signals correlated with the information being processed by the device ('side-channel'), intentionally controlling the status LEDs to carry any type of data ('covert-channel') has never studied before. A malicious code is executed on the LAN switch or router, allowing full control of the status LEDs. Sensitive data can be encoded and modulated over the blinking of the LEDs. The generated signals can then be recorded by various types of remote cameras and optical sensors. We provide the technical background on the internal architecture of switches and routers (at both the hardware and software level) which enables this type of attack. We also present amplitude and frequency based modulation and encoding schemas, along with a simple transmission protocol. We implement a prototype of an exfiltration malware and discuss its design and implementation. We evaluate this method with a few routers and different types of LEDs. In addition, we tested various receivers including remote cameras, security cameras, smartphone cameras, and optical sensors, and also discuss different detection and prevention countermeasures. Our experiment shows that sensitive data can be covertly leaked via the status LEDs of switches and routers at a bit rates of 10 bit/sec to more than 1Kbit/sec per LED.","urldate":"2020-06-28","journal":"arXiv:1706.01140 [cs]","author":[{"propositions":[],"lastnames":["Guri"],"firstnames":["Mordechai"],"suffixes":[]},{"propositions":[],"lastnames":["Zadov"],"firstnames":["Boris"],"suffixes":[]},{"propositions":[],"lastnames":["Daidakulov"],"firstnames":["Andrey"],"suffixes":[]},{"propositions":[],"lastnames":["Elovici"],"firstnames":["Yuval"],"suffixes":[]}],"month":"June","year":"2017","note":"arXiv: 1706.01140","keywords":"Computer Science - Cryptography and Security","bibtex":"@article{guri_xled_2017,\n\ttitle = {{xLED}: {Covert} {Data} {Exfiltration} from {Air}-{Gapped} {Networks} via {Router} {LEDs}},\n\tshorttitle = {{xLED}},\n\turl = {http://arxiv.org/abs/1706.01140},\n\tabstract = {In this paper we show how attackers can covertly leak data (e.g., encryption keys, passwords and files) from highly secure or air-gapped networks via the row of status LEDs that exists in networking equipment such as LAN switches and routers. Although it is known that some network equipment emanates optical signals correlated with the information being processed by the device ('side-channel'), intentionally controlling the status LEDs to carry any type of data ('covert-channel') has never studied before. A malicious code is executed on the LAN switch or router, allowing full control of the status LEDs. Sensitive data can be encoded and modulated over the blinking of the LEDs. The generated signals can then be recorded by various types of remote cameras and optical sensors. We provide the technical background on the internal architecture of switches and routers (at both the hardware and software level) which enables this type of attack. We also present amplitude and frequency based modulation and encoding schemas, along with a simple transmission protocol. We implement a prototype of an exfiltration malware and discuss its design and implementation. We evaluate this method with a few routers and different types of LEDs. In addition, we tested various receivers including remote cameras, security cameras, smartphone cameras, and optical sensors, and also discuss different detection and prevention countermeasures. Our experiment shows that sensitive data can be covertly leaked via the status LEDs of switches and routers at a bit rates of 10 bit/sec to more than 1Kbit/sec per LED.},\n\turldate = {2020-06-28},\n\tjournal = {arXiv:1706.01140 [cs]},\n\tauthor = {Guri, Mordechai and Zadov, Boris and Daidakulov, Andrey and Elovici, Yuval},\n\tmonth = jun,\n\tyear = {2017},\n\tnote = {arXiv: 1706.01140},\n\tkeywords = {Computer Science - Cryptography and Security},\n}\n\n","author_short":["Guri, M.","Zadov, B.","Daidakulov, A.","Elovici, Y."],"key":"guri_xled_2017","id":"guri_xled_2017","bibbaseid":"guri-zadov-daidakulov-elovici-xledcovertdataexfiltrationfromairgappednetworksviarouterleds-2017","role":"author","urls":{"Paper":"http://arxiv.org/abs/1706.01140"},"keyword":["Computer Science - Cryptography and Security"],"downloads":0},"bibtype":"article","biburl":"https://bibbase.org/zotero/tpmobley","creationDate":"2020-11-29T01:11:50.555Z","downloads":0,"keywords":["computer science - cryptography and security"],"search_terms":["xled","covert","data","exfiltration","air","gapped","networks","via","router","leds","guri","zadov","daidakulov","elovici"],"title":"xLED: Covert Data Exfiltration from Air-Gapped Networks via Router LEDs","year":2017,"dataSources":["6KYEtpSuENpSn3KKK"]}