In a development likely to concern those who believe that a system that's not connected to a network is safe from surveillance, researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receive data through inaudible audio signals
Michael Hanspach and Michael Goetz, two researchers from the Fraunhofer Institute for Communication, Information Processing and Ergonomics (FKIE) in Germany, tested the feasibility of creating a covert acoustical mesh network between multiple laptops that's used to exchange data using near ultrasonic frequencies. The two researchers presented their findings recently in a paper published in the Journal of Communications.
Their experiments showed that messages can be transmitted using audio signals in the low ultrasonic frequency range at around 20,000 Hz between two Lenovo T410 business laptops over a maximum distance of 19.7 meters and at a rate of 20 bit/s.
The Lenovo T410 laptops were placed in direct line of sight to each other and the volume levels were adjusted to make the transmission inaudible to observers. The transmission frequencies could be increased to over 20,000 Hz for increased stealthiness, but the transmission range would decrease, the researchers said.
The data was transmitted using two different acoustical modem software applications called Minimodem and Adaptive Communication System (ACS) modem, the latter delivering the best results. On the network layer, the researchers used an ad-hoc routing protocol called GUWMANET (Gossiping in Underwater Mobile Ad-hoc Networks) that was developed by FKIE for underwater communication.
The researchers built an acoustical mesh network of five laptops that relayed messages to each other using audio transmissions in order to show that an attacker can jump network air gaps to extract data from computers infected with malware that are isolated from the Internet and other untrusted networks.
Common sources of noise present in the environment, like human speech, are filtered out and do not affect the communication, Hanspach said Tuesday via email.
Every laptop needs to be in direct line of sight to at least another laptop that acts as a node in the network, but according to the researcher, this is a very common setup in labs and open-plan offices.
Human movement around the laptops can have an adverse effect on connectivity, but if a transmission fails, it can just be sent out again, the researcher said.
The biggest limitation is the low transmission rate -- 20 bit/s -- which cannot be used to transfer large amounts of information in a reasonable period of time. However, it's still enough to transmit small pieces of valuable information like log-in credentials and encryption keys stolen by malware running on the air-gapped computer and can also be used to relay commands back from the attacker.
The researchers created and tested what they call "a multi-hop acoustical keylogger" in their experimental setup. A keylogger running on an air-gapped computer was used to automatically send the captured keystrokes using audio signals to the covert mesh network and onto a node connected to the Internet. The node then used Sendmail to send an SMTP message with the sensitive information to a predefined e-mail address.
"This message could just contain the recorded keystrokes, but it is also conceivable to include the GUWMANET/GUWAL headers in order to tunnel the protocol over TCP/IP and to extend the covert acoustical mesh network to another covert network at any place in the world," the researchers said in the paper.
The malware that can implement the acoustical transmission and keylogging needs to be installed on the air-gapped computer using some other method, such as an infected USB stick or an insider with access.
The research shows that network air gaps might not be sufficient to protect data from being stolen by malware.
"It highly depends on the level of assurance you need to achieve," Hanspach said. "If you have high valued data, you should think about implementing countermeasures."
The researchers described a few methods to prevent audio transmissions in their paper. The most obvious one is to switch off the audio input and output devices on the air-gapped computers, but this might not be practical in cases where other important applications need access to those devices.
"For these cases it is possible to prevent inaudible communication of audio input and output devices by application of a software-dened lowpass lter," the researchers said. "An audio ltering guard can be used to control any audio-based information ow in a component-based operating system."
A more advanced approach would be to build a host-based audio intrusion detection system that can analyze audio input and output for modulated signals or hidden messages, the researchers said.
The software used for these experiments will not be publicly released, because the researchers don't own the code. However, some of the utilized software components are available as open source, Hanspach said.
It might be possible for other groups to replicate the setup because the techniques used are publicly available, he said.
This research comes after security researcher Dragos Ruiu said last month he believed some of his computers were infected with BIOS malware capable of jumping air gaps possibly by using ultrasonic audio transmissions. The existence of that malware, dubbed badBIOS, has yet to be proven and some people from the security community have doubts about Ruiu's claims.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.