We first need to define what an air-gapped computer is. This is a computer with no external network connection: no ethernet cable (going to an outside connection, could have an internal network that has no outside connections), no modem, no WiFi, odds are that the mouse and keyboard are hard-wired rather than Bluetooth. And it's probably kept in a room that is hardened against radio signal penetration and with no windows.
Secure, right?
Ask the Iranians if their centrifuge facility was secure against IT intrusion.
A nation state actor, most likely Russia, figured out an attack against air-gapped PCs. The vector? USB drives. This is why if you want to really secure your network, you take a tube of epoxy to USB and other ports. The attack was first observed launched against a South Asian embassy in Belarus in 2019. It was since been used against an EU agency in 2022. The toolset is known as GoldenJackel.
The basics are quite simple. Infect a computer of someone whom you know works with the secure system that you want in to. Infect every USB device that they plug in, trusting that eventually said USB flash drive will be plugged into the secure system to transfer information to/from. The air-gapped system now gets infected. Information gets mapped out, written to a USB drive, exfiltrated via a non-secure computer, analyzed by the controllers, and they can plot what to exfiltrate next.
It's an interesting write-up, though it can get a little deep in the weeds. It once again proves that computer security is very hard, and trying to keep ultra-secure environments secure is probably even harder. I'm not sure how you'd improve the security in this scenario, you're going to have to move information in and out of the secure air-gapped system for it to be useful, it's a thorny issue.
There's a joke that the only secure computer has no network connection, no power, and is encased in a block of concrete. Very hard to hack that one!
https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-air-gapped-devices/
Secure, right?
Ask the Iranians if their centrifuge facility was secure against IT intrusion.
A nation state actor, most likely Russia, figured out an attack against air-gapped PCs. The vector? USB drives. This is why if you want to really secure your network, you take a tube of epoxy to USB and other ports. The attack was first observed launched against a South Asian embassy in Belarus in 2019. It was since been used against an EU agency in 2022. The toolset is known as GoldenJackel.
The basics are quite simple. Infect a computer of someone whom you know works with the secure system that you want in to. Infect every USB device that they plug in, trusting that eventually said USB flash drive will be plugged into the secure system to transfer information to/from. The air-gapped system now gets infected. Information gets mapped out, written to a USB drive, exfiltrated via a non-secure computer, analyzed by the controllers, and they can plot what to exfiltrate next.
It's an interesting write-up, though it can get a little deep in the weeds. It once again proves that computer security is very hard, and trying to keep ultra-secure environments secure is probably even harder. I'm not sure how you'd improve the security in this scenario, you're going to have to move information in and out of the secure air-gapped system for it to be useful, it's a thorny issue.
There's a joke that the only secure computer has no network connection, no power, and is encased in a block of concrete. Very hard to hack that one!
https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-air-gapped-devices/
no subject
Date: 2024-11-13 11:21 pm (UTC)no subject
Date: 2024-11-13 11:46 pm (UTC)'Tis true, dat!
no subject
Date: 2024-11-13 11:32 pm (UTC)no subject
Date: 2024-11-14 12:59 am (UTC)Leave it to the Russians to get infectious. :o
Hugs, Jon
no subject
Date: 2024-11-14 06:27 am (UTC)We did a very similar thing, destroying the Iranian centrifuges with Stuxnet. It went in on an infected USB drive, but it wasn't an in-and-out in communications with a control server system. In many ways, this is much much more sophisticated.
no subject
Date: 2024-11-14 03:43 am (UTC)no subject
Date: 2024-11-14 06:27 am (UTC)Indeed it does!
no subject
Date: 2024-11-14 05:23 pm (UTC)You also make it a "clean" building. To walk to any "serious" work space, you will strip and put EVERYTHING in your work locker, and dress in work issued clothing and equipment before entering the work space. Need to know the time? You get a work-issued dumb watch.
Any piece of equipment to be used in work spaces comes in factory sealed and is tested against specs before deploying.
A friend's husband works in a facility like this in the US. You aren't allowed to bring any kind of smart device beyond a certain point, and you are issued a phone that only makes phone calls -- no camera, no texting -- for use on site.
We are fortunate this wasn't done by the Iranians.
no subject
Date: 2024-11-14 06:35 am (UTC)