Hacker News new | past | comments | ask | show | jobs | submit login

Note that using ultrasound as a communication mechanism, which is what's being described here, is very different from using it as an infection vector.



In other words, the "target" computer has to be actively listening?


Yes. To call this result "unsurprising" would dignify it unduly.


Well, "can get useful info through unheard sound on typical hardware at a range of 65 ft" is interesting. Not shocking, and horrifically oversold, but interesting.


Imagine a world in which Google Glass other speech activated devices are the norm. A virus like this could potentially spread from person to person as they passed each other in the street, without anyone knowing, if it exploited a bug in the speech recognition tech. It's not interesting if it relies on the other computer already being infected, but exploits in image/sound parsing are not uncommon and could be combined with this. Another cool hack would be a physical real-world shape/pattern which exploited the image recognition software in something like glass to take over the device.

It's an interesting idea I think, which will have more applications in the future than it does now as more computers start to be always on, listening and watching, but mostly because audio or video is not an infection vector we take seriously yet in the same way that we do network infection.


> if it exploited a bug in the speech recognition tech.

That would be one hell of an exploit.


That's how it seems to me. But a well-hidden bit of malware won't have a problem turning on the mic for a few seconds on the hour every hour to listen for a handshake chirp or the like. It's a limitation, but far from an insurmountable one.


yea but then the malware has to already be present on both machines, eh?...


It's still a pretty neat trick, if you want malware designed to penetrate an airgapped network to phone home.


The real killer app here would be to get info out of an airgapped terminal.


Not only that, but the listening application must have some kind of exploitable vulnerability.


For the purposes of this article, it is assumed the air-gapped computer is already running the malware, having been infected by some other means (ex. thumbdrive). The ultrasound communications provide a continuous (albeit slow) link between two infected computers.

It would be quite impressive, though, if a vulnerability in an audio driver allowed an uninfected computer to be infected simply by "hearing" the exploit sound!


That would present infection vector^^. Study was purely about two computers with very special software trying to covertly communicate using ultrasound.


So, they basically invented an acoustic coupler?


Yes,

It's not as significant as one might imagine.

But it does have the significance that you still have to worry whether your air-gapped machine is infected since it could secretly leak info even unplugged.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: