No video

Stealing Files From Your Power Supply?!

  Рет қаралды 139,441

Seytonic

Seytonic

Күн бұрын

Try out OctoPart 👉 octopart.com/
Altium 👉 www.altium.com...
0:00 Intro
0:14 Stealing Files From Your Power Supply?!
3:08 North Korean Hackers Target Internet Explorer
6:12 Apple Kills Image Scanning Plans
8:30 Octopart
9:06 Outro
Sources:
thehackernews....
arxiv.org/pdf/...
• COVID-bit: Keep a Dist...
therecord.medi...
www.bleepingco...
blog.google/th...
thehackernews....
go.theregister...
arstechnica.co...
www.wired.com/...
go.theregister...
===============================================
My Website: www.seytonic.com/
Follow me on TWTR: / seytonic
Follow me on INSTA: / jhonti
===============================================

Пікірлер: 287
@goodrun88
@goodrun88 Жыл бұрын
imagine waiting 2 hours for a megabyte of data, but then it gets corrupted because your victim was mining
@syazwantheboogies8616
@syazwantheboogies8616 Жыл бұрын
My throat explode laughing at this! HAHAHAHAHAHAHAHHAHAHAHABABABAHAHAHAHAHABAVAGA
@Jake48898
@Jake48898 Жыл бұрын
Imagine mining still
@doctaterror
@doctaterror Жыл бұрын
Pro tip: for your cyber security, always be mining (and send the coin to me)
@kulled
@kulled Жыл бұрын
@@Jake48898 imagine pooopy poopy poopy
@trixer230
@trixer230 Жыл бұрын
As someone who lived during dial up, it was extremely frustrating to download anything and it get corrupted which happened a lot as well (maybe 1 in 4 "large 1mb+" downloads would be corrupted.
@jg374
@jg374 Жыл бұрын
The power supply exploit reminds me of a situation where I had a radio sitting near my laptop tuned into a distant station. The interference my laptop was producing audibly changed whenever the gpu was working hard.
@strawberriesandcum
@strawberriesandcum Жыл бұрын
GPU Fan exploit incoming
@kreuner11
@kreuner11 Жыл бұрын
Spin the fans up or down and transfer data via variations in sound
@jg374
@jg374 Жыл бұрын
I think this was related to one of the voltage regulators or clocks as this laptop has a shared fan for the gpu and cpu.
@MacGuffin1
@MacGuffin1 Жыл бұрын
Yeah that's just a shit/overloaded PSU
@MacGuffin1
@MacGuffin1 Жыл бұрын
@@kreuner11 Nope, no where near enough current to escape the shielding of the case, this PSU thing is a bit BS TBH, all PSU's are very different, huge amounts of current would be required to modulate, even then you would need a very nearby coil and receiver/malware would need to be calibrated AND it would be super obvious... AND with such a low bit-rate you might get a pswd, but what use would that be on an already pwned air-gapped PC. Air-gapped PC's are usually in big locked and shielded rooms that have access control... Yeah sorry but I gotta say this idea would never have any serious application... sorry but this one is clickbait IMO
@20Rewind
@20Rewind Жыл бұрын
How in the Hershey’s chocolate bars did someone find a way to hack someone using a power supply
@AshesHub
@AshesHub Жыл бұрын
Lol
@astral6749
@astral6749 Жыл бұрын
I think it comes down to three main things: 1. Know how electromagnets work 2. Know how a power supply works 3. Know how a CPU works If you know these three, the only thing left is a bit of creative thinking to make such an ingenious exploit.
@MacGuffin1
@MacGuffin1 Жыл бұрын
They didn't
@dro3m
@dro3m Жыл бұрын
@@MacGuffin1 troll
@laurensweyn
@laurensweyn Жыл бұрын
No one is being "hacked using a power supply", the PSU is used to transmit data by malware already on the computer. So you'd need to already have been hacked. More accurate to say "PSU has been used as a theoretical data transmitter for use by malware to steal data", much like you could use speakers, a monitor, the little hard drive activity LED, the caps lock light on a keyboard, and so on. None of these are alarmingly practical.
@CaptainKremmen
@CaptainKremmen Жыл бұрын
The power supply exploit could be so frustrating. You kick it off and suddenly a cron job (or any other task) runs and scrambles all the voltages, with the sender malware having no idea there's an issue and the receiver getting junk and having no idea what it's missed.
@CB-vt3mx
@CB-vt3mx Жыл бұрын
yeah, but the attack is something that would be done over a long time frame to collect as much as possible and sort it out later. this would not be a person hanging around with a phone in their hand, but something done with a device hidden nearby and communicating over the 4G/5G cell links. If you are not time constrained, you could steal an entire project over time. Given the lax physical security in most corporation (and even government) facilities, this is likely useful for a state sponsored threat actor.
@trixer230
@trixer230 Жыл бұрын
It would be trivial to shape the malware to block other processes and stuff while the data is being transmitted....
@cvspvr
@cvspvr 11 ай бұрын
​@@trixer230you wouldn't even need to block other processes. just design the malware so that it encodes the system's power supply usage in addition to the malware's power supply usage so that the two can be differentiated
@astral6749
@astral6749 Жыл бұрын
"Every wire is an antenna" - Mordechai Guri, probably
@runforitman
@runforitman Жыл бұрын
he wouldn't be wrong
@PhilLesh69
@PhilLesh69 Жыл бұрын
My high school technical drafting teacher was a retired air force colonel who use to tell us all kinds of stories. One was about a Soviet "fishing boat" that parked in the harbor outside of some northern European city near a United States embassy or consulate or military facility. It took them weeks to eventually figure out that they were detecting the electrical impulses of the keystrokes on the various devices at the facility, including the encrypted devices they used to send cables back to Washington D.C.., before the messages were encrypted. And I remember reading in the late nineties that they were either working on or already had devices that could detect the signals from crt monitors to basically copy whatever was on a computer display without having direct access or even line of sight to it.
@syazwantheboogies8616
@syazwantheboogies8616 Жыл бұрын
Wow these thing seem impossible but it actually exist! I wonder if we can use these concept for something useful other than hacking
@ocelotmadness6287
@ocelotmadness6287 Жыл бұрын
Ha! The power supply communication thing is how scp-097 escapes in SCP: Containment breach
@EpicATrain
@EpicATrain Жыл бұрын
First clip reminds me of technology that's been out since the 80's/90's where you can transmit data across the power AC. Number one thing that comes to mind are wireless intercoms that aren't actually wireless but instead uses the power line to transmit data to other intercoms. No extra wires are needed and no wireless transmissions are used.
@micnubinub
@micnubinub Жыл бұрын
I think the covid name comes from the fact that most places had social distancing set at 2m
@ocsanik502
@ocsanik502 Жыл бұрын
haven't seen the vid yet, but I'm ready to hear about the newest absurd theoretical attack vector and the new locations I need to place tinfoil to avoid it rofl. edit: I didn't expect it to actually be the same guy behind the SATA cable antenna! props to him though for being just that right kind of insane though! edit 2: I didn't expect to find out that Microsoft office was still using MSHTML, I knew that all UWP apps were forced to use the dead EdgeHTML engine, but to think that Microsoft first party apps were using even older dead engines is crazy.
@michaellin4553
@michaellin4553 Жыл бұрын
A note about the CSAM detection: They almost certainly didn't store all the hashes on all devices, instead using a lightweight bloom filter that only contacts a server when a possible match is found.
@carlospenalver8721
@carlospenalver8721 Жыл бұрын
What I find most sus about this is the same reason those who used to hunt those sites down for bounties stopped doing so. Back in the days when dinosaurs roamed the earth if you hunted these evil people down one was given a bounty for getting them put behind bars but then something else happened. In efforts by three letter agencies to catch more fish in their nets they began building honey pots so criminals who partook in those sites would without any warning they just stepped in dog shit when it was to late formed a dam of sorts for genuine cp hunters where upon search and destroy missions came upon one of those honeypots and after reporting them got notices of either it’s not a real site or it’s already been reported so bounties became rare and so time consuming it was better for those who championed the cause to take on new directions like developing apps or just stick to gaming since just about all those sites were fakes and images were faked so as welcoming a news of Apple contributing to getting these scumbags who abuse kids held accountable most of the places their wares would be sniffing for illegal content would likely be just another three letter agency honeypot meant to catch the bad guys. I’m pretty sure Apple wasn’t doing this for nothing even when it was welcomed news since it meant the average white hat hacker could breath easy knowing they no longer needed to be exposed to those types of things it seems the whole story will never be told as to why.
@ThatSkiFreak
@ThatSkiFreak Жыл бұрын
Somehow this still seems more practical than some of the other airgap workarounds, also more interesting.
@taktuscat4250
@taktuscat4250 Жыл бұрын
Hdd led exfiltration is way faster
@ThatSkiFreak
@ThatSkiFreak Жыл бұрын
@@taktuscat4250 iirc that requires a line of sight on the led though? I may be misremembering.
@geroffmilan3328
@geroffmilan3328 Жыл бұрын
@@ThatSkiFreak yes - or well-placed mirrors 😁
@taktuscat4250
@taktuscat4250 Жыл бұрын
@@ThatSkiFreak yeah but the range and transfer speed is better
@ThatSkiFreak
@ThatSkiFreak Жыл бұрын
@@taktuscat4250 Fair enough
@enigmatico6209
@enigmatico6209 Жыл бұрын
It's a curious thing but, if you've already breached a computer, there are obviously more efficient ways to extract it's data and do whatever you want to do with that computer.
@nicfab1
@nicfab1 Жыл бұрын
Depends on how you breached the airgap. If you got someone to fall for an USB stick, you got the code inside, but you aren't getting back the stick.
@geroffmilan3328
@geroffmilan3328 Жыл бұрын
I'm always a bit surprised to hear people think that getting malware onto air-gapped computers is a challenge: it really isn't, but data exfil *is*. Physical security is often strong in such scenarios, so imaginative ways to exfil data is where you want the most options. That said, at this attack's bitrate the target data would need to be something with a very small storage footprint, or a long dwell-time for the receiver.
@alexanderhunt9263
@alexanderhunt9263 Жыл бұрын
My favorite way to do this on an air-gapped machine is using flashing qr codes.
@Mouradif
@Mouradif Жыл бұрын
It's a bit misleading when you say "this exfiltration method doesn't need admin privileges and it can run in a VM". It's true but the malware still needs read access on the file that is to be exfiltrated, which, depending on the file, requires just as much admin privilege as for any other malware.
@ThePandaKingFTW
@ThePandaKingFTW Жыл бұрын
Its not really misleading. It valuable information to know that the exfil method itself doesnt need admin privileges and can run in a VM and is worth pointing out. If you can get information from a protected source another way, knowing that to get it out you dont need them is important. Its a big part to the whole hack.
@trueriver1950
@trueriver1950 Жыл бұрын
First item: It's not quite true that the malware can run without enhanced priveleges. While the transmit side of it can run as a normal user, enhanced priveleges would be needed to access the required files (unless the machine owners were very stupid). In addition there would likely be a need to use some kind of escalation to actually install the malware in the first place Your point about the bit rate being a limit on the usefulness means that the ideal use case for this would be if you could sneakily install a keyboard sniffer and pick up interesting passwords. You can circumvent the scheduling issue if you have somewhere you can conceal the receiver nearby, in a drawer in the adjacent room perhaps?
@agsystems8220
@agsystems8220 Жыл бұрын
It's an airgapped machine. Being on the machine at all can be regarded as a high level of privilege, but this is not the same as 'enhanced privileges'. The point is that this works without any tampering with the OS, or exploiting the OS into doing something it probably shouldn't be. Even if this machine stores nuclear codes, the OS files should require higher privileges, because making the nuclear codes readable is the whole point of this machine. People with legitimate access to those codes should not be messing with the OS, so should not have access to that. If everybody requires enhanced privileges to access the data on this machine, then you have lost all protections enhanced privileges get you. It is not unusual for somebody to require access to run arbitrary data analysis programs on an airgapped machine, and these programs should not have the privileges to access keyboard inputs directly. The vast majority of programs should not need enhanced privileges. All you need to make this work is permission to run your own programs without elevated permissions, and that may not need an escalation. For the same reason, the passwords for it are not likely to be particularly interesting. Best case is that they are the same the passwords the user has for some non airgapped machine, so it is quite possible you already have one of them and used them to get the malware onto a USB into the airgapped machine anyway. I guess that could get you a host of other useful high privilege passwords that could be used on the non airgapped network, but that seems an overly difficult way of doing that, not least because that definitely does require privilege escalation on the airgapped machine (unless someone is stupid enough to log on as admin for normal access, or you have got access through an admin doing admin tasks). It is like breaking into a nuclear silo to steal the payroll information.
@theraygood
@theraygood Жыл бұрын
It depends on a malware, running on the target. If you have rogue software running on your machine you probably have bigger problems than this PoC.
@pbjandahighfive
@pbjandahighfive Жыл бұрын
That power supply exploit is essentially the exact same thing as the Air-Gapped SATA cable exploit that was demonstrated about 6 months back. Seems to work as essentially the same principle.
@oatlord
@oatlord Жыл бұрын
Ha ha, apple has saved us from the headphone psu attack. The foresight of them is stunning!
@oatlord
@oatlord Жыл бұрын
@TypicalX yeah I was being silly
@Anvilshock
@Anvilshock Жыл бұрын
Good one.
@klafbang
@klafbang Жыл бұрын
2:49 you can tell he's good by how he's serving his web-site without TLS
@anteshell
@anteshell Жыл бұрын
It is of little consequence whether or not the "s" is there after "http". The server can force encrypted connection regardless of what you write in the address field. Cannot check what would the case be as the website seems to be down.
@klafbang
@klafbang Жыл бұрын
@@anteshell It responds with an insecure redirect on port 80, times out on port 443. The page it redirects to is an academic server without proper HSTS. I'm going to stick to my original assessment.
@LiamStojanovic
@LiamStojanovic Жыл бұрын
Lol
@HTWwpzIuqaObMt
@HTWwpzIuqaObMt Жыл бұрын
Coming next: researchers find a way to control your computer by transmitting radio signals through a guitar
@ThaKinGuiN
@ThaKinGuiN Жыл бұрын
Sounds a bit like: "Hey, give me your housekey, so I can unlock your frontdoor normally, collect all your valuable stuff in boxes and move them into the hallway, leave the door unlocked to come back later at a specific time and act like I broke in without any traces"....
@Masterhitman935
@Masterhitman935 Жыл бұрын
Great now my computer need to practice social computing distancing😅.
@trueriver1950
@trueriver1950 Жыл бұрын
Hence the COVID reference in the contrived name of the method, of course :)
@Jennn
@Jennn Жыл бұрын
This is an amazing study! I love all the Weird, almost Magical things that happen when you mess with power
@zsoltpeterdaniel8413
@zsoltpeterdaniel8413 Жыл бұрын
2:39 What about powerplants or server rooms where air gaooed systems are not alone and other equipment emmits electromagnetic noise that can affect the received string?
@daemonsilverstein8633
@daemonsilverstein8633 Жыл бұрын
This technique is nothing more than a practical way (as it uses audio jack from a smartphone) of using Van Eck Phreaking (also called "Tempest"). In case of monitors and TVs, the irradiated frequencies are way above the audible frequencies (HF for VGA and UHF for HDMI) thus a more specialized equipment is needed (SDR dongles for tuning and directional antennas for better reception).
@AkosLukacs42
@AkosLukacs42 Жыл бұрын
Just look up tempest attack. The idea to use power supply as a method is not completely new. But this is a new way to exfiltrate data. I guess this would only work, if you can precisely control the workload of a specific computer, and no other em sources nearby. If the same computer is running various other software, or there are other computers doing random tasks, this would be very hard or nearly impossible.
@ceoofhentai6375
@ceoofhentai6375 Жыл бұрын
Reminds me of side channel attacks where you also observe an cryptographic device at things like the power consumption to break the encryption algorithm
@trueriver1950
@trueriver1950 Жыл бұрын
Tempest attacks are similar but different. At least according to the Wikipedia entry they focus on unintentional electromagnetic leakage: generating em leakage deliberately is taking that idea another notch further.
@mikesmz
@mikesmz Жыл бұрын
Nice work! I really enjoy your content! Thank you!
@Seytonic
@Seytonic Жыл бұрын
Thanks Mike, glad you like the vids :)
@philsponsel3824
@philsponsel3824 Жыл бұрын
i think this technique could be useful if combined with a keylogger which sends the keystrokes via this technique to the attacker. furthermore you could use a mobile as a tunnel so the attacker does not need to be onsite all the time. idk how much power this hack draws on the mobile but maybe a powerbank could help. Stealth could be archived by e.g. putting the mobile and a powerbank behind a framed picture e.g. the logo of the company. This attack would be very hard for an outsider but could be performed as a insider who does not want to get caught, however hanging the picture might be suspisious but not impossible
@OpenLogicEFI
@OpenLogicEFI Жыл бұрын
0:31 I assume the COVID-bit name is because of the distance required to be in for the power supply exploit to work. Just like covid.
@amentco8445
@amentco8445 Жыл бұрын
except it wasn't true for covid. Just a dumb name to cash in on a dead trend.
@junior-gamer-410
@junior-gamer-410 Жыл бұрын
4:30 It's also the browser frame in VS 2022
@AlexandreGTavares
@AlexandreGTavares Жыл бұрын
It has COVID in the name because it works up to 2 meters
@yannik4960
@yannik4960 Жыл бұрын
The name Covid-Bit has to be a pathetic click bait just to get the paper seen by more people. Extremely sad to see something like this with scientific papers.
@RottnRobbie
@RottnRobbie Жыл бұрын
Obvious from the comments that everybody loves an Air-gap exploit (so well done on the title choice) but the biggest baddest scariest news here is that Word still uses I.E. with a hole in it!
@chri-k
@chri-k Жыл бұрын
and likely not just one hole
@linuxguy1199
@linuxguy1199 Жыл бұрын
9:00 HOLY SHIT A KZfaqr is actually being sponsored by a useful, non scamming company that doesn't sell worthless titles or a bad VPN, *THIS DESPERATELY NEEDS TO BE IN THE NEWS* .
@the-real-random-person
@the-real-random-person Жыл бұрын
Me: 'I will only turn my pc on in a room of 5m x 5m so the magnetic waves could not go to the hacker. '
@Rawr3628
@Rawr3628 Жыл бұрын
are there any other channels that post cyber security news like this one? i want more!
@shapelessed
@shapelessed Жыл бұрын
No, not every computer power supply uses wtitching to adjust power... There are switching power supplies (as mentioned) using transistors. There is DC-DC conversion, and quite a few more...
@syazwantheboogies8616
@syazwantheboogies8616 Жыл бұрын
Mmhnnn true
@TSPxEclipse
@TSPxEclipse Жыл бұрын
Oh cool now my anxious ass needs to encapsulate my PSU in a faraday cage.
@tuxrandom
@tuxrandom Жыл бұрын
I guess we're at least one small step closer to an uncontrollable AI capable of escaping an air-gapped computer.
@Teiboku
@Teiboku Жыл бұрын
a power supply to steal data, what the hell
@arc8218
@arc8218 Жыл бұрын
Bruh, hacking from power supply? 🤣 This is another level of hack
@DaHaiZhu
@DaHaiZhu Жыл бұрын
Here's a crazy new way to exfiltrate data from and air-gaped PC: The hack would need to gain access to the PC to insert an USB stick into a slot and the using the keyboard and mouse, copy files to the USB stick. Slick, huh?
@trueriver1950
@trueriver1950 Жыл бұрын
Why hasn't anyone thought of that?
@thelight3112
@thelight3112 Жыл бұрын
Impossible. The air gape would shoot the USB stick out of the port, turning it into a projectile and killing the would-be attacker.
@trueriver1950
@trueriver1950 Жыл бұрын
@@thelight3112 you are taking the p
@christopherg2347
@christopherg2347 Жыл бұрын
"IE is dead and no longer delivered out." I.E.: "Explooiiits."
@random_guy1024
@random_guy1024 Жыл бұрын
Hacker in 2069: I've downloaded a victims file by exploiting his keyboard Caps. And I would like to call this technic *Jomama-Bin-Baiden*
@jimmy_kirk
@jimmy_kirk Жыл бұрын
Tempest scanning isn't a novel concept and has been around since as early as the second world war. It has been adapted countless times to suit various needs, such as capturing video signals emanating from computer monitors and capturing signals radiating from telecommunication networks. The one solution that is simple and effective every time is to enclose your electronic devices within a faraday cage, and use shielded telecommunication lines.
@thygrrr
@thygrrr Жыл бұрын
Wow, Internet Explorer is even late when it comes to Zero-days.
@flightmode7655
@flightmode7655 Жыл бұрын
this is similar to an old exploit being actively used by an isralei IT company. i don't remember the name of the company just that i read an articel about 5-6 years ago. this is still fking terrifying...
@brandonmeens
@brandonmeens Жыл бұрын
Is it called Covid-bit because of the 2m distance? As in social distancing hahaha
@Toleich
@Toleich Жыл бұрын
Today they scan for CP. Tomorrow, happy merchant images.
@Yadobler
@Yadobler Жыл бұрын
Power supply hack has same energy as Renault F1 engine playing God Save the Queen by modulating the revving
@ScrakSFMs
@ScrakSFMs Жыл бұрын
1:28 "HEY U STOLE MY PSU THATS NOT STEALING FILES" I have that exact power supply in my pc :D
@ericblenner-hassett3945
@ericblenner-hassett3945 Жыл бұрын
Apple being Apple, I would not doubt it was already installed and running and that just user access to know it is running has not yet been implemented. That is my view of a company that does not allow user repair of even the charge port and force manufacturers to sign contracts to not sell parts directly to consumers.
@roschlynnmichaeldsouza5747
@roschlynnmichaeldsouza5747 Жыл бұрын
I could imagine this being a issue with Corsair PSUs that have the Corsair link thingy on their PSU's.
@ETORERIGO
@ETORERIGO Жыл бұрын
Bro i dont even give a crap anymore, last thing i needed to hear that my power supply can be used to hack my pc
@drumid1881
@drumid1881 Жыл бұрын
Everyone is oblivious to the fact that Google already does this on android devices whether you use cloud storage or not!
@christopherleadholm6677
@christopherleadholm6677 Жыл бұрын
I saw this coming next when you showed the SATA cable hack. 😄
@TheRailroad99
@TheRailroad99 Жыл бұрын
Very similar techniques (power analysis and power glitching) have been used since a very long time. Great for tricking bootloaders or extracting a few bytes from embedded systems, but not generally something to worry about
@ashtralplane777
@ashtralplane777 Жыл бұрын
You can hear what a phone is "doing" by holding it next to an electric guitar plugged into a solid state amp
@tl1882
@tl1882 Жыл бұрын
yeah had that happen while using my chromebook to read midis
Жыл бұрын
Small amounts of radiation? I am crying! From pain. Pain caused by SMPS RFI with analogic radio comms... BTW, a PC will shart EMI in the mains lines detectable for miles. Just plug your phone :)) Airgapped systems still linked to mains power!
@Wuqz
@Wuqz Жыл бұрын
Is Apple implying they have a database with millions of TBs of CP!?
@Phroggster
@Phroggster Жыл бұрын
TEMPEST-derived red/black separations already protect gov/mil isolated systems from such an attack. Maybe it'd be functional in a real-world office setting, in an empty room, where you're allowed to bring your own devices nearby, and already have access to the terminal. But by that point blue team has already lost their battle. Still, this is a pretty slick and novel approach, even if it never sees usage in the real world.
@trueriver1950
@trueriver1950 Жыл бұрын
The Apple CSAM item "The road to hell is paved with good intentions" Anyone ever notice what the serpent used to tempt Eve and then Adam?
@Anvilshock
@Anvilshock Жыл бұрын
Yeah, because 2000 years ago, people writing down this humbug totally knew that at some point there was going to be a IT company named for a fruit, so, that makes it such a totally clever revelation. "HURR I tpyed soemthing funy un teh int0rwebz!"
@trueriver1950
@trueriver1950 Жыл бұрын
@@Anvilshock more to the point, why did Steve Jobs pick the name for the company knowing that the name is culturally associated with a massive downfall resulting from too much knowledge? I agree with you that back in the bronze age the original story makers did not predict Steve Jobs or computers; but equally I cannot believe that Steve Jobs grew up in the country he did without knowing the story and without also knowing that many of his compatriots believe it absolutely. That's the point I was making. It's not clever to misread something just so you can ridicule it. And on a pedantic point, the story was probably written down somewhat more than 2000 years ago, and appears to be from an even older oral tradition. The Dead Sea Scrolls are the oldest copies we have of this story, and are scientifically dated to around 2300 years ago, but are known to be copies of older works. I mean "known" by archeologists using scientific dating methods, not simply asserted by believers as an act of faith.
@Anvilshock
@Anvilshock Жыл бұрын
@@trueriver1950 Humans are all too eager to see connections where there aren't any. Who knows? Maybe Jobs just wanted something that appears ahead of Atari in the phone book. So, kind of the Dead Sea scrolls of the seventies. I could ask you why you eat bread. Don't you know that Hitler ate bread? Come back when you have something more substantial to the discussion. Or don't. No rush.
@trueriver1950
@trueriver1950 Жыл бұрын
@@Anvilshock I say the same to you. That's now two totally vacuous objections you've made to what was a minor joke, though in fairness you do get the record for the most imbecilic example of Godwin's law I've ever seen. I suppose that's funny in itself. Have you got any more where they came from? if so please keep them to yourself because they are not relevant here. More importantly they are boring.
@defnlife1683
@defnlife1683 Жыл бұрын
O.mg cable + airgapped computer = probably more practical exploit since you still need access to the computer.
@Get_yotted
@Get_yotted Жыл бұрын
All I know is that Apple needs something to compare those hashes, so somewhere Apple has a server full of CP to train their algorithms
@michaellin4553
@michaellin4553 Жыл бұрын
You should look at TempestSDR, which is more impressive leakage from HDMI cables without encryption can be reconstructed using an SDR
@Billary
@Billary Жыл бұрын
It's called Covid-bit because it only works on devices within a 2 meter radius lol... social distancing
@hypnotico7051
@hypnotico7051 Жыл бұрын
I saw this on a TV show years ago but with a graphics card instead.
@Micellod
@Micellod Жыл бұрын
They can't stop Us
@JD-tg5ib
@JD-tg5ib Жыл бұрын
So I guess now we need encrypted power supplies.
@TheRealMattDamon
@TheRealMattDamon Жыл бұрын
Microsoft: “It’s a feature, not a vulnerability!”
@NoNamenoonehere
@NoNamenoonehere Жыл бұрын
Maybe a tiny drone to be used as a middleman ? For these 2 metre technics ?
@neonteepee8453
@neonteepee8453 Жыл бұрын
Some people (these people specifically) have waaaaaaaaaay too much time on their hands
@Anvilshock
@Anvilshock Жыл бұрын
Mordecai: I can exfiltrate data using the fluctuation in a switchmode PSU's EM whine. Is slow, though, only 1000 bit/s, but I can. Pragmatic genius: I shall have a massive load resistor in the PC that soaks up all unused power whenever the silicon isn't using all of it, so that the PSU _always_ runs at full power. Mordecai: I can exfiltrate data using the fluctuation in heat radiation from your load resistor. Is slow though, due to lag from thermal mass. Only 1 bit/min. BUT I CAN!!
@qwertyuiop711
@qwertyuiop711 Жыл бұрын
me: *laughs in laptop*
@FoxBlocksHere
@FoxBlocksHere Жыл бұрын
The power supply exploit was discovered by the same guy who discovered gyroscopes can be used as microphones? Wow, I remember hearing about that one back in the day. It's cool that it's the same guy!
@xr.spedtech
@xr.spedtech Жыл бұрын
Coof-bit : what CPUs are vulnerable to this ? I use older computers as they are pre-Intel-ME era and well mapped out ...
@suwitchamusijaral5133
@suwitchamusijaral5133 Жыл бұрын
led monitor from camera seem more reliable , control load to force power usage seem more external factor
@thechillhacker
@thechillhacker Жыл бұрын
Obviously, all of our top secret work on our super secure machines need to be running on linear power supplies. Better replace any MOSFETs on the boards with equivalent tube based circuit. OK, now I need to build a "Doc Brown 1955 retro-futurefit-repair" based modernish system, like the switching controls on the frunk of the DeLorean at the end of BTTF1... Good thing I exclusively write my plans for world domination on my CBM 8032... Try again, blackhats! Damn, the 8050 is out again...
@nodvick
@nodvick Жыл бұрын
would need memekatz processing and dumping ONLY credentials to a file, then transmitting that file to make any real use of this
@emerjay348
@emerjay348 Жыл бұрын
Quite amazing this power supply exploit, good coverage of interesting news from around the world in hacking field, happy subsriber.
@Seytonic
@Seytonic Жыл бұрын
Glad to hear it :)
@TransRightsMatter
@TransRightsMatter Жыл бұрын
The NSA still uses "spot lights". Why wouldn't they use a technique like PSU or CPU modulation to send your private encryption keys or key stokes every second (well within bandwidth)? All you need is a phone or home assistant audio wire tap. You're under playing this exploit vector.
@thelight3112
@thelight3112 Жыл бұрын
The NSA isn't using anything like this against a target with a phone and/or home assistant in the room. This is best suited for use against foreign governments or corporations.
@NE0N0W0
@NE0N0W0 Жыл бұрын
this is why i always keep my computer unplugged... ...hol up
@sarahkitty4729
@sarahkitty4729 Жыл бұрын
These airgapped methods are daft if your that close to a pc to want to do that you’d just walk up to it and use it 😂
@player3616_
@player3616_ Жыл бұрын
At this point people are gonna trace your ip through a noctua fan
@beatsbycf
@beatsbycf Жыл бұрын
I feel like it was name COVID-bit to make it a more interesting headline
@hgbugalou
@hgbugalou Жыл бұрын
The fact you need software on the computer first makes the PSU thing a nothing burger IMO. You could do the same thing via the speakers and ultrasound, or tuning the caps lock led on and off and picking it up with a camera. Its a cool tech demonstration for sure, but not much of a threat.
@aloice
@aloice Жыл бұрын
JScript is microsoft's implementation of Javascript, it says so in the screenshot you have at 4:49. ECMAScript === Javascript
@ibrahimozgursucu3378
@ibrahimozgursucu3378 Жыл бұрын
This could mainly be used to identify the location of an air gapped pc which is running a honeypotted file.
@alejandroalzatesanchez
@alejandroalzatesanchez Жыл бұрын
those hacks are getting funnier and funnier
@DPedroBoh
@DPedroBoh Жыл бұрын
The slow speed from the power supply switching shoudnt be a problem if you use it to somehow get data for faster connections like wifi or bluetooth, although those machines probably woudnt have that, but maybe you get an ip or something useful.
@pcfverbeek
@pcfverbeek Жыл бұрын
even though the transmission speed is low, stealing stuff like SSH keys is very viable
@drtoxiccookie
@drtoxiccookie Жыл бұрын
wow this is very interesting, it's just crazy they can be done.
@bigwendigo2253
@bigwendigo2253 Жыл бұрын
Oof, I understand why Apple would want to do that CSAM program but no, that is invasive, and like Seytonic said, who knows what’s going to be sifted through in the future. Glad they backed out of that.
@KangJangkrik
@KangJangkrik Жыл бұрын
2:37 Mordechai? That blue guy at CN?
@isheamongus811
@isheamongus811 5 ай бұрын
Template download over internet can propably leak IP address.
@WXSTANG
@WXSTANG Жыл бұрын
I suppose wouldn't work with a cheaper linear PSU... but neat concept.
@nodvick
@nodvick Жыл бұрын
7:50 that feel when you piss off the clinton family with your passion project
@freespam9236
@freespam9236 Жыл бұрын
many criticize Mordechai Guri's work with "how will malware get to the system" person dose really interesting job in their field - just because they don't make a whole toolset does not mean it's useless
@rayoflight62
@rayoflight62 Жыл бұрын
Purely theoretical. All computers have a better way of overcoming air gaps, using modulated ultrasound emitted via the computer speaker. But again, it is all theoretical; like the EM emissions of the deflection circuit of old CRTs, impact printer audio decoding, etc. The Defence-in-Dept security principle for air-gapped machine has, as prerequisite, a security perimeter and controlled access to the machine, normally placed in a Faraday cage, or a machine with an heavy EM shield and pass-thru EMI power filters. The security exploits - like the power modulator you mention - only work when the Defence-in-Depth principle is not properly followed...
@inigopatch420
@inigopatch420 Жыл бұрын
imagine sending some type of zipbomb
Hiding Malware in Space Pictures
9:12
Seytonic
Рет қаралды 115 М.
Severe Google Home Vulnerabilities
11:10
Seytonic
Рет қаралды 123 М.
Алексей Щербаков разнес ВДВшников
00:47
ROLLING DOWN
00:20
Natan por Aí
Рет қаралды 7 МЛН
Hacking a SATA Cable to Transmit Files
10:11
Seytonic
Рет қаралды 92 М.
Undercover CIA Websites Got Informants Killed
9:53
Seytonic
Рет қаралды 560 М.
New Toy Phone Is Security Nightmare, Mobos On Fire
9:27
Seytonic
Рет қаралды 161 М.
Exploiting Github to Mine Crypto
10:46
Seytonic
Рет қаралды 319 М.
How do hackers hide themselves? - staying anonymous online
11:55
Grant Collins
Рет қаралды 1,4 МЛН
Free VPN Is Really DDoS Botnet in Disguise
11:08
Seytonic
Рет қаралды 234 М.
Teenagers Hacked The World’s Biggest Companies
6:53
Seytonic
Рет қаралды 80 М.
Exploiting Google Translate For Crypto Mining
8:06
Seytonic
Рет қаралды 177 М.
The Accidental $70k Android Hack
10:01
Seytonic
Рет қаралды 117 М.
Алексей Щербаков разнес ВДВшников
00:47