2022/9/28

AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies

Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici

2014 9th International Conference on Malicious and Unwanted Software: The …, 2014

Information is the most critical asset of modern organizations, and accordingly coveted by adversaries. When highly sensitive data is involved, an organization may resort to air-gap isolation, in which there is no networking connection between the inner network and the external world. While infiltrating an air-gapped network has been proven feasible in recent years (e.g., Stuxnet), data exfiltration from an air-gapped network is still considered to be one of the most challenging phases of an advanced cyber-attack. In this paper we present “AirHopper”, a bifurcated malware that bridges the air-gap between an isolated network and nearby infected mobile phones using FM signals. While it is known that software can intentionally create radio emissions from a video display unit, this is the first time that mobile phones are considered in an attack model as the intended receivers of maliciously crafted radio signals. We …