Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
102 tokens/sec
GPT-4o
59 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
50 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication (1803.03422v2)

Published 9 Mar 2018 in cs.CR

Abstract: In this paper we show how two (or more) airgapped computers in the same room, equipped with passive speakers, headphones, or earphones can covertly exchange data via ultrasonic waves. Microphones are not required. Our method is based on the capability of a malware to exploit a specific audio chip feature in order to reverse the connected speakers from output devices into input devices - unobtrusively rendering them microphones. We discuss the attack model and provide technical background and implementation details. We show that although the reversed speakers/headphones/earphones were not originally designed to perform as microphones, they still respond well to the near-ultrasonic range (18kHz to 24kHz). We evaluate the communication channel with different equipment, and at various distances and transmission speeds, and also discuss some practical considerations. Our results show that the speaker-to-speaker communication can be used to covertly transmit data between two air-gapped computers positioned a maximum of nine meters away from one another. Moreover, we show that two (microphone-less) headphones can exchange data from a distance of three meters apart. This enables 'headphones-to-headphones' covert communication, which is discussed for the first time in this paper.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (4)
  1. Mordechai Guri (36 papers)
  2. Yosef Solewicz (8 papers)
  3. Andrey Daidakulov (7 papers)
  4. Yuval Elovici (163 papers)
Citations (58)

Summary

Summary of MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication

The paper "MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication," authored by Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, and Yuval Elovici, presents an innovative approach to bridging air-gaps in secure environments using ultrasonic communication. The research explores a novel methodology whereby air-gapped computers, equipped only with passive speakers, headphones, or earphones, are capable of covertly exchanging data. This is achieved through exploiting the reversibility of these audio output devices in the ultrasonic frequency range (18kHz to 24kHz), circumventing the necessity of traditional microphones.

Attack Model and Implementation

The research delineates a comprehensive attack model focused on speaker-to-speaker communication in microphone-less environments. The paper reveals that passive speakers and headphones, which are inherently reversible, can be exploited to act as microphones via malware-triggered software manipulation, commonly referred to as 'jack retasking.' This reversal empowers these devices to capture ultrasonic waves transmitted by other speakers, thus allowing data transfer between air-gapped systems.

The authors also introduce a communication protocol that effectively manages the transformation of speakers to microphones within the same device, facilitating a dynamic transmission mode necessary for sustained covert exchanges. The research importantly extends this model to headphones-to-headphones communication within a three-meter range, demonstrating a significant flexibility in practical applications.

Evaluation and Results

The evaluation section of this paper provides empirical results showcasing the feasibility and effectiveness of this communication channel. The paper specifies that communication can be sustained at distances up to nine meters, with data transfer rates ranging from 10 to 166 bits per second depending on environmental conditions and device configurations. Instances of headphones-to-headphones communication are explored, where transfer is possible up to three meters at a reduced bit rate. These results underscore the potential stealth and utility of the covert channel in close-proximity scenarios.

Implications and Future Directions

This research presents substantive implications for cybersecurity, particularly in the domain of air-gapped systems which are considered among the most secure infrastructures. The ability of an adversary to exchange data without microphones presents a tangible threat to secure environments, demanding a reevaluation of current security policies and strategies. Moreover, this methodology challenges the conventional understanding of air-gapped security, suggesting a need for further paper into ultrasonic signal vulnerabilities and the development of robust countermeasures.

In terms of future developments, this paper paves the way for further exploration of covert communication channels utilizing unconventional device functionalities. The potential for integrating more complex modulation schemes or enhancing synchronization protocols could extend the range and reliability of covert communications even further. Additionally, advancements in ultrasonic jamming or detailed investigations into environmental impacts could help mitigate such threat vectors.

In conclusion, this paper contributes valuable insights into the vulnerabilities of air-gapped systems through ultrasonic communication, advocating for an informed and evolving approach to cybersecurity vigilance. This research mandates increased awareness and adaptation of security protocols to keep pace with emerging technologies capable of transcending traditional security measures.

Youtube Logo Streamline Icon: https://streamlinehq.com