• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Week 1: Course Introduction
      • Week 2: Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules
      • Week 3: Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits
      • Week 4: Porting Exploits, Scripting, and Simulating Penetration Testing
      • Week 5: Independent Study – Perform Metasploit Attack and Create Presentation
      • Week 6: Ettercap
      • Week 7: Introduction to OWASP’s WebGoat application
    • Second Half of the Semester
      • Week 8: Independent Study
      • Week 9: Introduction to Wireless Security
      • Week 10: Wireless Recon, WEP, and WPA2
      • Week 11: WPA2 Enterprise, Wireless beyond WiFi
      • Week 12: Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems
      • Week 13: Independent Study – Analyze provided Operating System Samples and Create Assessment Report
      • Week 14: Deliver Assessment to Operating System Class either in person or via teleconferenc
  • Assignments
    • Analysis Reports
    • Group Project Report and Presentation
  • Webex
  • Harvard Coursepack
  • Gradebook

MIS 5212-Advanced Penetration Testing

MIS 5212 - Section 001 - Wade Mackey

Fox School of Business

Malware Lets a Drone Steal Data by Watching a Computer’s Blinking LED

February 26, 2017 by Ioannis S. Haviaras 2 Comments

Researchers at Ben-Gurion University in Israel have developed a way to steal data off of someone’s hard drive by infecting the desired computer with malware and reading data through the blinking LED light that indicates hard drive activity. In their testing, researchers used a drone camera that would fly to the window of the office where the computer was infected. Once at the window, the drone can capture the blinking LEDs, which can blink up to 6,000 times per second. This allows the desired hacker to transmit data very fast over a long distance. Being able to infiltrate a system that is not on the internet is a major concern for highly sensitive systems that utilize the “air gap.” The “air gap” is sometimes seen as an impenetrable defense against highly sensitive systems which are not connected to the internet. By using the computer’s LED light it has the potential for hackers to use a stealthier, higher-bandwidth and longer distance method to infiltrating an air-gapped computer. The researchers believe that the easiest way to circumvent this is by taping the LED light or by keeping highly sensitive systems away from windows.

Article – https://www.wired.com/2017/02/malware-sends-stolen-data-drone-just-pcs-blinking-led/

Filed Under: Week 06 Tagged With:

Reader Interactions

Comments

  1. Jason A Lindsley says

    February 28, 2017 at 9:40 pm

    Glad you posted this Ioannis. I saw this earlier this week. It’s an interesting concept, but I imagine this would be really difficult to coordinate. Air-gapped systems also usually have very high physical security controls and are located in rooms with no windows or doors. This is a good reminder of the importance of these controls. The article mentions keeping air-gapped machines in secure rooms away from windows, placing film over a building’s glass designed to mask light flashes, or even putting a piece of tape over the LED. Most data centers I’ve visited are behind closed doors in rooms with no windows.

    Log in to Reply
  2. Mauchel Barthelemy says

    March 5, 2017 at 2:39 pm

    This is the reason it makes perfect sense to place a data center away from see-through windows locations. Hackers will not hesitate to go above and beyond to come up with new ways to steal people’s information every chance they get. IT security professionals and researchers should think the same. Researchers at Ben-Gurion University exemplify good effort to always stay on-step ahead of the bad guys. Lastly, this represents a good example where physical security must be in good blend with IT infrastructure.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (35)
  • Week 01 (2)
  • Week 02 (14)
  • Week 03 (13)
  • Week 04 (10)
  • Week 05 (7)
  • Week 06 (29)
  • Week 07 (8)
  • Week 08 (1)
  • Week 09 (6)
  • Week 10 (12)
  • Week 11 (7)
  • Week 12 (4)
  • Week 13 (6)
  • Week 14 (18)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in