Jump to content

Toggle Scoreboard
ibProArcade Scoreboard

Dracula KuttappaN has obtained a high score of 10740 Yesterday, 10:10 PM Playing 9 Dragons Hexa Play Now!                KD DexteR has obtained a high score of 10 Yesterday, 08:35 PM Playing Atomica Play Now!                Shaji PappaN has obtained a high score of 1900 Yesterday, 08:27 PM Playing Atomica Play Now!                Ambros Attambomb has obtained a high score of 30930 Yesterday, 04:58 PM Playing CrashDown Play Now!                Major Purushu has obtained a high score of 60 Yesterday, 03:00 PM Playing Harry Potter`s Ghoul Attic Play Now!                
- - - - -

Five Cyber Spy Technologies That Cannot Be Stopped By Going Offline

kaspersky kaspersky lab spyware malware cyber spy cyber attack virus cyber data breach data leaks data protection offline protection security spying

  • Please log in to reply
5 replies to this topic

#1 VIncenT GomeZ

VIncenT GomeZ

    Best Boy of PP - 2012

  • Royal Member
  • 10,063 posts
  • Location:root
  • Gender:Male
  • Country: Country Flag
  • Current: Country Flag

Posted 18 June 2015 - 01:29 PM

Five cyber spy technologies that cannot be stopped by going offline


Any system that is connected to the Internet is always subject to threats, no matter how well it is protected. This assumption is well known to any teenager today. No software barriers can fully prevent human errors in a program code or user behavior.

That’s why devices that have functions of special importance, or that contain top-secret information, are usually not connected to the Internet. It is always better to accept inconvenience than face unpleasant consequences. This is how, for example, control systems for large industrial objects or some bank computers are protected.


It may seem that going offline completely will keep any secret safe: if there is no Internet, then there is no data leakage. However, that is not the case. Remote data transfer techniques adopted by secret services long time ago become more accessible each year to ‘commercial’ users. Quite a few spy gadgets at James Bond’s disposal are becoming commonplace today.


Source: Kaspersky Official Blog

Edited by GarvaaSees, 18 June 2015 - 01:37 PM.

Users Awards

#2 VIncenT GomeZ

VIncenT GomeZ

    Best Boy of PP - 2012

  • Royal Member
  • 10,063 posts
  • Location:root
  • Gender:Male
  • Country: Country Flag
  • Current: Country Flag

Posted 18 June 2015 - 01:34 PM

1. Electromagnetic spying

Any operational device that is connected to a power line generates electromagnetic radiation that can be intercepted by proven technologies. Almost half a century ago, state security services of the U.S. and the USSR were concerned with such leakages, and the information that has been obtained since those days is massive. Some parts of the American activity are known under the TEMPEST abbreviation, and some declassified archives reads as good as detective novels.

Despite the long history, new methods of ‘surfing’ electromagnetic waves appear regularly as the electrical equipment evolves. In the past, the weakest links were CRT monitors and unshielded VGA cables that produced electromagnetic noise. Keyboards have become favorite toys for data security researchers over the past few years. The research in this area has been steadily productive. These are just a few examples.
Keystrokes can be remotely tracked with high accuracy at the 67-feet (20-meter) distance by using a homemade device that analyzes the radio spectrum and costs around $5,000. It is interesting to note that the attack is equally effective against common cheap USB keyboards, expensive wireless keyboards with a signal encryption, and built-in notebook keyboards.
All of the devices work on the same principle and generate electromagnetic noise. The difference is stipulated by the signal power, which depends upon the length of the data transmission wire (it is the shortest for notebooks).
Data can be intercepted more easily if the target computer is connected to the power line. Voltage fluctuations that correspond to keystrokes create noise in the ground line. The ground line noise can be intercepted by a hacker connected to a nearby power socket. The price for the equipment with the effective range of 50 feet (15 meters) is $500.
How to counter it: The best protection from electromagnetic spies can be achieved by shielding the room (a Faraday cage) and by special noise generators. If your secrets are not that expensive, and you are not ready to cover the walls of your basement with foil, then you can just use a “manual” noise generator: type redundant characters sporadically and delete them afterwards. Virtual keyboards can be used to enter valuable data.

2. Watch out for the laser

There are alternative methods that work well for keylogging. For example, the accelerometer of a smartphone that rests near the keyboard provides an approximate 80 percent recognition accuracy rating. This accuracy rating is not good enough to intercept passwords, but text with a meaning can be deciphered well. The method is based upon comparison of the vibration of the successive pairs of impulses that correspond to keystrokes.

A laser ray, inconspicuously directed at the computer, is an even more effective method to register vibrations. Researchers assure us that each key generates its own pattern of vibrations. The laser should be directed at a part of a notebook or a keyboard that reflects light well: for example, at the logotype of the manufacturer.

How to counter it: These methods work only in the immediate vicinity. Try not to let spies close to you.

3. Listen to the radio

Intercepting keyboard input is not always useful, obviously, as it is not possible to access the memory of a computer. However, it is possible to infect an offline computer with malware by the means of an external medium. Incidentally, that was how the famous Stuxnet worm infected its target computer within the uranium enrichment infrastructure. After infection, malware works like an internal spy, ‘siphoning’ data through a certain physical medium.

For example, Israeli researchers developed software that modulates electromagnetic radiation in computers’ hardware. This radio signal is quite strong and can be received even by a standard FM receiver on the phone

Why the complications? Computers with classified data are placed inside well-shielded rooms with limited access to eliminate any possible leakage. A spy phone can be brought inside unlike a spectrum analyzer.

How to counter it: All of the mobile phones, not to mention more suspicious equipment, should be left outside of the shielded room.


4. Warm… Warmer… Hot!

The aforementioned Israeli team recently demonstrated a more exotic scenario of stealing datathrough… heat emissions!

The principle of the attack is as follows: two desktop computers sit close to each other (up to 15 inches (about 40 centimeters) apart) and the internal motherboard temperature sensors of one computer tracks the temperature changes of the other.

Internet-isolated computers are put right next to internet-connected computers for convenience quite often. The Internet-isolated computer contains classified data; the other is a common Internet-connected computer.

If someone infects both systems with malware, the following happens: The malware reads classified data and periodically changes the system temperature by adjusting the load level and producing a modulated heat signal. The second computer reads and decodes it and sends the classified data over the Internet.

The heat inertia of the system prevents fast data transmission. The transmission speed is limited to eight bits per hour. At this rate, it is possible to steal a password; however, a massive database theft remains in question.

Nevertheless, with the popularity of Internet-dependent gadgets, the role of the second computer that siphons data can be fulfilled by a smart conditioner or a climate-control sensor that can register temperature changes with greater precision. The transfer rate may well increase in the nearest future.

How to counter it: Do not place offline computers with classified data next to other, Internet connected computers.

5. Knock, knock. Who’s there?

A classic well-shielded room does not guarantee full data leakage protection. For electromagnetic noise the steel shield is impermeable; not quite so for ultrasound.

In the case of ultrasound technology, spy equipment is represented in two compact units. One unit is inconspicuously placed inside of the classified room, while the other is placed somewhere outside of it. The data transfer rate through steel for ultrasound reaches up to 12 MB/s. Additionally, no power supply is required for one of the units, as the energy is transmitted along with data.

How to counter it: If you have your own classified steel room, then all of the installed equipment should be minutely inspected.

Overall, awareness and knowledge of modern spy techniques (at least ‘modern’ according to public standards), can leave your data intact. A strong security solution is obligatory for the software side.


Read Original Post:

Hidden Content
You'll be able to see the hidden content once you reply to this topic.

Edited by GarvaaSees, 18 June 2015 - 01:47 PM.

Users Awards

#3 kar77



  • Members
  • 316 posts
  • Gender:Male
  • Country: Country Flag
  • Current: Country Flag

Posted 31 October 2015 - 07:49 PM


Sent from my iPad using Tapatalk

#4 Major Purushu

Major Purushu

    ചായക്കട പ്രസിഡന്റ്

  • Super Moderator
  • 30,631 posts
  • Location:peepeeeee
  • Interests:addict with PP
  • Gender:Male
  • Country: Country Flag
  • Current: Country Flag

Posted 31 October 2015 - 07:54 PM

good info

useful one

thanks don hari

#5 PP BalaN

PP BalaN

    പൂവാലൻ ഓഫ് പീപ്പി - 2016

  • Royal Member
  • 13,715 posts
  • Location:റിയാദ്
  • Gender:Male
  • Country: Country Flag
  • Current: Country Flag

Posted 31 October 2015 - 08:20 PM

Elllllllllllllllllllaam manasilaayi :pray: 

#6 Vanampaadi


    Best Topic Maintainer -2016

  • Super Moderator
  • 66,864 posts
  • Location:Dubai
  • Interests:Kaattaruviyude sangeetham kaathorkkan,, Kodamanjhu pozhiyunna kunninmele thanichirikkan,, Mazhayude nanutha sparsham ettu vanghaan
  • Gender:Female
  • Country: Country Flag
  • Current: Country Flag

Posted 31 October 2015 - 10:31 PM

Gud share Hari .... :vgood:

Users Awards

Also tagged with one or more of these keywords: kaspersky, kaspersky lab, spyware, malware, cyber spy, cyber attack, virus, cyber, data breach, data leaks, data protection, offline, protection, security, spying

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users