A typical data exfiltration attack can be quite easy to spot. By monitoring the usage of common protocols such as HTTP, HTTPS, FTP or even DNS, we can deduce if a data exfiltration is taking place.
Most modern DLP (Data Leak Prevention) solutions today that incorporate network analysis can perform such detection across multiple protocols. In fact, a simple data analysis by SIEMs and a competent analyst can point out anomalies in traffic behavior and protocol usage.
The bad guys are well aware of this, and thus are looking for many innovative ways to exfiltrate data that does not leverage on typical protocols, of even the network at all. I came across a few that I found were extremely interesting:
Data Transfer over Ultrasonic Frequency
https://github.com/jamesonrader/CUE-Ultrasonic-Transmissions-Protocol
On the write up, it has “No reliance on a data connection, including Wi-Fi, Bluetooth, or cellular service.”
As of now, the advertised usage is targeted at various marketing activities during events at a stadium. One example usage was “Triggering commands on the smartphone through a television broadcast, online video, radio commercial, film and movies.”
If you can send commands, you can send data. If you can send data, it’s data exfiltration.
Data Transfer over Screen Interfaces
https://github.com/pentestpartners/PTP-RAT
https://www.pentestpartners.com/security-blog/exfiltration-by-encoding-data-in-pixel-colour-values/
This package is more straightforward as malicious tool.
You have a sender (Victim) and a receiver (C2). The victim has his machine compromised, and has established an RDP connection back to the C2. To get the RDP connection in the first place can be done by tunneling through SSH: https://serverfault.com/questions/200249/how-to-tunnel-windows-remote-desktop-through-ssh-using-a-linux-box
Once the RDP connection is established, this tool shows that data exfiltration can be performed by encoding data into pixels, which on the receiver end, can read the screen decode them.
Data Transfer over Hardware Manipulation
Perhaps the most interesting of all is hijacking and manipulating the physical machine itself. In the event of an air-gapped machine where no network connection is present, getting data out can be very challenging. (Getting into an air-gapped machine is even more challenging, and can involve really complex scenarios such as supply-chain attacks)
This paper explain how it’s possible to control the blinking of LED lights and, using a recording device, capture the blinking sequences to reconstruct data: https://arxiv.org/abs/1706.01140
Even more innovative ones take control of the PC fans, and control the RPM to produce sound based data encoding: https://www.technologyreview.com/s/601816/how-fansmitter-malware-steals-data-from-air-gapped-computers/
End Notes
The techniques are endless, and as attackers continue to get more innovative, the list will continue to grow. That being said, all these attacks are considerably hard to pull off, and what we as defenders can do is the bare minimum of preventing easy ways of data exfiltration over the network.
Once we raise the difficulty threshold of data exfiltration to a certain level, then should we start worrying about such innovative and out of the box methods. Get the basics right first!
Leave a Reply