Side Channel Data Exfiltration

A typical data exfiltration attack can be quite easy to spot. By monitoring the usage of common protocols such as HTTP, HTTPS, FTP or even DNS, we can deduce if a data exfiltration is taking place.

Most modern DLP (Data Leak Prevention) solutions today that incorporate network analysis can perform such detection across multiple protocols. In fact, a simple data analysis by SIEMs and a competent analyst can point out anomalies in traffic behavior and protocol usage.

The bad guys are well aware of this, and thus are looking for many innovative ways to exfiltrate data that does not leverage on typical protocols, of even the network at all. I came across a few that I found were extremely interesting:

Data Transfer over Ultrasonic Frequency

On the write up, it has “No reliance on a data connection, including Wi-Fi, Bluetooth, or cellular service.”

As of now, the advertised usage is targeted at various marketing activities during events at a stadium. One example usage was “Triggering commands on the smartphone through a television broadcast, online video, radio commercial, film and movies.”

If you can send commands, you can send data. If you can send data, it’s data exfiltration.

Data Transfer over Screen Interfaces

This package is more straightforward as malicious tool.

You have a sender (Victim) and a receiver (C2). The victim has his machine compromised, and has established an RDP connection back to the C2. To get the RDP connection in the first place can be done by tunneling through SSH:

Once the RDP connection is established, this tool shows that data exfiltration can be performed by encoding data into pixels, which on the receiver end, can read the screen decode them.

Data Transfer over Hardware Manipulation

Perhaps the most interesting of all is hijacking and manipulating the physical machine itself. In the event of an air-gapped machine where no network connection is present, getting data out can be very challenging. (Getting into an air-gapped machine is even more challenging, and can involve really complex scenarios such as supply-chain attacks)

This paper explain how it’s possible to control the blinking of LED lights and, using a recording device, capture the blinking sequences to reconstruct data:

Even more innovative ones take control of the PC fans, and control the RPM to produce sound based data encoding:

End Notes

The techniques are endless, and as attackers continue to get more innovative, the list will continue to grow. That being said, all these attacks are considerably hard to pull off, and what we as defenders can do is the bare minimum of preventing easy ways of data exfiltration over the network.

Once we raise the difficulty threshold of data exfiltration to a certain level, then should we start worrying about such innovative and out of the box methods. Get the basics right first!

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s