This Malware Can Transfer Data via USB Emissions from Air-Gapped Computers
Sep 05, 2016
   Air-gapped computers that are isolated from the Internet or other networks and believed to be the most secure computers on the planet have become a regular target in recent years.   A team of researchers from Ben-Gurion University in Israel has discovered a way to extract sensitive information from air-gapped computers – this time using radio frequency transmissions from USB connectors without any need of specialized hardware mounted on the USB.   Dubbed  USBee , the attack is a significant improvement over the NSA-made USB exfiltrator called CottonMouth that was mentioned in a document leaked  by former NSA employee Edward Snowden.   Unlike CottonMouth , USBee  doesn't require an attacker to smuggle a modified USB device into the facility housing the air-gapped computer being targeted; rather the technique turns USB devices already inside the facility into an RF transmitter with no hardware modification  required.   Must Read:  BadUSB Code Released – Turn USB Drives Into Undete...