Neuer RAMBO-Angriff stiehlt Daten über RAM in abgehörten Computern

Teilen:

A novel side-channel attack dubbed  “RAMBO” (Radiation of Air-gapped Memory Bus for Offense) generates electromagnetic radiation from a device’s RAM to send data from air-gapped computers.

Air-gapped systems, typically used in mission-critical environments with exceptionally high-security requirements, such as governments, weapon systems, and nuclear power stations, are isolated from the public internet and other networks to prevent malware infections and data theft.

Although these systems are not connected to a broader network, they can still be infected by rogue employees introducing malware through physical media (USB drives) or sophisticated supply chain attacks carried out by state actors.

The malware can operate stealthily to modulate the air-gapped system’s RAM components in a way that allows the transfer of secrets from the computer to a recipient nearby.

The latest method that falls into this category of attacks comes from Israeli university researchers led by Mordechai Guri, an experienced expert in covert attack channels who previously developed methods to leak data using network card LEDs, USB drive RF signals, SATA cables, and power supplies.

How the RAMBO attack works

To conduct the Rambo attack, an attacker plants malware on the air-gapped computer to collect sensitive data and prepare it for transmission. It transmits the data by manipulating memory access patterns (read/write operations on the memory bus) to generate controlled electromagnetic emissions from the device’s RAM.

These emissions are essentially a byproduct of the malware rapidly switching electric signals (On-Off Keying “OOK”) within the RAM, a process that isn’t actively monitored by security products and cannot be flagged or stopped.

The emitted data is encoded into “1” and “0,” represented in the radio signals as “on” and “off.” The researchers opted for using Manchester code to enhance error detection and ensure signal synchronization, reducing the chances for incorrect interpretations at the receiver’s end.

The attacker may use a relatively inexpensive Software-Defined Radio (SDR) with an antenna to intercept the modulated electromagnetic emissions and convert them back into binary information.

Performance and limitations

The RAMBO attack achieves data transfer rates of up to 1,000 bits per second (bps), equating to 128 bytes per second, or 0.125 KB/s.

At this rate, it would take around 2.2 hours to exfiltrate 1 megabyte of data, so RAMBO is more suitable for stealing small amounts of data like text, keystrokes, and small files.

The researchers found that keylogging can be performed in real-time when testing the attack. However, stealing a password takes 0.1 to 1.28 seconds, a 4096-bit RSA key takes between 4 and 42 seconds, and a small image between 25 to 250 seconds, depending on the speed of the transmission.

Fast transmissions are limited to a maximum range of 300 cm (10 ft), with the bit error rate being 2-4%. Medium-speed transmissions increase the distance to 450 cm (15 ft) for the same error rate. Finally, slow transmissions with nearly zero error rates can work reliably over distances of up to 7 meters (23 ft).

The researchers also experimented with transmissions up to 10,000 bps but found that anything surpassing 5,000 bps results in a very low signal-to-noise ratio for effective data transmission.

Stopping RAMBO

The technical paper published on Arxiv provides several mitigation recommendations to mitigate the RAMBO attack and similar electromagnetic-based covert channel attacks, but they all introduce various overheads.

Recommendations include strict zone restrictions to enhance physical defense, RAM jamming to disrupt covert channels at the source, external EM jamming to disrupt radio signals, and Faraday enclosures to block air-gapped systems from emanating EM radiation externally.

The researchers tested RAMBO against sensitive processes running inside virtual machines and found that it remained effective.

However, as the host’s memory is prone to various interactions with the host OS and other VMs, the attacks will likely be disrupted quickly.

Bill Toulas

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
5:04 am, Jan. 24, 2025
Wetter-Symbol 10°C
L: 9° | H: 10°
moderate rain
Luftfeuchtigkeit: 89 %
Druck: 993 mb
Wind: 19 mph SSW
Windböe: 40 mph
UV-Index: 0
Niederschlag: 2.2 mm
Wolken: 75%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 7:49 am
Sonnenuntergang: 4:35 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
9° | 10°°C 1 mm 100% 24 mph 89 % 1002 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
3° | 5°°C 1 mm 100% 11 mph 90 % 1010 mb 0 mm/h
So. Jan. 26 9:00 pm
Wetter-Symbol
2° | 7°°C 1 mm 100% 15 mph 97 % 1009 mb 0 mm/h
Mo. Jan. 27 9:00 pm
Wetter-Symbol
6° | 8°°C 1 mm 100% 12 mph 98 % 991 mb 0 mm/h
Di. Jan. 28 9:00 pm
Wetter-Symbol
5° | 7°°C 1 mm 100% 15 mph 92 % 999 mb 0 mm/h
Today 6:00 am
Wetter-Symbol
10° | 10°°C 1 mm 100% 24 mph 89 % 992 mb 0 mm/h
Today 9:00 am
Wetter-Symbol
10° | 11°°C 1 mm 100% 15 mph 86 % 992 mb 0 mm/h
Today 12:00 pm
Wetter-Symbol
9° | 9°°C 0.8 mm 80% 17 mph 69 % 995 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
8° | 8°°C 0 mm 0% 13 mph 50 % 999 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
7° | 7°°C 0 mm 0% 9 mph 56 % 1002 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
6° | 6°°C 0 mm 0% 5 mph 63 % 1002 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
5° | 5°°C 0 mm 0% 4 mph 68 % 1000 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
5° | 5°°C 0 mm 0% 3 mph 84 % 999 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€100,233.33
2.39%
Ethereum(ETH)
€3,193.12
4.08%
XRP(XRP)
€3.02
1.18%
Fesseln(USDT)
€0.96
0.06%
Solana(SOL)
€243.93
3.15%
Dogecoin(DOGE)
€0.338235
0.61%
USDC(USDC)
€0.96
-0.01%
Shiba Inu(SHIB)
€0.000019
0.62%
Pepe(PEPE)
€0.000014
2.67%
Peanut das Eichhörnchen(PNUT)
€0.333452
-4.27%
Nach oben scrollen