Oops!...I think I scanned a malware

نویسندگان

  • Ben Nassi
  • Adi Shamir
  • Yuval Elovici
چکیده

This article presents a proof-of-concept illustrating the feasibility of creating a covert channel between a C&C server and a malware installed in an organization by exploiting an organization’s scanner and using it as a means of interaction. We take advantage of the light sensitivity of a flatbed scanner, using a light source to infiltrate data to an organization. We present an implementation of the method for different purposes (even to trigger a ransomware attack) in various experimental setups using: (1) a laser connected to a stand (2) a laser carried by a drone, and (3) a hijacked smart bulb within the targeted organization from a passing car. In our experiments we were able to infiltrate data using different types of light sources (including infrared light), from a distance of up to 900 meters away from the scanner. We discuss potential counter measures to prevent the attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introducing Stealth Malware Taxonomy

Introduction At the beginning of this year, at Black Hat Federal Conference, I proposed a simple taxonomy that could be used to classify stealth malware according to how it interacts with the operating system. Since that time I have often referred to this classification as I think it is very useful in designing system integrity verification tools and talking about malware in general. Now I deci...

متن کامل

Animal Suffering: A Moorean Response to a Problem of Evil

In this paper, I propose a new response to a particular instance of the problem of evil: the problem of animal suffering. My solution, in brief, is that the rational theist may argue, justifiably, that an omnipotent, omniscient, omnibenevolent God would not allow gratuitous animal suffering to occur, and, therefore, all instances of animal suffering that are encountered are not instanc...

متن کامل

Oops – That was a Mistake! How Toddler Brains React to Feedback

Oops, I just clicked on the wrong button on my computer (mistake) and it made this error sound that you might know. This is an example of feedback. Feedback is useful information to indicate if something was correct or wrong and we can use feedback to improve something. For example, I do not want to make the same mistake again, so now, I click on the right button! This is called feedback learni...

متن کامل

Ultrasonography of soft tissue “oops lesions”

In this article, I would like to define "oops lesions" as soft tissue mass-like lesions that involve surprise or embarrassment for radiologists following the final diagnosis. Examples of "oops lesions" include malignant tumors that appear benign, malignancy-mimicking benign tumors, incorrect identification of epidermal inclusion cysts, and soft tissue pseudotumors. Ultrasonography (US) findings...

متن کامل

Towards Extending the Antivirus Capability to Scan Network Traffic

Computer network is a major venue for malware to spread out and infect new victims. Many effective countermeasures against attacks are deployed at different network boundaries. Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and Firewalls are among such security controls. The Antivirus (AV) software is widespread among end-users and deployed as a last line of defense agai...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1703.07751  شماره 

صفحات  -

تاریخ انتشار 2017