Browse Definitions :
Definition

acoustical infection

Acoustic infection is a type of malware that uses a compromised computer’s sound card and speakers to send data using a covert ultrasonic acoustical mesh network.

Researchers at the Fraunhofer Institute for Communication, Information Processing and Ergonomics investigated the possibilities of malware performing data transfer across the sound devices in air gapped computers. Air gapping is a security measure that involves removing a computer or network from any external network physically and also ensuring there is no wireless connection.

In the proof of concept exploit, the researchers were able to hijack the target computer’s sound card and speakers to transmit data to a receiver. The researchers’ most successful trial used software intended for underwater communication. An infected air gapped computer sent out the ultrasonic signal, which was picked up by the attackers’ receiving microphone up 65 feet away and demodulated by the software on the attack computer. While, contrary to rumor, the proof of concept did not actually infect via sound waves, it is theoretically possible.

The proof of concept exploit used conventional means, such as external drives, to infect the target system. Despite acoustic infection’s low bandwidth (20bits/s), the fact that it uses sound beyond the range of human hearing means that malware can stealthily send data without an Internet connection. That capacity is enough to enable sending small phrases picked out for their relevance, making the strongest password easily accessible to the attacker.

To prevent data exfiltration in sound-gapped computers, the researchers recommend that the audio devices be removed. Nevertheless, it’s still possible that a compromised computer could be outfitted with supplemental audio devices that are very difficult to detect.

This was last updated in April 2014

Continue Reading About acoustical infection

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close