19
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Oops!...I think I scanned a malware

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          This article presents a proof-of-concept illustrating the feasibility of creating a covert channel between a C\&C server and a malware installed in an organization by exploiting an organization's scanner and using it as a means of interaction. We take advantage of the light sensitivity of a flatbed scanner, using a light source to infiltrate data to an organization. We present an implementation of the method for different purposes (even to trigger a ransomware attack) in various experimental setups using: (1) a laser connected to a stand (2) a laser carried by a drone, and (3) a hijacked smart bulb within the targeted organization from a passing car. In our experiments we were able to infiltrate data using different types of light sources (including infrared light), from a distance of up to 900 meters away from the scanner. We discuss potential counter measures to prevent the attack.

          Related collections

          Author and article information

          Journal
          2017-03-22
          Article
          1703.07751
          999371a8-9800-4ca8-9988-7ded0ea5dcec

          http://creativecommons.org/publicdomain/zero/1.0/

          History
          Custom metadata
          Cyber-Security, Covert Channel, Data Infiltration, Scanner
          cs.CR

          Security & Cryptology
          Security & Cryptology

          Comments

          Comment on this article