Internet privacy and security course
About translation
Previous Next

Chapter 86

Cyber espionage through monitor emanation analysis

This chapter was written as a result of a comment by a subscriber, who complained that there was an inaccuracy in the knowledge test in the field of anonymity and security in the network, namely that password stealing methods using monitor emanation analysis exist.

The video was posted as an example, where the sound generated by the monitor image was received on a radio receiver. I found the original version of the demonstration and I invite you to have a look. The author in his video in detail and clearly explains the technical details of the attack, and there is no point in doubling them in the text.

There are some details that I want to draw your attention to. The technology of data collection based on the analysis of the monitor emanation with good equipment allows you to monitor the activity on the victim's computer at a distance, for example, to monitor the neighbors. The attacker using this method can recognize such activity on the victim’s computer as viewing adult materials, watching a football game or launching a computer game.

This way you can get data for further attacks, for example, operating system version, programs used and sites visited. Analyzing the victim's behavior, one can assess the degree of their competence.

But the quality of existing solutions does not allow reading correspondence or stealing passwords in this way, even if they are written in a text document. The exceptions are passwords written in a document in a huge font, but this is rather the exception.

Here is a screenshot of the author of the video. As you can see, the quality is enough to understand what the user is busy with, but not enough to read their correspondence.

analys

Anyway, you should know and remember about this attack. Protection from it is a matter of creating radio interference, and it lies outside the course. If you want, on thematic forums and websites you may find detailed instructions.

Previous
3968
Next