Glowworm Attack

A novel technique leverages optical emanations from a device’s power indicator LED to recover sounds from connected peripherals and spy on electronic conversations from a distance of as much as 35 meters.

Dubbed the “Glowworm attack,” the findings were published by a group of academics from the Ben-Gurion University of the Negev earlier this week, describing the method as “an optical TEMPEST attack that can be used by eavesdroppers to recover sound by analysing optical measurements obtained via an electro-optical sensor directed at the power indicator LED of various devices.”

Accompanying the experimental setup is an optical-audio transformation (OAT) that allows for retrieving sound by isolating the speech from the optical measurements obtained by directing an electro-optical sensor at the device’s power indicator LED.

Stack Overflow Teams

TEMPEST is the codename for unintentional intelligence-bearing emanations produced by electronic and electromechanical information-processing equipment.

Glowworm builds on a similar attack called Lamphone that was demonstrated by the same researchers last year and enables the recovery of sound from a victim’s room that contains an overhead hanging bulb.

While…

http://feedproxy.google.com/~r/TheHackersNews/~3/1kR_AyuiEjw/new-glowworm-attack-recovers-devices.html

Leave a Reply