Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Blogs
    • Security Watch

    Funtenna Malware Takes to the Airwaves to Steal Data

    By
    Sean Michael Kerner
    -
    August 6, 2015
    Share
    Facebook
    Twitter
    Linkedin
      Funtenna

      LAS VEGAS—Airwaves are used every day to transmit data via known wireless protocols, but what if a device could be manipulated to cause it to be able transmit a non-WiFi signal that no one knew about?

      At the Black Hat USA security conference here, Ang Sui, founder of Red Balloon Security, demonstrated and provided great detail into a proof of concept security attack called the Funtenna.

      “Funtenna is malware that intentionally causes compromising emanation,” Sui said.

      Emanation is a form of radio frequency (RF) signal that is leaked from an electrical device or cable. So, for example, Sui was able to demonstrate how with a tiny bit of Funtenna code, he could get a low-cost laser printer to emanate a signal that could be encoded with information. That signal could then be picked up by an AM radio and then demodulated to get the encoded information.

      In contrast with WiFi, the Funtenna signal is not monitored or protected by organizations, Sui said. If someone wanted to exfiltrate data from a secret location without anyone knowing it, Funtenna could one day be an option.

      Funtenna can potentially make use of multiple forms of acoustic, subacoustic and even ultrasonic signals. Sui noted that there was some evidence in the leaked U.S. National Security Agency documents from whistleblower Edward Snowden that the spy agency has a similar form of radio transmission technology. Sui noted however that the NSA needed hardware to be installed, while Funtenna is software and makes use of cables on a device to emanate the required signal.

      “So say there is a secret location that you want to exfiltrate data from and you need something non-obvious, so you won’t get caught,” Sui said. “With Funtenna, you can exfiltrate with only software that can evaporate when it’s done.”

      Beyond just the leaked NSA documents, Sui noted that there is a rich history of academic papers about data emanation potential. One such paper published in December 2013 and co-authored by Adi Shamir is titled “RSA Key Extraction via Low Bandwidth Acoustic Cryptoanalysis.”

      Sui noted, however, that the majority of the prior research was about taking a faint accidentally leaked signal and then capturing it with a big powerful receiver. Funtenna is a bit different in that the signal is intentionally created and can be picked up with a low-power device.

      Sui explained that Funtenna can be used to emanate a signal by turning GPIO (General Purpose Input/Output) or UART (Universal asynchronous receiver/transmitter) pins on a device on and off. In a live demo with a Pantum P250W wireless monochrome laser printer, Sui showed how Funtenna code could in fact emanate a signal that could be picked up on a regular handheld AM radio. Sui is planning on providing another demo of Funtenna at the DefCon conference on Aug. 8. The Funtenna code is also set to be publicly available at funtenna.org and in a Github repository.

      “The key take away here is that Funtenna works,” Sui said. “And network defenses like IPS [Intrusion Prevention System] and firewalls are no substitute for full host-based defenses.

      “Here with Funtenna I can beat the best network detection in the world with just an AM radio,” Sui added.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.

      MOST POPULAR ARTICLES

      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×