this post was submitted on 02 May 2025
3 points (80.0% liked)

Cybersecurity

7734 readers
15 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
 

Came out in 2008 and leaked in 2013, the glowies have been able to send out malicious packets from air-gapped networks for exuberant prices.

top 6 comments
sorted by: hot top controversial new old
[–] mindbleach@sh.itjust.works 1 points 2 months ago

"How can NSA--?" is a question.

"How NSA can--" is a statement.

[–] sun_is_ra@sh.itjust.works 0 points 2 months ago (3 children)

Anyone watched the video willing to share how?

[–] kmartburrito@lemmy.world 1 points 2 months ago

It's a combination of compromising the hardware gigabit connector on the motherboard, and embedding within that connector a hidden rf device that can exfiltrate data over a wireless signal, effectively jumping across that air gap in place.

It details how the NSA captured hardware shipments in transit and replaced them with the firewalk compromised hardware and then let the shipments proceed to their intended recipient.

It's an 11 minute video, and a decent watch.

[–] socsa@piefed.social 1 points 2 months ago

They put an SDR into Ethernet ports. This let them inject exploits and exfil data across air gaps using local agents or proxies who merely got close to the device.

[–] kugmo@sh.itjust.works -1 points 2 months ago

Work for the NSA, seize package of a computer from person you want to spy on, install RJ45 port with hardware backdoor that also has RF emitter, gather the intercepted packets with RF receiver within distance.

[–] index@sh.itjust.works -1 points 2 months ago

"Came out in 2008 and leaked in 2013"

17 years ago they had this...