{"id":22484,"date":"2025-06-17T02:00:38","date_gmt":"2025-06-17T05:00:38","guid":{"rendered":"https:\/\/www.ethicalhacker.com.br\/site\/?p=22484"},"modified":"2025-06-16T23:07:58","modified_gmt":"2025-06-17T02:07:58","slug":"explorando-exemplos-reais-de-ataques-a-sistemas-air-gapped","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2025\/06\/exploits\/explorando-exemplos-reais-de-ataques-a-sistemas-air-gapped\/","title":{"rendered":"Explorando exemplos reais de ataques a sistemas air-gapped"},"content":{"rendered":"\n<p style=\"text-align: justify;\" data-start=\"76\" data-end=\"576\">Sistemas <em data-start=\"85\" data-end=\"97\">air-gapped<\/em> s\u00e3o amplamente utilizados em ambientes, onde a seguran\u00e7a da informa\u00e7\u00e3o \u00e9 cr\u00edtica, como em setores militares, laborat\u00f3rios de pesquisa, institui\u00e7\u00f5es financeiras e infraestrutura governamental. Ao manter computadores completamente desconectados da internet e de redes externas, esses ambientes visam proteger dados sens\u00edveis contra amea\u00e7as cibern\u00e9ticas. No entanto, como demonstrado por pesquisas recentes como o <em data-start=\"509\" data-end=\"522\">SmartAttack<\/em>, o isolamento f\u00edsico n\u00e3o garante invulnerabilidade.<\/p>\n<p data-start=\"76\" data-end=\"576\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-start=\"578\" data-end=\"1056\">Cibercriminosos e pesquisadores de seguran\u00e7a t\u00eam revelado uma variedade de t\u00e9cnicas engenhosas de exfiltra\u00e7\u00e3o de dados que burlam o isolamento f\u00edsico, utilizando canais de comunica\u00e7\u00e3o n\u00e3o convencionais, como luz, som, radiofrequ\u00eancia, temperatura e at\u00e9 varia\u00e7\u00f5es de energia el\u00e9trica. Essas abordagens criam o que chamamos de <em data-start=\"904\" data-end=\"920\">canais ocultos<\/em> ou <em data-start=\"924\" data-end=\"941\">covert channels<\/em>, m\u00e9todos alternativos de vazamento de informa\u00e7\u00f5es que passam despercebidos por sistemas tradicionais de seguran\u00e7a.<\/p>\n<p data-start=\"578\" data-end=\"1056\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-start=\"1058\" data-end=\"1580\">Neste contexto, apresentamos uma s\u00e9rie de exemplos pr\u00e1ticos que ilustram como ataques contra sistemas air-gapped podem ocorrer na vida real. Cada exemplo foi baseado em t\u00e9cnicas j\u00e1 demonstradas academicamente ou utilizadas por agentes maliciosos em situa\u00e7\u00f5es de espionagem digital. Com esses casos, buscamos n\u00e3o apenas informar, mas tamb\u00e9m conscientizar sobre a necessidade de uma abordagem multidimensional para a seguran\u00e7a cibern\u00e9tica, que leve em conta tanto os riscos digitais quanto os f\u00edsicos, humanos e ambientais.<\/p>\n<p data-start=\"1058\" data-end=\"1580\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-start=\"1582\" data-end=\"1971\" data-is-last-node=\"\" data-is-only-node=\"\">A seguir, exploraremos situa\u00e7\u00f5es realistas nas quais smartwatches, c\u00e2meras, ventoinhas, placas de v\u00eddeo e at\u00e9 tomadas el\u00e9tricas se tornam aliados silenciosos na exfiltra\u00e7\u00e3o de dados protegidos. Esses cen\u00e1rios evidenciam que, em um mundo cada vez mais conectado por dispositivos inteligentes, o verdadeiro per\u00edmetro de seguran\u00e7a pode estar no pulso, no bolso ou at\u00e9 na parede ao nosso lado.<\/p>\n<p data-start=\"1582\" data-end=\"1971\" data-is-last-node=\"\" data-is-only-node=\"\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-start=\"0\" data-end=\"356\">Estes exemplos pr\u00e1ticos e realistas que ilustram como essas amea\u00e7as podem acontecer na vida real, ajudam a entender como os ataques poderiam ser explorados por cibercriminosos, mesmo em ambientes que seguem boas pr\u00e1ticas de isolamento.<\/p>\n<p data-start=\"0\" data-end=\"356\">\u00a0<\/p>\n<p data-start=\"363\" data-end=\"437\"><strong data-start=\"369\" data-end=\"437\">Exemplo 1 \u2013 Vazamento de dados em uma sala segura com Smartwatch<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"438\" data-end=\"545\"><strong data-start=\"438\" data-end=\"449\">Cen\u00e1rio<\/strong>: Um laborat\u00f3rio de pesquisa militar usa computadores air-gapped para processar dados sigilosos.<\/p>\n<p data-start=\"547\" data-end=\"562\"><strong data-start=\"547\" data-end=\"559\">Situa\u00e7\u00e3o<\/strong>:<\/p>\n<ul data-start=\"563\" data-end=\"781\">\n<li data-start=\"563\" data-end=\"656\">\n<p data-start=\"565\" data-end=\"656\">Um estagi\u00e1rio autorizado a entrar na sala segura usa um smartwatch com microfone ativado.<\/p>\n<\/li>\n<li data-start=\"657\" data-end=\"781\">\n<p style=\"text-align: justify;\" data-start=\"659\" data-end=\"781\">Um funcion\u00e1rio mal-intencionado previamente infectou um dos computadores com malware via pen drive durante uma manuten\u00e7\u00e3o.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"783\" data-end=\"804\"><strong data-start=\"783\" data-end=\"801\">O que acontece<\/strong>:<\/p>\n<ul data-start=\"805\" data-end=\"1150\">\n<li data-start=\"805\" data-end=\"898\">\n<p data-start=\"807\" data-end=\"898\">O malware coleta chaves criptogr\u00e1ficas utilizadas para acesso a documentos confidenciais.<\/p>\n<\/li>\n<li data-start=\"899\" data-end=\"1016\">\n<p style=\"text-align: justify;\" data-start=\"901\" data-end=\"1016\">Os dados s\u00e3o codificados em sinais ultrass\u00f4nicos (inaud\u00edveis) e transmitidos pelo alto-falante do computador.<\/p>\n<\/li>\n<li data-start=\"1017\" data-end=\"1150\">\n<p style=\"text-align: justify;\" data-start=\"1019\" data-end=\"1150\">O smartwatch capta o sinal, decodifica as informa\u00e7\u00f5es e envia automaticamente os dados para o atacante usando a rede 4G do rel\u00f3gio.<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"1157\" data-end=\"1214\">\u00a0<\/h3>\n<p data-start=\"1157\" data-end=\"1214\"><strong data-start=\"1163\" data-end=\"1214\">Exemplo 2 \u2013 Espionagem Industrial via LED-it-Go<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"1215\" data-end=\"1346\"><strong data-start=\"1215\" data-end=\"1226\">Cen\u00e1rio<\/strong>: Uma empresa de tecnologia desenvolve prot\u00f3tipos de hardware inovador e utiliza sistemas isolados para manter o sigilo.<\/p>\n<p data-start=\"1348\" data-end=\"1363\"><strong data-start=\"1348\" data-end=\"1360\">Situa\u00e7\u00e3o<\/strong>:<\/p>\n<ul data-start=\"1364\" data-end=\"1557\">\n<li data-start=\"1364\" data-end=\"1437\">\n<p data-start=\"1366\" data-end=\"1437\">Um t\u00e9cnico de manuten\u00e7\u00e3o instala malware em um computador air-gapped.<\/p>\n<\/li>\n<li data-start=\"1438\" data-end=\"1557\">\n<p style=\"text-align: justify;\" data-start=\"1440\" data-end=\"1557\">Um visitante autorizado entra na sala com um celular no bolso, apontando discretamente para o gabinete do computador.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1559\" data-end=\"1580\"><strong data-start=\"1559\" data-end=\"1577\">O que acontece<\/strong>:<\/p>\n<ul data-start=\"1581\" data-end=\"1795\">\n<li data-start=\"1581\" data-end=\"1668\">\n<p data-start=\"1583\" data-end=\"1668\">O malware controla o LED do HD para piscar em padr\u00f5es bin\u00e1rios com alta frequ\u00eancia.<\/p>\n<\/li>\n<li data-start=\"1669\" data-end=\"1713\">\n<p data-start=\"1671\" data-end=\"1713\">O smartphone grava os flashes por v\u00eddeo.<\/p>\n<\/li>\n<li data-start=\"1714\" data-end=\"1795\">\n<p data-start=\"1716\" data-end=\"1795\">Fora da empresa, o atacante analisa o v\u00eddeo e reconstr\u00f3i os dados transmitidos.<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p data-start=\"1802\" data-end=\"1875\"><strong data-start=\"1808\" data-end=\"1875\">Exemplo 3 \u2013 Vazamento de informa\u00e7\u00f5es por ventoinha (Fansmitter)<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"1876\" data-end=\"1986\"><strong data-start=\"1876\" data-end=\"1887\">Cen\u00e1rio<\/strong>: Uma empresa financeira processa opera\u00e7\u00f5es de clientes usando computadores desconectados de redes.<\/p>\n<p data-start=\"1988\" data-end=\"2003\"><strong data-start=\"1988\" data-end=\"2000\">Situa\u00e7\u00e3o<\/strong>:<\/p>\n<ul data-start=\"2004\" data-end=\"2229\">\n<li data-start=\"2004\" data-end=\"2111\">\n<p style=\"text-align: justify;\" data-start=\"2006\" data-end=\"2111\">Um hacker compromete o sistema air-gapped com um malware que controla a velocidade da ventoinha da CPU.<\/p>\n<\/li>\n<li data-start=\"2112\" data-end=\"2229\">\n<p style=\"text-align: justify;\" data-start=\"2114\" data-end=\"2229\">Um funcion\u00e1rio do setor, sem saber do ataque, deixa seu notebook pessoal ligado sobre a mesa pr\u00f3xima ao computador.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"2231\" data-end=\"2252\"><strong data-start=\"2231\" data-end=\"2249\">O que acontece<\/strong>:<\/p>\n<ul data-start=\"2253\" data-end=\"2492\">\n<li data-start=\"2253\" data-end=\"2352\">\n<p data-start=\"2255\" data-end=\"2352\">A ventoinha do computador transmite dados sens\u00edveis por varia\u00e7\u00f5es sonoras quase impercept\u00edveis.<\/p>\n<\/li>\n<li data-start=\"2353\" data-end=\"2398\">\n<p data-start=\"2355\" data-end=\"2398\">O microfone do notebook registra os sons.<\/p>\n<\/li>\n<li data-start=\"2399\" data-end=\"2492\">\n<p data-start=\"2401\" data-end=\"2492\">Quando o notebook se conecta \u00e0 internet em outro local, envia os dados gravados ao invasor.<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p data-start=\"2499\" data-end=\"2571\"><strong data-start=\"2505\" data-end=\"2571\">Exemplo 4 \u2013 Comprometimento com PowerHammer pela Rede El\u00e9trica<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"2572\" data-end=\"2689\"><strong data-start=\"2572\" data-end=\"2583\">Cen\u00e1rio<\/strong>: Um centro de dados do governo utiliza m\u00e1quinas air-gapped alimentadas por circuitos el\u00e9tricos dedicados.<\/p>\n<p data-start=\"2691\" data-end=\"2706\"><strong data-start=\"2691\" data-end=\"2703\">Situa\u00e7\u00e3o<\/strong>:<\/p>\n<ul data-start=\"2707\" data-end=\"2942\">\n<li data-start=\"2707\" data-end=\"2832\">\n<p style=\"text-align: justify;\" data-start=\"2709\" data-end=\"2832\">Um engenheiro de manuten\u00e7\u00e3o instala um malware que modula dados sens\u00edveis por varia\u00e7\u00f5es no consumo de energia da m\u00e1quina.<\/p>\n<\/li>\n<li data-start=\"2833\" data-end=\"2942\">\n<p style=\"text-align: justify;\" data-start=\"2835\" data-end=\"2942\">Outro computador, conectado \u00e0 mesma rede el\u00e9trica (fora da zona segura), monitora e grava essas flutua\u00e7\u00f5es.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"2944\" data-end=\"2965\"><strong data-start=\"2944\" data-end=\"2962\">O que acontece<\/strong>:<\/p>\n<ul data-start=\"2966\" data-end=\"3125\">\n<li data-start=\"2966\" data-end=\"3058\">\n<p data-start=\"2968\" data-end=\"3058\">O invasor analisa as flutua\u00e7\u00f5es de corrente el\u00e9trica e reconstr\u00f3i os dados transmitidos.<\/p>\n<\/li>\n<li data-start=\"3059\" data-end=\"3125\">\n<p data-start=\"3061\" data-end=\"3125\">Nenhuma rede de dados foi usada, apenas a energia el\u00e9trica.<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p data-start=\"3132\" data-end=\"3202\"><strong data-start=\"3138\" data-end=\"3202\">Exemplo 5 \u2013 Sinal FM para espionagem corporativa (AirHopper)<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"3203\" data-end=\"3319\"><strong data-start=\"3203\" data-end=\"3214\">Cen\u00e1rio<\/strong>: Um laborat\u00f3rio de biotecnologia trabalha com informa\u00e7\u00f5es sigilosas sobre vacinas em um sistema isolado.<\/p>\n<p data-start=\"3321\" data-end=\"3336\"><strong data-start=\"3321\" data-end=\"3333\">Situa\u00e7\u00e3o<\/strong>:<\/p>\n<ul data-start=\"3337\" data-end=\"3499\">\n<li data-start=\"3337\" data-end=\"3395\">\n<p data-start=\"3339\" data-end=\"3395\">Um malware na GPU converte dados em ondas de r\u00e1dio FM.<\/p>\n<\/li>\n<li data-start=\"3396\" data-end=\"3499\">\n<p style=\"text-align: justify;\" data-start=\"3398\" data-end=\"3499\">Um funcion\u00e1rio utiliza fones com r\u00e1dio FM embutido, que sintoniza automaticamente a frequ\u00eancia usada.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"3501\" data-end=\"3522\"><strong data-start=\"3501\" data-end=\"3519\">O que acontece<\/strong>:<\/p>\n<ul data-start=\"3523\" data-end=\"3684\">\n<li data-start=\"3523\" data-end=\"3574\">\n<p data-start=\"3525\" data-end=\"3574\">Os fones captam a transmiss\u00e3o da placa gr\u00e1fica.<\/p>\n<\/li>\n<li data-start=\"3575\" data-end=\"3684\">\n<p data-start=\"3577\" data-end=\"3684\">Mais tarde, ao conectar o fone a um computador dom\u00e9stico, um app extrai e envia os dados ao cibercriminoso.<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p data-start=\"3691\" data-end=\"3760\"><strong data-start=\"3697\" data-end=\"3760\">Exemplo 6 \u2013 Ataque misturado: Ultrassom + LED + Temperatura<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"3761\" data-end=\"3918\"><strong data-start=\"3761\" data-end=\"3772\">Cen\u00e1rio<\/strong>: Uma instala\u00e7\u00e3o de pesquisa nuclear utiliza diferentes camadas de seguran\u00e7a, inclusive salas com controle t\u00e9rmico e bloqueio de sinal de celular.<\/p>\n<p data-start=\"3920\" data-end=\"3935\"><strong data-start=\"3920\" data-end=\"3932\">Situa\u00e7\u00e3o<\/strong>:<\/p>\n<ul data-start=\"3936\" data-end=\"4137\">\n<li data-start=\"3936\" data-end=\"4137\">\n<p data-start=\"3938\" data-end=\"3983\">Um ataque sofisticado combina tr\u00eas m\u00e9todos:<\/p>\n<ul data-start=\"3986\" data-end=\"4137\">\n<li data-start=\"3986\" data-end=\"4020\">\n<p data-start=\"3989\" data-end=\"4020\">Ultrassom pelos alto-falantes<\/p>\n<\/li>\n<li data-start=\"4023\" data-end=\"4058\">\n<p data-start=\"4026\" data-end=\"4058\">Sinal visual pelo LED da fonte<\/p>\n<\/li>\n<li data-start=\"4061\" data-end=\"4137\">\n<p data-start=\"4064\" data-end=\"4137\">Pequenos aumentos de temperatura para comunica\u00e7\u00e3o entre m\u00e1quinas pr\u00f3ximas<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p data-start=\"4139\" data-end=\"4160\"><strong data-start=\"4139\" data-end=\"4157\">O que acontece<\/strong>:<\/p>\n<ul data-start=\"4161\" data-end=\"4366\">\n<li data-start=\"4161\" data-end=\"4288\">\n<p style=\"text-align: justify;\" data-start=\"4163\" data-end=\"4288\">Um smartwatch e um sensor t\u00e9rmico embutido em um rel\u00f3gio de parede (comprometido via IoT) atuam como receptores combinados.<\/p>\n<\/li>\n<li data-start=\"4289\" data-end=\"4366\">\n<p data-start=\"4291\" data-end=\"4366\">O ataque \u00e9 quase imposs\u00edvel de detectar com uma \u00fanica solu\u00e7\u00e3o de seguran\u00e7a.<\/p>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p data-start=\"4373\" data-end=\"4402\"><strong data-start=\"4380\" data-end=\"4402\">Li\u00e7\u00e3o dos Exemplos<\/strong><\/p>\n<p style=\"text-align: justify;\" data-start=\"4404\" data-end=\"4675\">Esses exemplos mostram que n\u00e3o \u00e9 necess\u00e1rio ter acesso direto \u00e0 internet para vazar dados. Com criatividade e conhecimento t\u00e9cnico, cibercriminosos podem explorar canais <em data-start=\"4582\" data-end=\"4596\">alternativos<\/em> e <em data-start=\"4599\" data-end=\"4608\">ocultos<\/em>, desafiando at\u00e9 mesmo ambientes considerados extremamente seguros.<\/p>\n<p data-start=\"4404\" data-end=\"4675\">\u00a0<\/p>\n<p style=\"text-align: justify;\" data-start=\"0\" data-end=\"37\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Apresentamos seis refer\u00eancias bibliogr\u00e1ficas s\u00f3lidas e atualizadas, incluindo artigos acad\u00eamicos e confer\u00eancias, que abordam as t\u00e9cnicas de exfiltra\u00e7\u00e3o de dados em sistemas air-gapped, como o <strong data-start=\"190\" data-end=\"205\">SmartAttack<\/strong> e outras comunica\u00e7\u00f5es encobertas:<\/span><\/p>\n<ul data-start=\"39\" data-end=\"811\">\n<li data-start=\"39\" data-end=\"163\">\n<p data-start=\"42\" data-end=\"81\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"18\" data-is-only-node=\"\">Mordechai Guri<\/strong>, <em data-start=\"20\" data-end=\"66\">SmartAttack: Air\u2011Gap Attack via Smartwatches<\/em>, arXiv, 2025.<\/span><\/p>\n<ul data-start=\"85\" data-end=\"163\">\n<li data-start=\"85\" data-end=\"163\">\n<p style=\"text-align: justify;\" data-start=\"87\" data-end=\"163\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Pesquisa pioneira que descreve o uso de smartwatches e sinais ultrass\u00f4nicos para extrair dados de sistemas isolados<\/span> <span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]\"><a class=\"flex h-4.5 overflow-hidden rounded-xl px-2 text-[0.5625em] font-medium text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]! transition-colors duration-150 ease-in-out\" href=\"https:\/\/arxiv.org\/abs\/2506.08866?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between absolute\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">arxiv.org<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+15<\/span><\/span><span class=\"flex h-4 w-full items-center justify-between\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">arxiv.org<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+15<\/span><\/span><span class=\"flex h-4 w-full items-center justify-between absolute\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">sciencedirect.com<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+15<\/span><\/span><\/span><\/a><\/span><\/span>.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"165\" data-end=\"289\">\n<p data-start=\"168\" data-end=\"207\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"26\" data-is-only-node=\"\">M. Hanspach &amp; M. Goetz<\/strong>, <em data-start=\"28\" data-end=\"71\">On Covert Acoustical Mesh Networks in Air<\/em>, arXiv, 2014.<\/span><\/p>\n<ul data-start=\"211\" data-end=\"289\">\n<li data-start=\"211\" data-end=\"289\">\n<p style=\"text-align: justify;\" data-start=\"213\" data-end=\"289\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Explora redes mesh ac\u00fasticas que utilizam sinais ultrass\u00f4nicos para comunica\u00e7\u00e3o encoberta entre sistemas air-gapped<\/span> <span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]\"><a class=\"flex h-4.5 overflow-hidden rounded-xl px-2 text-[0.5625em] font-medium text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]! transition-colors duration-150 ease-in-out\" href=\"https:\/\/arxiv.org\/abs\/1406.1213?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between overflow-hidden\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">arxiv.org<\/span><\/span><\/span><\/a><\/span><\/span>.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"291\" data-end=\"415\">\n<p style=\"text-align: justify;\" data-start=\"294\" data-end=\"333\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"45\" data-is-only-node=\"\">M. Guri, O. Hasson, G. Kedma &amp; Y. Elovici<\/strong>, <em data-start=\"47\" data-end=\"118\">VisiSploit: An Optical Covert\u2011Channel to Leak Data through an Air\u2011Gap<\/em>, arXiv, 2016.<\/span><\/p>\n<ul data-start=\"337\" data-end=\"415\">\n<li data-start=\"337\" data-end=\"415\">\n<p data-start=\"339\" data-end=\"415\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Demonstra exfiltra\u00e7\u00e3o de dados por meio de flicker impercept\u00edvel em telas (LCD) para c\u00e2meras pr\u00f3ximas<\/span> <span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]\"><a class=\"flex h-4.5 overflow-hidden rounded-xl px-2 text-[0.5625em] font-medium text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]! transition-colors duration-150 ease-in-out\" href=\"https:\/\/arxiv.org\/abs\/1607.03946?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between absolute\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">arxiv.org<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+13<\/span><\/span><span class=\"flex h-4 w-full items-center justify-between\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">arxiv.org<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+13<\/span><\/span><span class=\"flex h-4 w-full items-center justify-between absolute\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">en.wikipedia.org<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+13<\/span><\/span><\/span><\/a><\/span><\/span>.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"417\" data-end=\"547\">\n<p style=\"text-align: justify;\" data-start=\"420\" data-end=\"461\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"46\" data-is-only-node=\"\">M. Guri, M. Monitz, Y. Mirski &amp; Y. Elovici<\/strong>, <em data-start=\"48\" data-end=\"143\">BitWhisper: Covert Signaling Channel between Air\u2011Gapped Computers using Thermal Manipulations<\/em>, arXiv, 2015.<\/span><\/p>\n<ul data-start=\"465\" data-end=\"547\">\n<li data-start=\"465\" data-end=\"547\">\n<p style=\"text-align: justify;\" data-start=\"467\" data-end=\"547\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Apresenta comunica\u00e7\u00e3o bidirecional entre computadores isolados via manipula\u00e7\u00e3o t\u00e9rmica<\/span> <span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]\"><a class=\"flex h-4.5 overflow-hidden rounded-xl px-2 text-[0.5625em] font-medium text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]! transition-colors duration-150 ease-in-out\" href=\"https:\/\/arxiv.org\/abs\/1503.07919?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between absolute\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">link.springer.com<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+15<\/span><\/span><span class=\"flex h-4 w-full items-center justify-between\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">arxiv.org<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+15<\/span><\/span><span class=\"flex h-4 w-full items-center justify-between absolute\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">dl.acm.org<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+15<\/span><\/span><\/span><\/a><\/span><\/span>.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"549\" data-end=\"679\">\n<p data-start=\"552\" data-end=\"593\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"52\" data-is-only-node=\"\">M. Guri, Y. Solewicz, A. Daidakulov &amp; Y. Elovici<\/strong>, <em data-start=\"54\" data-end=\"169\">MOSQUITO: Covert Ultrasonic Transmissions between Two Air\u2011Gapped Computers using Speaker\u2011to\u2011Speaker Communication<\/em>, arXiv, 2018.<\/span><\/p>\n<ul data-start=\"597\" data-end=\"679\">\n<li data-start=\"597\" data-end=\"679\">\n<p data-start=\"599\" data-end=\"679\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Aborda transmiss\u00f5es ultrass\u00f4nicas entre alto\u2011falantes reversos em sistemas sem microfone<\/span> <span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]\"><a class=\"flex h-4.5 overflow-hidden rounded-xl px-2 text-[0.5625em] font-medium text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]! transition-colors duration-150 ease-in-out\" href=\"https:\/\/arxiv.org\/abs\/1803.03422?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between absolute\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">link.springer.com<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+6<\/span><\/span><span class=\"flex h-4 w-full items-center justify-between\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">arxiv.org<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+6<\/span><\/span><span class=\"flex h-4 w-full items-center justify-between absolute\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">en.wikipedia.org<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+6<\/span><\/span><\/span><\/a><\/span><\/span>.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"681\" data-end=\"811\">\n<p data-start=\"684\" data-end=\"725\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"37\" data-is-only-node=\"\">R. Sherry, E. Bayne &amp; D. McLuskie<\/strong>, <em data-start=\"39\" data-end=\"112\">Near\u2011Ultrasonic Covert Channels Using Software\u2011Defined Radio Techniques<\/em>, International Conference on Cybersecurity, 2023.<\/span><\/p>\n<ul data-start=\"729\" data-end=\"811\">\n<li data-start=\"729\" data-end=\"811\">\n<p data-start=\"731\" data-end=\"811\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Estudo recente que aprimora canais ultrass\u00f4nicos com t\u00e9cnicas de r\u00e1dio definido por software para maior efici\u00eancia<\/span> <span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]\"><a class=\"flex h-4.5 overflow-hidden rounded-xl px-2 text-[0.5625em] font-medium text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]! transition-colors duration-150 ease-in-out\" href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-19-6414-5_10?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">link.springer.com<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+1<\/span><\/span><span class=\"flex h-4 w-full items-center justify-between absolute\"><span class=\"max-w-full grow truncate overflow-hidden text-center\">mdpi.com<\/span><span class=\"-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]\">+1<\/span><\/span><\/span><\/a><\/span><\/span>.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p data-start=\"1582\" data-end=\"1971\" data-is-last-node=\"\" data-is-only-node=\"\">\u00a0<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Sistemas air-gapped s\u00e3o amplamente utilizados em ambientes, onde a seguran\u00e7a da informa\u00e7\u00e3o \u00e9 cr\u00edtica, como em setores militares, laborat\u00f3rios de pesquisa, institui\u00e7\u00f5es financeiras e infraestrutura governamental. Ao manter computadores completamente desconectados da internet e de redes externas, esses ambientes visam proteger dados sens\u00edveis contra amea\u00e7as cibern\u00e9ticas. No entanto, como demonstrado por pesquisas recentes como o [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":22488,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89,100,21,99],"tags":[],"class_list":["post-22484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-basico","category-diversos","category-exploits","category-novidades"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/22484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=22484"}],"version-history":[{"count":8,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/22484\/revisions"}],"predecessor-version":[{"id":22494,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/22484\/revisions\/22494"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/22488"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=22484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=22484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=22484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}