How Hackers Could Wirelessly Bug Your Office

932,691
0
Published 2016-07-29
You think about securing your laptop, but what about your desk phone, monitor, or printer?

In the second episode of Can I Hack It?, made possible by Mr Robot on Amazon Prime, white hat hacker Ang Cui demonstrates hacks on “embedded devices”—objects that contain computing systems but that you wouldn’t necessarily think of as computers.

At his office in New York, Cui shows us how he can turn an office phone or printer into a bugging device using a piece of malware he calls “funtenna.” This exploit makes the equipment transmit data over radio frequencies so it can be picked up by an antenna—without the hacker ever having to go near the device.

It’s a pretty high-level hack, but as Cui says, if he’s thought of it, you can imagine someone else has.

Click here to watch Mr. Robot on Amazon Prime: amzn.to/29zli1w

Subscribe to MOTHERBOARD: bit.ly/Subscribe-To-MOTHERBOARD

Follow MOTHERBOARD
Facebook: www.facebook.com/motherboardtv
Twitter: twitter.com/motherboard
Tumblr: motherboardtv.tumblr.com/
Instagram: instagram.com/motherboardtv
More videos from the VICE network: www.fb.com/vicevideo

All Comments (21)
  • @maxhale2382
    I think the most important part of hacking is having as many windows open as possible. Preferably with scrolling multicolored text.
  • @qwertywtflol
    Sponsored by Amazon, the biggest collector of customer/consumer data on the planet.
  • @bdeflorence
    It's called RF imposition. The Russians used this technique to bug the US Moscow embassy in the 70's. At the time, it required a very large antenna to collect the signals. Basically, the vibrations of the molecule of air (i.e. sound) will make any object in the room also vibrate, and that includes electronic circuit boards. As per Maxwell equations, as mentioned by the chap, a vibrating electronic circuit board, even if switched off, will generate an electronic signal. It then becomes just a matter of collecting that signal.
  • @Aaron-dt3xz
    I like how the thumbnail just says motherboard with a guy pointing to a motherboard
  • @sapphiro
    You can bug me all you want, I have put a sticker tape on my phone's camera. All you can get is me moaning.
  • @jason-ge5nr
    If this guy figured it out what has the NSA been able to do for the last 15 years
  • @adrianmego1
    The critical piece of information he gave is that there has to be an entry point into your network, and for him it was a CV containing malware. 80% of attacks are initiated this way, so - secure your endpoints or get decent mail service guys and gals...
  • @8224shivaram
    This is one of the key reasons why following PCB design guidelines For Reduced EMI is so critical :P
  • what they are doing is super underappreciated. wired devices with embedded systems really need to start insulating components so that no information leaves the device wirelessly
  • @ibimon
    By the way this is second time I see red balloon mentioned in security tech, looks like they're about to become pretty big. Good luck guys.
  • Six years later and this exploit has yet to be seen in the wild
  • @nickigna
    Feels like Motherboard is cranking up the paranoia on "everything hackers".
  • @Plur307
    Properly shielding electronics would make them not vulnerable to this hack. But the hack is still quite clever. All it takes is a thin sheet metal cover over the circuit boards to absorb almost all the emitted radio waves.
  • @Flankymanga
    You could say that every electronic device has it.... because what they are doing is turning an PCB copper path into transmitting antenna by quickly changing voltages and generating EM field. But there is a catch... you would not normally have connected a printer and a VoIP phone on the same corporate network. Meaning it has to go through either managed switch or a router - in which case there is a high chance that there would be a firewall rule to drop the packet.
  • @TheTarrMan
    So is this hack going to be involved one of the next episodes of Mr Robot? Pretty cool!
  • @RustyB5000
    2 hours after this video was posted that guy disappeared from outside his apartment.
  • @dkipu266
    You could build all this, or pay Google or Amazon for the feeds they continuously collect from devices you use everyday. Even using a VPN Service is of marginal benefit if you’re going to authenticate to any of your online accounts, as those accounts and your devices registering to networks are going identify you when you authenticate. That said, what this team is doing is really important work, as these devices are very vulnerable, and for all of the dollars we spend securing PC’s and Tablets, a good pen test will show you how vulnerable your voice and printing devices are as well...this team takes it to a level.
  • @NetIncarnate
    Trust these guys to reference Neuromancer! Excellent work.
  • @gwengold1342
    I would work for this guy for free just to gain knowledge