On the other end, the receiver has to run a software that interprets the signals.
This portable application (also available with an installer package) continuously displays hard drive load and increases the blink rate, as hard disk load intensifies.
The malware just needs to perform a series of read/write operations to the disk in order to make the LED blinking at specific frequencies. Free HDD Led works as an alternative to the physical disk light to view hard disk load from multiple system partitions and external drives. The experts explained that it is very simple to control the hard disk LED due to the lack of generic API to control it. The researchers published a video PoC of the technique in which a drone equipped with a receiver exfiltrated the data by flying out to a window through which the infected disk was visible and the LED was blinking. In the following table are reported the Maximum bandwidth of different receivers: The efficiency of the exfiltration technique depends on the abilities of the receiver components, it might be a Digital SLR or high-end security camera (15 bps), a GoPro-level camera (up to 120 bps), a Webcam or Google Glass Explorer (also 15 bps), or a smartphone camera (up to 60 bps). Can you check if in Advanced>Device>Sata near HDD Activity LED you can see field labeled: M.2 PCIe SSD LED If yes, please enable this function. Of course, the attackers need to infect the target machine prior to the transmission. “It’s possible for the attacker to do such fast blinking that a human never sees it,” explained Guri. The attackers can force the LEDs to blink at a rate of up to 6,000 times per second, which is indiscernible for human’s eyes, but potentially readable for light sensors. The malware is able to transmit information forcing the LED indicators to blink, the group of experts led by the notorious researcher Mordechai Guri was able to flash the LED at around 5,800 on/off cycles per second as a data channel, a speed that allows transferring 4 Kbps.
While it not meant to be, but it can be used to. “Compared to other LED methods, our method is unique, because it is also covert – the HDD activity LED routinely flickers frequently, and therefore the user may not be suspicious to changes in its activity.” A hard drive activity light is a small LED light that lights up whenever the hard drive is being accessed. Sensitive information can be encoded and leaked over the LED signals, which can then be received remotely by different kinds of cameras and light sensors.” reads the paper published by the researchers. “We show that a malware can indirectly control the HDD LED, turning it on and off rapidly (up to 5800 blinks per second) – a rate that exceeds the visual perception capabilities of humans. Now a group of researchers from Ben-Gurion University of the Negev’s Cyber Security Research Center has devised a new technique to exfiltrate data from a machine by using a malware that controls hard drive LEDs.