Anonymous ID: 09f5ba March 9, 2019, 8:36 p.m. No.5602136   🗄️.is 🔗kun   >>2298

>>5601923

 

It was by design custom built for the target. These systems were not connected to the web.

 

https://searchsecurity.techtarget.com/essentialguide/How-air-gap-attacks-challenge-the-notion-of-secure-networks

 

Typically using speaker and mic on device.

I have more detail but I will need to gather

Anonymous ID: 09f5ba March 9, 2019, 8:45 p.m. No.5602298   🗄️.is 🔗kun

>>5602136

 

This tech has been available way before 2013.

 

https://www.extremetech.com/computing/171949-new-type-of-audio-malware-transmits-through-speakers-and-microphones

 

https://nakedsecurity.sophos.com/2018/03/14/speakers-can-be-used-to-jump-air-gapped-systems/