To make this website work, we log user data. By using Shephard's online services, you agree to our Privacy Policy, including cookie policy.

×
Open menu Search

New cyber threat offers potentially useful tool for militaries

28th October 2021 - 11:00 GMT | by Noemi Distefano in Manchester

RSS

Keysight Technologies has discovered a new technique for data exfiltration. (Photo: Keysight)

A novel method of data exfiltration could enable undetectable long-range communications in hostile battle zones.

Vulnerabilities in Medium Access Control (MAC) layer protocols can be exploited for undetectable long-range communications using third-party networks in a new technique dubbed Sparrow.

The technique also enables hackers or cyber attackers to leak data from compromised systems, said Reza Soosahabi, a researcher and engineer at US-based Keysight Technologies who discovered this novel method of data exfiltration.

Soosahabi explained to Shephard how Sparrow works: ‘This vulnerability is the result of having unprotected broadcast signals in MAC layer procedures that can be implicitly controlled by anonymous user devices.’

A MAC layer protocol is responsible for moving data packets from one network to another via

Already have an account? Log in

Want to keep reading this article?

Read this Article

Get access to this article with a Free Basic Account

  • Original curated content, daily across air, land and naval domains
  • 2 free stories per week
  • Personalised news alerts
  • Daily and weekly newsletters
Create account

Unlimited Access

Access to all our premium news as a Premium News 365 Member. Corporate subscriptions available.

  • Original curated content, daily across air, land and naval domains
  • 14-day free trial (cancel at any time)
  • Unlimited access to all published premium news
Start your free trial
Noemi Distefano

Author

Noemi Distefano


Noemi Distefano is Shephard Media's multimedia journalist. 

She joined the company in 2019, following a …

Read full bio

Share to

Linkedin