

Especially important is knowing the different social engineering strategies used in phishing and spear phishing attacks.

Exposure can open up a system to compromise, and given that these systems most likely hold critical information, this can be disastrous. The top priority for protecting air-gapped systems is to ensure that it is never connected to the internet.Here are some strategies that organizations can implement to ensure that their air-gapped systems are secured: Protecting air-gapped systems involves a multilayered approach to security that starts from the physical setup of the system to the people that interact with it on a regular basis. How IT professionals can secure air-gapped systems By tricking an individual with access to the air-gapped network into inserting a physical drive, an attacker can bypass all the complicated steps needed to pull off an attack successfully. While these kinds of attacks are certainly possible, attacks on air-gapped systems will more likely involve a tactic that has proven to be effective in nearly all kinds of malware attacks: social engineering. They created a malware that could “bridge” air-gapped systems via the infrared capabilities of compromised surveillance cameras. A determined cybercriminal can also use unconventional attack methods to infiltrate air-gapped systems- researchers from Israel's Ben-Gurion University of the Negev and Shamoon College of Engineering demonstrated how this can be done. One example of how this can be accomplished is through the use the use of sound, which has been proven effective for transmitting data-the use of the system’s computer fans and radio frequency emissions from USB connectors are more extreme examples of this. Attackers can even use simple worms that spread via removable drives to infect an air-gapped computer.Ĭompromising an air-gapped system could allow an attacker to steal data from the system via data exfiltration. A tool such as the recently revealed Brutal Kangaroo malware, which was apparently created by the CIA, could be used to attack air-gapped systems as well as create a covert network for data exchange.

Once the targeted victim uses a USB drive on the infected system and then uses it to transfer data to the air-gapped system, the malware will then be able to move and infect it. However, an attacker does not have to be physically present to infect an air-gapped computer, as they can also first infect a system connected to the organization’s network, possibly through an accessible USB port. However, most disconnected systems will also be largely secure, meaning it will take special circumstances-and most certainly an insider-to infect it. Physical access, such as from inserting a USB drive, is the simplest and most straightforward way to infect an air-gapped computer. Although it may seem that an air-gapped system is safe from external attacks, there can still be instances where even a disconnected computer can be targeted.
