Using of Sound-Based Communication in the Process of Malware Distribution without Connectivity to Network Services Cover Image

Využitie komunikácie na báze zvuku v distribúcii škodlivého softvéru bez prístupu k sieťovým službám
Using of Sound-Based Communication in the Process of Malware Distribution without Connectivity to Network Services

Author(s): Ján Hurtuk
Subject(s): Business Economy / Management, ICT Information and Communications Technologies
Published by: Vysoká škola ekonomická v Praze

Summary/Abstract: Nowadays, in today's society based on a wide range of the technical and computing devices, it opens wide scope for misusing vulnerabilities of managing software, for destructive or enriching purposes. Daily are developed and deployed increasingly sophisticated malicious software, enabling the controlling of contested system or misusing sensitive information that infected system stores. One of the yet unexplored areas represent non-standard forms of communication used by such software, without access to network services, which could in the future represent a real threat to certain conditions. This article describes the design and subsequent implementation of a special type of malicious software that communications components are based on IRC (Internet Relay Chat) and in case of unavailability of the network connection takes into account the possibility of communicating infected computer systems by generating sound waves. It examines the various branches of behavior, based on ongoing conditions, its weaknesses, and finally points out the most important indicators of the effectiveness of its activities. The second part of the article is devoted to experimental methods of communication using sound waves with frequencies outside the audible range. The last part of the article presents the results of a questionnaire, which clearly point to the widespread use of equipment needed to run the branches of the virus, which is closely associated with the generation of signals with the help of sound waves, and thus point to the threat of the possible use of similarly based viruses in real operation. In conclusion, it is pointed out to the fact that a similar type of malware is fully usable under certain conditions, and it can be fully deployed in real environment.

  • Issue Year: 4/2015
  • Issue No: 3
  • Page Range: 288-301
  • Page Count: 14
  • Language: Slovak