Loading...
Data Leakage Resources
EXPLOITS & VULNERABILITY RESEARCH
Research into how to break data out of secure systems can inspire data leak protection systems to prevent the vulnerabilities revealed from being exploited DLP with a "black-hat" mentality: finding ways to break data out to find the holes. Most of these exploits rely on malware initially compromising the target machine, unlike the Data Border proof of concept ex-filtration tools which are based on a rogue insider with only normal non-elevated access wishing to bypass DLP; they do however illustrate the kinds of techniques and channels used to ex-filtrate the data.


Explores the unconventional methods attackers will begin to use for ex-filtrating data as devices become more secure, focussing on vibrations and sound to send signals up to 100 feet away.
Cached from here


A covert channel to leak of data from a computer by manipulating the movements of the hard drive's actuator to emit sounds without the presence of speakers or audio hardware.
Cached from here


Develops a covert channel using magnetic field changes induced by computer components in IO operations (movement of the hard drive magnetic head) and picked up by smartphone magnetic sensors.
Cached from here


Involves a modified USB storage device which ex-filtrated data covertly by blinking infra-red LEDs.
Cached from here


Data transfer over an air-gap by intentionally creating electromagnetic interference for use as a covert data channel and an FM receiving smart-phone as the untrusted system to which the data is ex-filtrated.
Cached from here


Use of a system fan to produce a signal from vibrations over which data can be transferred, even in systems which are air-gapped and the speakers have been removed to create an 'audio-gap'.
Cached from here


An Optical Covert-Channel to Leak Data through an Air-Gap via an LCD computer monitor using QR codes shown with low contrast or within fast flickering images to avoid detection with the human eye but still recover data by recording the screen with a camera.
Cached from here


An approach to covertly leak data (e.g., encryption keys, passwords and files) from highly secure or air-gapped networks via status LEDs in networking equipment like routers.
Cached from here


A novel infrared optical covert channel from a well-protected air-gapped network via a malicious infrared module implanted into a keyboard.
Cached from here


Data ex-filtration using system LEDs with binary frequency shift keying(B-FSK) replacing on-off keying(OOK) to improve the imperceptibility as covert communication.
Cached from here


AirHopper bridges the air-gap between an isolated network and nearby infected mobile phones using FM signals emitted from the graphics card.
Cached from here


Extensive discussion of out-of-band covert data leak channels (acoustic, light, seismic, magnetic, thermal, and radio-frequency), techniques, covertness and transfer rates.
Cached from here


Uses audio modulation/demodulation to exchange data between systems through air (originally designed for underwater) to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system.
Cached from here


Presents a method that insiders can use to facilitate data ex-filtration from air-gapped systems without using any modified hardware using inaudible sounds transmitted from the target machine’s speakers to transfer data to a nearby computer equipped with a microphone.
Cached from here


Malware that ex-filtrates data through an air-gap over cellular frequencies. Rogue software on an infected target computer modulates and transmits electromagnetic signals at cellular frequencies by invoking specific memory-related instructions and utilizing the multichannel memory architecture.
Cached from here


A discussion of data ex-filtration methods, their bandwidth, covertness and maliciousness.
Cached from here


A method of bridging the air-gap between adjacent compromised computers by using their heat emissions and built-in thermal sensors to create a covert bidirectional communication channel with no additional hardware.
Cached from here


A suite of tools that demonstrate the unauthorised infiltration and ex-filtration of code and data through secure networks; A way to download files through a screen (even via an ANSI terminal window) and a way to upload files through the keyboard interface.
Cached from here


Blinks the hard disk drive (HDD) activity LED which exists in most of today’s desktop PCs, laptops and servers to ex-filtrate data
Cached from here
DATA LOSS COST, RISK AND IMPACT SURVEYS
Assessments of the size, scale and impact of data loss on organisations.


Analyses the costs and impacts of cyber crime on businesses as the number of successful breaches per company each year rises: information loss represents the largest cost component.
Cached from here


Examines the costs and impacts of data breaches on businesses: the average total cost is decreasing but breaches are getting larger. Analysis breaks down by root cause, industry & country and shows factors influencing the cost.
Cached from here


Conducted to determine whether the publicity accorded data breaches subject to notification laws and related regulatory requirements has skewed the focus of organizations away from the theft or loss of their most critical information
Cached from here


Highlights the key risks of data theft to organisations and asserts that they are unprepared to protect what matters most to them
Cached from here


Examines common Cyber security myths, the impact of cyber crime on businesses and the future of business cyber security.
Cached from here
DLP MARKET COVERAGE REVIEW
Like most technology sectors nowadays, there is good market coverage by the review panels of Forrester and Gartner. They give interesting insight into the state of the market, trends and what the factors are to judge DLP solutions by as well as reviewing the offerings of the large enterprise providers.


Security and risk management leaders purchase on-premises enterprise DLP to solve for either organization wide regulatory compliance or to better protect specific types of intellectual property, while monitoring emerging cloud DLP capabilities. Gartner defines the DLP market as those technologies that, as a core function, provide remediation for data loss based on both content inspection and contextual analysis of data.
Cached from here


Evaluates and scores the 7 most significant data loss prevention suite providers. Symantec, Digital Guardian, and Forcepoint lead the pack. IP Protection, Info Management, And Endpoint Visibility And Control Are Key Differentiators
Cached from here


Examines the factors driving renewed interest in DLP, the state of DLP suite adoption, and the pros and cons of different approaches of bringing DLP capabilities into the enterprise.
Cached from here


Highlights the different channels of data loss and examines the varied landscape of vendors offering DLP capabilities today as a feature, standalone solution, or suite
Cached from here


Focuses on Data Loss Prevention technologies and the DLP marketplace at large. Provide an overview of select Data Loss Prevention (DLP) vendor technologies.
Cached from here