Warshipping
In computer network security, warshipping is using a physical package delivery service to deliver an attack vector to a target. This concept was first described in 2008 at the DEF CON hacking convention by Robert Graham and David Maynor as part of a talk entitled “Bringing Sexy Back: Breaking in with Style”, that included various penetration testing methods. In their implementation, an iPhone box was modified to include a larger battery, which powered a jailbroken iPhone. A first-generation iPhone was chosen for this attack based on the reported run-time of 5 days when coupled with an external battery, whereas newer 3G iPhones of the era would reportedly run for 1½ days. A social engineering pretext was described that would trick the recipient into believing they had won an iPhone, in order to explain the shipment.
The advancement of low-power electronics, thanks in part to maker culture, has greatly increased the effectiveness of this methodology as a credible method of attacking networks. In 2019, IBM X-Force Red coined the name “Warshipping” and described an attack platform that included several low-cost components that could be combined, shipped to targets, and controlled remotely for 2–3 weeks. A solar component was also described to allow the devices to run indefinitely.
Aspects of a modern warshipping attack include the following:
- Devices that are hidden from the recipient, potentially inside objects or inside the packaging material or box structure itself.
- Command and Control capability via a dependable communication medium. Most commonly this is provided via cellular modems.
- A power management strategy that allows the device to operate for weeks. Solar panels may be utilized to lengthen the run-time of the device.
- One or more devices used for the operational attack. These can include radios that are built for protocols such as Bluetooth, Wireless LAN, Near Field Communication, and software-defined radio devices for capturing multiple types of protocols. Microphones, cameras, and other capture devices could be included as well.
- Satellite navigation technology for reporting on the location of the device, allowing the activation of certain capabilities upon delivery to its target.
- Passive triangulation to get around GPS signal issues