Pen-Type Transmitter
Micro Transmitter
Power Strip-Type Transmitter
Wireless Spy Chip
Wireless Spy Chip
Wireless Spy Chip
Camera Hidden in a Disposable Cup
Mobile Phone
Wireless Backdoor Hacking Security
  • All
  • Eavesdropping Security
  • Wireless Backdoor Hacking Security
  • Illegal Filming Security

Wireless Backdoor Hacking is done by inserting wireless
spy chips into IT equipment, either installed inside devices
or implanted during the supply chain process,
allowing infiltration into air-gapped servers, etc.

It is a new type of hacking method that uses wireless RF communication to remotely access target systems
(unauthorized intrusion from several kilometers away), steal data, or disrupt operations.
*Wireless Spy Chip: A micro chip capable of wireless data transmission and reception.
*Supply Chain Process: The stages of product design, manufacturing, delivery, installation, and maintenance.

·Wireless Backdoor Hacking Threats
Wireless backdoor hacking is difficult to counter due to
its stealthy nature and ability to evade detection.
Classification Reason
Detection Evasion Conventional security solutions fail to detect radio frequency-based communications
Stealth Designed to look like ordinary IT devices (e.g., USB, keyboards) or
components (e.g., motherboards), making them hard to detect
Security Blind Spots Originate from the manufacturer or through the distribution network
System Security Breaches Able to breach internal networks → Renders physical network segmentation ineffective
Challenges in
Real-Time Response
Requires real-time monitoring based on frequency rather than communication interception
Wireless Spy Chip
Wireless Spy Chip
Wireless Spy Chip
Wireless Spy Chip
Disguised as an Ordinary IT Equipment
The Threat Is Hidden In Plain Sight
  • Examples of Concealed Devices
    • These devices are designed to closely resemble ordinary IT devices, such as keyboards, USB drives, and mice,
      making them difficult to identify and allowing their use without awareness of the security risk.
  • Hacking Method
    • A wireless spy chip is covertly embedded inside the device, allowing it to communicate externally via radio.
      This enables remote access to the target device, exposing the user to security threats without their awareness.
  • Why is it Difficult to Respond?
    • ·Conventional security systems (e.g., WIPS, firewalls, and IDPS) monitor only wired and wireless traffic
      → Unable to detect radio frequency (RF) communications
    • ·Looks like an ordinary device, like an authorized piece of equipment
      → Undetectable to the naked eye or conventional security software
    • ·Installation on the internal network makes network segmentation ineffective.
·Wireless Backdoor Hacking Countermeasures
Radio frequency (RF) environment monitoring is a critical component
of wireless backdoor hacking security.
  • Wireless Backdoor Hacking Detection System Operations
    GITSN’s Wireless Backdoor Hacking Detection System is a high-performance security solution that monitors
    the 25kHz-3GHz frequency band 24/7 in real time, detecting abnormal frequencies and estimating their locations.

    ·24/7 RF environment monitoring and real-time response

    ·Precise signal analysis and location estimation

    ·Scalability through an integrated control system

    ·Provides real-time notifications to security personnel when abnormal frequencies are detected

24/7 Stationary Solution
24/7 Stationary Solution
24/7 Stationary Solution
24/7 Stationary Solution
24/7 Stationary Solution
·Compliance
With the rise in backdoor-related incidents,
legal and policy-level security measures are being strengthened.
  • Act on Promotion of Information and Communication Network Utilization and Information Protection
    ■ Act on Promotion of Information and Communication Network Utilization and Information Protection (Jan. 23, 2024)
    Article 48 (Prohibition on Intrusive Acts on Information and Communications Networks) ④ No person shall, without legitimate reason, install any program or technical devices in the communication network or related information system, or transmit or distribute them to allow bypassing the normal protection or authentication procedures of an information and communications network to gain access to the network. (Updated on Jan. 23, 2024)
  • Regulation on Supervision of Electronic Financial Transactions
    ■ Regulation on Supervision of Electronic Financial Transactions (Feb. 5, 2025)
    Article 15 (Countermeasures Against Hacking, etc.) ①Financial companies or electronic financial business entities shall establish and operate the following countermeasures to protect their information processing systems and information and communications networks from hacking and other electronic intrusions: Installation and operation of information security systems to prevent incidents caused by electronic intrusions, such as hacking.