For decades, air-gapped systems which are physically isolated from external networks have been the last line of defense for high-security environments: nuclear facilities, defense networks, R&D labs, and critical infrastructure. But in 2025, even isolation isn't enough. Why? Because attackers have learned to blink the data out.

Welcome to the covert world of optical data exfiltration, where malware manipulates LEDs, Morse code becomes a medium, and surveillance cameras act as listening posts.

Leaking Data with Light

The technique is deceptively simple, yet incredibly effective.

  1. A compromised air-gapped system is infected with specialized malware via insider access, compromised USB, or supply chain infiltration.

  2. The malware encodes sensitive data (passwords, cryptographic keys, documents) into binary or Morse code.

  3. The data is then modulated into optical signals by blinking an on-board LED, typically:

    1. HDD activity LED

    2. Keyboard indicators (Num Lock, Caps Lock

    3. Router port status LEDs

    4. IR LEDs in surveillance cameras

  4. An attacker with line-of-sight access using a smartphone, camera drone, telescope, or hijacked CCTV, records the blinking patterns.

  5. On the attacker’s side, the optical data is decoded into plaintext using signal processing or computer vision tools.

How It Works

Let’s break it down with an example using a surveillance camera with an IR LED:

Step 1: Malware Deployment

Step 2: Data Encoding & Modulation

Sensitive data (e.g., "RootPassword123") is converted to binary or Morse code:

`"R" in Morse: .-. `

Or

    `in binary: 01010010` 

Step 3: Optical Transmission

The IR LED blinks rapidly and is invisible to the human eye, but detectable to most cameras or IR sensors.

    `LED on = binary 1` 

    `LED off = binary 0` 

Step 4: Optical Capture

Attacker positions a camera within LOS (line-of-sight). Could be:

Step 5: Reconstruction

Software demodulates the light pulses, reconstructs the binary stream, and decodes it back into human-readable content.

Real-World Implementations

These aren’t just theoretical. Here are some notable proof-of-concept attacks that have demonstrated this technique in the wild:

aIR-Jumper (Ben-Gurion University):

LED-it-GO

xLED

Glowworm

Risk Factors: Where It Can Happen

This attack is especially dangerous in:

If you have:

How to Defend Against LED Covert Channels

Mitigation requires a multi-layered approach:

1) Physical Controls

Block LEDs with opaque tape or shield covers.

2). Monitoring

3). Firmware & OS Hardening

Final Thoughts

The blink of an LED was once harmless—a passive sign of activity. But in 2025, even a flicker can be a cyber whisper, bleeding secrets into the night. In a world where radio silence is no longer enough, organizations must now think in photons as well as packets.

So, the next time your devices start blinking oddly, don’t call IT, call the CIA.