Covert communication channels using Lora

Imagine Command and Control traffic was entirely out of band. I’m not talking about hiding c2 comms but an even scarier scenario. Imagine malware using long range and low power radio links to communicate with attackers or attacks on management interfaces using these long range links. In this talk I will take you along for an interesting ride as I share my explorations of this topic and how attacks could leverage this in the future!