Cyber ​​attack via power supply and electromagnetic wave

B2B Cyber ​​Security ShortNews

Share post

It's still a cyber attack in the laboratory: Israeli researchers installed malware on a PC and then used the electromagnetic waves generated by a PC power supply to transfer some data to a remote smartphone behind a wall.

Israeli researchers have studied a new attack method called the COVID-Bit. It uses the electromagnetic waves of a device, such as a PC, to transmit data from devices that are isolated from the Internet (air-gap systems) over a distance of at least two meters. There they can be captured by a receiver with a smartphone – even behind a wall. How to have the researchers set out in a freely available technical PDF file.

Tapped devices without internet access

The COVID-bit attack was developed by Ben-Gurion University researcher Mordechai Guri, who has studied multiple methods to steal sensitive data from air-gap systems. It is not primarily about the attack, but about recognizing what is possible and how to defend against it.

🔎 This is how researchers attacked the Air Gap system in an experiment (Image: Ben-Gurion University of the Negev).

So-called air gap systems are usually found in high-risk environments such as energy infrastructure, government and weapons control units. These systems are always disconnected from the Internet or have no access at all. However, for the researched attack to work, malware must be installed on the PC or system. That sounds far-fetched but was the case with Stuxnet, for example. The worm so misdirected Iran's uranium enrichment centrifuge control systems that they were destroyed.

Low data transfer rates

The first results show very low data transfer rates, but these are sufficient. In addition, the research was more about demonstrating the feasibility of this attack. To transmit the data in the COVID-bit attack, the researchers created a malware program that regulates the CPU load and thus the core frequency in a specific way to make the power supplies on air-gap computers emit electromagnetic radiation broadcast on a low frequency band.

According to the researchers, a proper defense against such attacks is very difficult, since the CPU and power supply frequencies would have to be monitored on the air gap systems.

More at Sophos.com

 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more