Academics at the Ben-Gurion University of the Negev (BGU) in Israel have developed the AiR-ViBeR technique for stealing data from air-gapped systems by manipulating the vibrations of fans inside computers.
BGU's Mordechai Guri said malware planted on an air-gapped system can control fan speed, and attackers can rig the frequency of vibrations by moderating fan speed up and down, with the vibrational patterns spreading throughout the nearby environment.
A nearby attacker can use accelerometer sensors in smartphones to record the vibrations, then decode the information concealed within the vibration pattern to reassemble the stolen data.
Hackers can either record the vibrations by positioning a smartphone on a desk near an air-gapped system, or use malware to infect the smartphones of employees working for a targeted company operating an air-gapped system.
However, AiR-ViBeR is extremely slow, enabling data exfiltration of only a half-bit per second.
View Full Article
Abstracts Copyright © 2020 SmithBucklin, Washington, DC, USA