PCs with air gaps are vulnerable to data theft due to power supply radiation

Share post:

Mordechai Guri, a security researcher known for inventing inventive ways to siphon data from computers that aren’t connected to the internet, has discovered a new exploit that can exfiltrate data to a nearby smartphone.

It is known as COVID-bit, and it uses electromagnetic waves to transmit data from air-gapped systems that are isolated from the internet over a distance of at least two meters (6.5 ft) to a receiver.

The mechanism employs malware installed on the machine to generate electromagnetic radiation in the 0-60 kHz frequency band, which is then transmitted and detected by a stealthy receiving device in close physical proximity.

This is made possible by utilizing modern computers’ dynamic power consumption and manipulating the momentary loads on CPU cores.

The researchers developed a malware program that regulates CPU load and core frequency in a specific manner to cause the power supplies on air-gapped computers to emit electromagnetic radiation on a low-frequency band in order to transmit the data in the COVID-bit attack (0 – 48 kHz). A laptop or smartphone can be used as the receiver, with a small loop antenna connected to the 3.5mm audio jack, which can be easily spoofed in the form of headphones/earphones.

The smartphone is capable of capturing the transmission, applying a noise reduction filter, demodulating the raw data, and eventually decoding the secret.

“The information emanates from the air-gapped computer over the air to a distance of 2 m and more and can be picked up by a nearby insider or spy with a mobile phone or laptop,” Guri said.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Microsoft reveals critical security flaw affecting Android apps

Microsoft has identified a serious vulnerability in Android apps that could allow malicious software to hijack legitimate apps...

Chinese government websites “Riddled with security flaws” say researchers

A recent study conducted by researchers from the Harbin Institute of Technology reveals significant security issues plaguing Chinese...

Cyber Security Today, May 3, 2024 – North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches

This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways