Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Security researchers from the Ben Gurion University of the Negev, in Israel, have discovered a new way of stealing data using power lines.  While that may sound like science fiction, it's actually real and a genuine threat, even to computers thought to be highly secure.

If you're not familiar with the term, an air gapped computer is one that is isolated from local networks and the internet.  Because it's not connected to anything, these machines have long been regarded as the ultimate in data security and are used by governments and corporations to store their most sensitive data.

 Here's what the researchers had to say about their discovery:

"As a part of the targeted attack, the adversary may infiltrate the air-gapped networks using social engineering, supply chain attacks, or malicious insiders.  Note that several APTs discovered in the last decade are capable of infecting air-gapped networks (e.g. Turlal, RedOctober and Fanny).

However, despite the fact that breaching air-gapped systems has been shown feasible, the exfiltration of data from an air-gapped system remains a challenge."

Up until now, anyway.

The researchers have dubbed this new technique "PowerHammer," and it accomplishes the task of siphoning data from air-gapped systems by creating fluctuations in the flow of electrical current to create a Morse-code-like pattern, which can be used to create a simple binary system.

That accomplished, the only other thing that's needed is a piece of hardware to monitor the flow of electricity as it passes through power lines and then, decode the signal.  According to the research team, data transfer speeds of up to 1000bps can be achieved.

This should scare the daylights out of anyone in data security.

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Miscellaneous Workplace Tips Windows 10 Backup Efficiency Innovation Computer Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication User Tips IT Support Business Management VoIP Server Smartphone Network Data Email Quick Tips Holiday Virtualization Remote Computing Going Green Operating System Social Media Upgrade Business Continuity Mobile Device Management Office Saving Money Apps Disaster Recovery Alert Save Money Chrome Small Business Android Employer-Employee Relationship Antivirus Ransomware The Internet of Things Big Data Managed Service Provider Microsoft Office Mobility Social Facebook Application WiFi Best Practice Identity Theft Lithium-ion battery Bandwidth Printer Unified Threat Management Hacking Tablet BYOD Passwords Analytics History Search Gmail Law Enforcement Office Tips Browser Password Current Events Government Saving Time Information Technology Spam Work/Life Balance Hard Drives Maintenance Telephone Systems Avoiding Downtime Phone System Router Fraud Humor Apple Recovery Network Security Gadgets Smartphones Automation Users Encryption USB Remote Monitoring Tech Support intranet Streaming Media Net Neutrality Firewall iPhone Education Data Management Wireless Money Collaboration Laptop User Error Computers Disaster communications Entertainment Online Currency Telephony Customer Service Wi-Fi Virtual Reality Mobile Office Google Drive DDoS Flexibility Benefits IT Solutions VPN Cybercrime Risk Management Office 365 Outlook Printer Server Managing Stress Private Cloud App Wireless Technology Marketing Update Administration IT Consultant Fax Server Personal Information Data Loss Content Filtering Budget Point of Sale Business Intelligence Wearable Technology Transportation PowerPoint Shortcut Cost Management Managed IT Services Proactive IT Internet Exlporer Biometrics Retail Social Engineering BDR Bring Your Own Device Near Field Communication Hacker Data storage Paperless Office Human Resources Workplace Legal PDF Uninterrupted Power Supply Keyboard Miscelllaneous Text Messaging Computer Accessories Politics Internet of Things Bloatware RAM IT consulting Hiring/Firing Applications HIPAA Website Scalability Artificial Intelligence Travel Ebay Distributed Denial of Service Mouse Experience Regulations Sports Branding ISP CPU Amazon Touchpad Blogging How To eWaste Network Congestion 3D Printing Music Slow WIndows 7 Smart Phones Operating Sysytem Television Storage Books Cameras Files Two-factor Authentication Bluetooth Data Theft Windows 8 Black Market Trending Electronic Medical Records Chromecast Customer Relationship Management SharePoint User HaaS CloudSync Vendor Management Instant Messaging Excel Safety Administrator Teamwork Programming Best Available Computing Reputation Compliance Battery Presentation Emergency Access Meetings Prodcuctivity Inbound Marketing Automobile Emails Hosted Solution Audit Science Online Backup Cleaning Twitter Running Cable OneNote Phishing End of Support Worker Commute Save Time Robot Networking Display OneDrive Video Games Advertising

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...