Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Security researchers from the Ben Gurion University of the Negev, in Israel, have discovered a new way of stealing data using power lines.  While that may sound like science fiction, it's actually real and a genuine threat, even to computers thought to be highly secure.

If you're not familiar with the term, an air gapped computer is one that is isolated from local networks and the internet.  Because it's not connected to anything, these machines have long been regarded as the ultimate in data security and are used by governments and corporations to store their most sensitive data.

 Here's what the researchers had to say about their discovery:

"As a part of the targeted attack, the adversary may infiltrate the air-gapped networks using social engineering, supply chain attacks, or malicious insiders.  Note that several APTs discovered in the last decade are capable of infecting air-gapped networks (e.g. Turlal, RedOctober and Fanny).

However, despite the fact that breaching air-gapped systems has been shown feasible, the exfiltration of data from an air-gapped system remains a challenge."

Up until now, anyway.

The researchers have dubbed this new technique "PowerHammer," and it accomplishes the task of siphoning data from air-gapped systems by creating fluctuations in the flow of electrical current to create a Morse-code-like pattern, which can be used to create a simple binary system.

That accomplished, the only other thing that's needed is a piece of hardware to monitor the flow of electricity as it passes through power lines and then, decode the signal.  According to the research team, data transfer speeds of up to 1000bps can be achieved.

This should scare the daylights out of anyone in data security.

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Workplace Tips Windows 10 Miscellaneous Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing User Tips Communication IT Support VoIP Business Management Network Data Quick Tips Smartphone Email Virtualization Holiday Server Remote Computing Business Continuity Mobile Device Management Operating System Saving Money Social Media Upgrade Disaster Recovery Office Apps Alert Going Green Save Money Chrome Small Business Android Employer-Employee Relationship Ransomware The Internet of Things Big Data Managed Service Provider Mobility Microsoft Office Social Application WiFi Facebook Identity Theft Best Practice Antivirus Information Technology Spam BYOD Bandwidth Unified Threat Management Hacking Tablet Passwords Law Enforcement Analytics History Office Tips Search Gmail Password Saving Time Browser Current Events Government Lithium-ion battery Printer Telephone Systems Humor Avoiding Downtime Phone System Router Recovery Apple Encryption Network Security Automation Remote Monitoring Tech Support Gadgets Smartphones USB Users intranet Firewall Net Neutrality iPhone Collaboration Laptop Money Wireless Data Management Streaming Media Hard Drives Education Maintenance communications User Error Fraud Work/Life Balance Computers Disaster Retail BDR Wi-Fi Virtual Reality Entertainment Google Drive DDoS Flexibility Benefits Mobile Office VPN Cybercrime Risk Management IT Solutions App Office 365 Managing Stress Private Cloud Wireless Technology IT Consultant Fax Server Outlook Data Loss Update Printer Server Personal Information Wearable Technology Marketing Budget Administration Proactive IT Shortcut Business Intelligence Transportation Managed IT Services Content Filtering Online Currency Internet Exlporer Biometrics Point of Sale PowerPoint Social Engineering Cost Management Telephony Customer Service PDF Legal OneDrive Website RAM Uninterrupted Power Supply Bring Your Own Device Ebay Keyboard Text Messaging Paperless Office Computer Accessories Amazon Workplace Blogging CPU Internet of Things Politics Bloatware IT consulting Applications Hiring/Firing Artificial Intelligence Distributed Denial of Service Scalability Miscelllaneous Mouse Smart Phones Slow Sports Experience Branding Touchpad eWaste How To HIPAA Network Congestion Windows 8 Music Travel Regulations WIndows 7 Operating Sysytem Television Storage ISP Vendor Management 3D Printing Files Books Two-factor Authentication Bluetooth Trending Black Market Computing Chromecast Electronic Medical Records Customer Relationship Management Cameras SharePoint HaaS User Instant Messaging Data Theft Excel Prodcuctivity Administrator Safety Reputation Teamwork Best Available Online Backup Battery CloudSync Presentation Access Emergency Meetings Programming Hosted Solution Automobile Compliance Science Display Cleaning End of Support Running Cable Phishing Worker Commute Inbound Marketing Emails Networking Audit Robot Save Time Advertising Video Games OneNote Twitter Human Resources Near Field Communication Data storage Hacker

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code