Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Security researchers from the Ben Gurion University of the Negev, in Israel, have discovered a new way of stealing data using power lines.  While that may sound like science fiction, it's actually real and a genuine threat, even to computers thought to be highly secure.

If you're not familiar with the term, an air gapped computer is one that is isolated from local networks and the internet.  Because it's not connected to anything, these machines have long been regarded as the ultimate in data security and are used by governments and corporations to store their most sensitive data.

 Here's what the researchers had to say about their discovery:

"As a part of the targeted attack, the adversary may infiltrate the air-gapped networks using social engineering, supply chain attacks, or malicious insiders.  Note that several APTs discovered in the last decade are capable of infecting air-gapped networks (e.g. Turlal, RedOctober and Fanny).

However, despite the fact that breaching air-gapped systems has been shown feasible, the exfiltration of data from an air-gapped system remains a challenge."

Up until now, anyway.

The researchers have dubbed this new technique "PowerHammer," and it accomplishes the task of siphoning data from air-gapped systems by creating fluctuations in the flow of electrical current to create a Morse-code-like pattern, which can be used to create a simple binary system.

That accomplished, the only other thing that's needed is a piece of hardware to monitor the flow of electricity as it passes through power lines and then, decode the signal.  According to the research team, data transfer speeds of up to 1000bps can be achieved.

This should scare the daylights out of anyone in data security.

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Email Holiday Server Network Data Quick Tips Virtualization Operating System Social Media Upgrade Office Going Green Business Continuity Mobile Device Management Saving Money Save Money Remote Computing Apps Disaster Recovery Alert Android Small Business Chrome Mobility The Internet of Things WiFi Big Data Managed Service Provider Identity Theft Microsoft Office Antivirus Social Application Facebook Best Practice Employer-Employee Relationship Ransomware Hacking Tablet Saving Time Passwords Lithium-ion battery Printer Law Enforcement Office Tips Analytics History Search Gmail Password Browser BYOD Current Events Government Information Technology Spam Bandwidth Unified Threat Management Net Neutrality Router Firewall Recovery iPhone Laptop Apple Collaboration Network Security Automation Gadgets Smartphones Hard Drives Wireless Maintenance Users USB Fraud Work/Life Balance Data Management Money Streaming Media Education Encryption User Error communications Computers Disaster Remote Monitoring Telephone Systems Tech Support Humor Avoiding Downtime Phone System intranet Data Loss Wearable Technology Cybercrime Proactive IT IT Solutions Risk Management Personal Information Online Currency Private Cloud Managing Stress Wireless Technology Outlook Update Printer Server Managed IT Services Budget Marketing Administration Transportation Shortcut Business Intelligence Wi-Fi Content Filtering VPN Internet Exlporer Flexibility Point of Sale Biometrics Social Engineering PowerPoint Telephony Customer Service Cost Management App Retail Virtual Reality BDR Google Drive Entertainment DDoS Office 365 IT Consultant Fax Server Mobile Office Benefits Mouse Miscelllaneous Artificial Intelligence Distributed Denial of Service Sports Prodcuctivity Black Market Touchpad Branding Electronic Medical Records Network Congestion HIPAA HaaS Online Backup eWaste Travel Instant Messaging Operating Sysytem Regulations WIndows 7 Safety Storage ISP Television Files Two-factor Authentication Battery Display 3D Printing Emergency Bluetooth Trending Chromecast Customer Relationship Management Automobile Cleaning SharePoint Cameras User Excel Data Theft Administrator Worker Commute Best Available Save Time Reputation Teamwork CloudSync Video Games Website RAM Access Presentation Ebay Hacker Meetings Hosted Solution Science Compliance Amazon Programming Legal Blogging CPU Phishing Keyboard End of Support Running Cable Inbound Marketing Smart Phones Slow Robot Networking Emails Audit Politics Hiring/Firing Advertising Twitter OneNote Scalability Windows 8 Data storage Human Resources Near Field Communication Experience PDF Uninterrupted Power Supply OneDrive How To Vendor Management Bring Your Own Device Music Computer Accessories Paperless Office Text Messaging Internet of Things Bloatware Computing Workplace Applications IT consulting Books

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...