Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Security researchers from the Ben Gurion University of the Negev, in Israel, have discovered a new way of stealing data using power lines.  While that may sound like science fiction, it's actually real and a genuine threat, even to computers thought to be highly secure.

If you're not familiar with the term, an air gapped computer is one that is isolated from local networks and the internet.  Because it's not connected to anything, these machines have long been regarded as the ultimate in data security and are used by governments and corporations to store their most sensitive data.

 Here's what the researchers had to say about their discovery:

"As a part of the targeted attack, the adversary may infiltrate the air-gapped networks using social engineering, supply chain attacks, or malicious insiders.  Note that several APTs discovered in the last decade are capable of infecting air-gapped networks (e.g. Turlal, RedOctober and Fanny).

However, despite the fact that breaching air-gapped systems has been shown feasible, the exfiltration of data from an air-gapped system remains a challenge."

Up until now, anyway.

The researchers have dubbed this new technique "PowerHammer," and it accomplishes the task of siphoning data from air-gapped systems by creating fluctuations in the flow of electrical current to create a Morse-code-like pattern, which can be used to create a simple binary system.

That accomplished, the only other thing that's needed is a piece of hardware to monitor the flow of electricity as it passes through power lines and then, decode the signal.  According to the research team, data transfer speeds of up to 1000bps can be achieved.

This should scare the daylights out of anyone in data security.

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips IT Support Communication Business Management VoIP Data Quick Tips Virtualization Smartphone Email Holiday Server Network Mobile Device Management Saving Money Save Money Remote Computing Apps Disaster Recovery Alert Operating System Social Media Upgrade Office Going Green Business Continuity Android Small Business Chrome Employer-Employee Relationship Ransomware Mobility The Internet of Things Big Data WiFi Managed Service Provider Identity Theft Application Microsoft Office Antivirus Social Best Practice Facebook Current Events Government Information Technology Spam Bandwidth Unified Threat Management Hacking Tablet Law Enforcement Saving Time Office Tips Password Passwords Lithium-ion battery Printer Analytics History Search Gmail BYOD Browser Telephone Systems Streaming Media Humor Education Encryption User Error Computers Recovery Disaster Remote Monitoring Tech Support Network Security Automation Avoiding Downtime intranet Phone System Net Neutrality Firewall Router iPhone Collaboration Laptop Apple Wireless Gadgets Smartphones Hard Drives Money Maintenance Data Management Users USB Fraud Work/Life Balance communications Flexibility Virtual Reality VPN Google Drive Content Filtering DDoS Point of Sale Benefits PowerPoint Cost Management App Retail BDR Cybercrime Entertainment Office 365 Risk Management IT Consultant Fax Server Mobile Office Private Cloud Data Loss Managing Stress Wireless Technology Wearable Technology Personal Information Update Proactive IT IT Solutions Online Currency Budget Managed IT Services Transportation Shortcut Business Intelligence Outlook Printer Server Internet Exlporer Biometrics Social Engineering Telephony Marketing Customer Service Wi-Fi Administration Programming Amazon PDF Blogging Keyboard Compliance CPU Uninterrupted Power Supply Politics Computer Accessories Smart Phones Text Messaging Hiring/Firing Inbound Marketing Slow Internet of Things Emails Scalability Bloatware Audit Applications Experience IT consulting Mouse OneNote Artificial Intelligence Windows 8 Distributed Denial of Service Twitter Sports How To Touchpad Music Branding Network Congestion OneDrive Vendor Management eWaste Bring Your Own Device Operating Sysytem Books Paperless Office WIndows 7 Storage Workplace Computing Television Files Black Market Two-factor Authentication Electronic Medical Records Bluetooth Miscelllaneous HaaS Prodcuctivity Trending Chromecast Instant Messaging Customer Relationship Management Safety SharePoint HIPAA Online Backup User Excel Travel Administrator Regulations Battery Reputation Emergency Teamwork Best Available ISP 3D Printing Display Access Automobile Presentation Cleaning Meetings Science Hosted Solution Cameras Worker Commute End of Support Save Time Running Cable Data Theft Phishing Video Games Robot Networking Advertising Website Hacker CloudSync RAM Legal Ebay Data storage Human Resources Near Field Communication

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...