Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Security researchers from the Ben Gurion University of the Negev, in Israel, have discovered a new way of stealing data using power lines.  While that may sound like science fiction, it's actually real and a genuine threat, even to computers thought to be highly secure.

If you're not familiar with the term, an air gapped computer is one that is isolated from local networks and the internet.  Because it's not connected to anything, these machines have long been regarded as the ultimate in data security and are used by governments and corporations to store their most sensitive data.

 Here's what the researchers had to say about their discovery:

"As a part of the targeted attack, the adversary may infiltrate the air-gapped networks using social engineering, supply chain attacks, or malicious insiders.  Note that several APTs discovered in the last decade are capable of infecting air-gapped networks (e.g. Turlal, RedOctober and Fanny).

However, despite the fact that breaching air-gapped systems has been shown feasible, the exfiltration of data from an air-gapped system remains a challenge."

Up until now, anyway.

The researchers have dubbed this new technique "PowerHammer," and it accomplishes the task of siphoning data from air-gapped systems by creating fluctuations in the flow of electrical current to create a Morse-code-like pattern, which can be used to create a simple binary system.

That accomplished, the only other thing that's needed is a piece of hardware to monitor the flow of electricity as it passes through power lines and then, decode the signal.  According to the research team, data transfer speeds of up to 1000bps can be achieved.

This should scare the daylights out of anyone in data security.

Sign Up for Our Newsletter


Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Internet Best Practices Productivity Microsoft Hackers Malware Business Software Business Computing Google Workplace Tips Windows 10 Backup Miscellaneous Efficiency Computer Hosted Solutions Innovation Windows Hardware IT Services Health Mobile Devices Mobile Computing User Tips IT Support Communication VoIP Holiday Server Network Data Quick Tips Virtualization Smartphone Email Business Management Going Green Business Continuity Mobile Device Management Saving Money Save Money Remote Computing Apps Disaster Recovery Alert Operating System Social Media Upgrade Office Android Small Business Chrome Antivirus Social Facebook Application Best Practice Employer-Employee Relationship Ransomware The Internet of Things Big Data WiFi Managed Service Provider Identity Theft Mobility Microsoft Office Law Enforcement Analytics History Search Gmail Password BYOD Office Tips Browser Current Events Government Information Technology Spam Bandwidth Unified Threat Management Tablet Saving Time Passwords Lithium-ion battery Printer Fraud Money Wireless Streaming Media Education Data Management Encryption User Error communications Computers Disaster Work/Life Balance Remote Monitoring Tech Support Telephone Systems Avoiding Downtime Phone System intranet Net Neutrality Firewall Router Humor iPhone Hacking Collaboration Laptop Apple Network Security Recovery Gadgets Smartphones Automation Hard Drives Maintenance Users USB Outlook Printer Server Managing Stress Update Wireless Technology Personal Information Administration VPN Transportation Content Filtering Budget Managed IT Services Internet Exlporer Point of Sale PowerPoint Shortcut Business Intelligence Cost Management App Telephony Retail Biometrics Social Engineering BDR Entertainment Customer Service Wi-Fi Google Drive IT Consultant Flexibility Fax Server DDoS Virtual Reality Mobile Office Data Loss Wearable Technology Benefits Proactive IT Cybercrime IT Solutions Risk Management Office 365 Online Currency Private Cloud Electronic Medical Records Cameras Chromecast Two-factor Authentication HaaS Data Theft SharePoint Instant Messaging Safety Administrator Customer Relationship Management User Website Reputation CloudSync RAM Teamwork Marketing Excel Ebay Battery Emergency Access Programming Best Available Amazon Blogging Compliance CPU Meetings Hosted Solution Automobile Cleaning Presentation Smart Phones End of Support Inbound Marketing Slow Running Cable Emails Audit Science Worker Commute Save Time Robot OneNote Phishing Windows 8 Advertising Video Games Twitter Hacker Data storage Networking OneDrive Vendor Management PDF Legal Uninterrupted Power Supply Bring Your Own Device Keyboard Paperless Office Human Resources Near Field Communication Workplace Computing Text Messaging Internet of Things Politics Hiring/Firing Applications Miscelllaneous Computer Accessories Prodcuctivity Artificial Intelligence Scalability Distributed Denial of Service Experience Sports Bloatware Touchpad HIPAA Online Backup IT consulting eWaste Mouse How To Travel Music Regulations Operating Sysytem ISP Television Network Congestion 3D Printing Display Books Files WIndows 7 Bluetooth Trending Storage Black Market

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...