Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Security researchers from the Ben Gurion University of the Negev, in Israel, have discovered a new way of stealing data using power lines.  While that may sound like science fiction, it's actually real and a genuine threat, even to computers thought to be highly secure.

If you're not familiar with the term, an air gapped computer is one that is isolated from local networks and the internet.  Because it's not connected to anything, these machines have long been regarded as the ultimate in data security and are used by governments and corporations to store their most sensitive data.

 Here's what the researchers had to say about their discovery:

"As a part of the targeted attack, the adversary may infiltrate the air-gapped networks using social engineering, supply chain attacks, or malicious insiders.  Note that several APTs discovered in the last decade are capable of infecting air-gapped networks (e.g. Turlal, RedOctober and Fanny).

However, despite the fact that breaching air-gapped systems has been shown feasible, the exfiltration of data from an air-gapped system remains a challenge."

Up until now, anyway.

The researchers have dubbed this new technique "PowerHammer," and it accomplishes the task of siphoning data from air-gapped systems by creating fluctuations in the flow of electrical current to create a Morse-code-like pattern, which can be used to create a simple binary system.

That accomplished, the only other thing that's needed is a piece of hardware to monitor the flow of electricity as it passes through power lines and then, decode the signal.  According to the research team, data transfer speeds of up to 1000bps can be achieved.

This should scare the daylights out of anyone in data security.

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips Communication IT Support VoIP Business Management Network Smartphone Data Quick Tips Email Virtualization Holiday Server Business Continuity Operating System Mobile Device Management Social Media Upgrade Saving Money Office Disaster Recovery Apps Alert Save Money Going Green Remote Computing Chrome Small Business Android The Internet of Things Big Data Managed Service Provider Microsoft Office Social Mobility Application Facebook WiFi Identity Theft Best Practice Antivirus Employer-Employee Relationship Ransomware Unified Threat Management BYOD Hacking Tablet Passwords Law Enforcement Analytics History Office Tips Search Gmail Password Browser Saving Time Current Events Government Lithium-ion battery Printer Information Technology Spam Bandwidth Avoiding Downtime Work/Life Balance Phone System Router Recovery Apple Network Security Encryption Automation Gadgets Smartphones Remote Monitoring Tech Support USB Users intranet Firewall Net Neutrality iPhone Collaboration Laptop Data Management Money Streaming Media Education Maintenance communications User Error Hard Drives Wireless Disaster Computers Telephone Systems Fraud Humor Benefits Mobile Office Wi-Fi VPN Flexibility Cybercrime Risk Management IT Solutions App Managing Stress Private Cloud Wireless Technology Outlook Office 365 IT Consultant Update Fax Server Printer Server Data Loss Marketing Budget Administration Wearable Technology Business Intelligence Proactive IT Transportation Shortcut Content Filtering Personal Information Internet Exlporer Biometrics Point of Sale Online Currency PowerPoint Social Engineering Cost Management Telephony Customer Service Retail Managed IT Services BDR Virtual Reality Google Drive Entertainment DDoS Ebay Internet of Things Bloatware Workplace IT consulting Hacker Applications Legal Artificial Intelligence Blogging Distributed Denial of Service CPU Miscelllaneous Mouse Amazon Sports Branding Keyboard Touchpad eWaste Slow HIPAA Network Congestion Smart Phones Politics Travel Regulations WIndows 7 Hiring/Firing Operating Sysytem Scalability Windows 8 Television Storage ISP 3D Printing Experience Files Two-factor Authentication Bluetooth How To Vendor Management Trending Music Chromecast Customer Relationship Management Cameras SharePoint User Computing Data Theft Excel Books Administrator Teamwork Best Available Reputation Prodcuctivity Black Market CloudSync Presentation Electronic Medical Records Access Meetings Online Backup HaaS Instant Messaging Hosted Solution Compliance Science Programming Safety Running Cable Phishing End of Support Battery Display Inbound Marketing Audit Emergency Robot Emails Networking Advertising Automobile Twitter OneNote Near Field Communication Cleaning Data storage Human Resources PDF Worker Commute Uninterrupted Power Supply OneDrive Bring Your Own Device Save Time Text Messaging Website RAM Paperless Office Computer Accessories Video Games

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...