Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Security researchers from the Ben Gurion University of the Negev, in Israel, have discovered a new way of stealing data using power lines.  While that may sound like science fiction, it's actually real and a genuine threat, even to computers thought to be highly secure.

If you're not familiar with the term, an air gapped computer is one that is isolated from local networks and the internet.  Because it's not connected to anything, these machines have long been regarded as the ultimate in data security and are used by governments and corporations to store their most sensitive data.

 Here's what the researchers had to say about their discovery:

"As a part of the targeted attack, the adversary may infiltrate the air-gapped networks using social engineering, supply chain attacks, or malicious insiders.  Note that several APTs discovered in the last decade are capable of infecting air-gapped networks (e.g. Turlal, RedOctober and Fanny).

However, despite the fact that breaching air-gapped systems has been shown feasible, the exfiltration of data from an air-gapped system remains a challenge."

Up until now, anyway.

The researchers have dubbed this new technique "PowerHammer," and it accomplishes the task of siphoning data from air-gapped systems by creating fluctuations in the flow of electrical current to create a Morse-code-like pattern, which can be used to create a simple binary system.

That accomplished, the only other thing that's needed is a piece of hardware to monitor the flow of electricity as it passes through power lines and then, decode the signal.  According to the research team, data transfer speeds of up to 1000bps can be achieved.

This should scare the daylights out of anyone in data security.

Sign Up for Our Newsletter


Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Health Mobile Devices Mobile Computing IT Services User Tips Communication IT Support VoIP Business Management Network Data Quick Tips Smartphone Virtualization Email Holiday Server Business Continuity Save Money Mobile Device Management Remote Computing Saving Money Operating System Disaster Recovery Social Media Apps Upgrade Alert Office Going Green Small Business Chrome Android Best Practice Employer-Employee Relationship Ransomware The Internet of Things Big Data Managed Service Provider Microsoft Office WiFi Mobility Identity Theft Social Facebook Antivirus Application BYOD Information Technology Spam Bandwidth Unified Threat Management Hacking Tablet Passwords Saving Time History Analytics Search Gmail Lithium-ion battery Law Enforcement Printer Browser Office Tips Current Events Password Government Wireless Data Management Education Money User Error Disaster Computers communications Encryption Work/Life Balance Avoiding Downtime Telephone Systems Phone System Humor Router Remote Monitoring Tech Support Apple intranet Recovery Firewall Net Neutrality Network Security iPhone Gadgets Collaboration Laptop Automation Smartphones Users USB Maintenance Hard Drives Fraud Streaming Media Point of Sale Business Intelligence PowerPoint Transportation Shortcut Cost Management Managed IT Services Internet Exlporer Biometrics Retail VPN BDR Social Engineering Telephony Customer Service Entertainment Mobile Office Wi-Fi App Virtual Reality Google Drive DDoS Flexibility Benefits IT Consultant Fax Server IT Solutions Data Loss Cybercrime Risk Management Wearable Technology Office 365 Outlook Proactive IT Managing Stress Printer Server Private Cloud Wireless Technology Online Currency Update Marketing Administration Personal Information Content Filtering Budget Website Meetings RAM Inbound Marketing Audit Ebay Hosted Solution Automobile Science Emails Cleaning Blogging Running Cable CPU Phishing Twitter OneNote Amazon End of Support Worker Commute Robot Save Time Networking Video Games Slow OneDrive Smart Phones Advertising Bring Your Own Device Near Field Communication Paperless Office Data storage Hacker Human Resources Windows 8 Legal Workplace PDF Uninterrupted Power Supply Miscelllaneous Keyboard Text Messaging Vendor Management Computer Accessories Internet of Things Politics Bloatware IT consulting HIPAA Applications Hiring/Firing Computing Artificial Intelligence Distributed Denial of Service Scalability Mouse Travel Sports Experience Regulations Branding ISP Touchpad Prodcuctivity 3D Printing eWaste How To Network Congestion Music Online Backup WIndows 7 Operating Sysytem Television Storage Files Books Two-factor Authentication Cameras Bluetooth Data Theft Display Trending Black Market Chromecast Electronic Medical Records Customer Relationship Management SharePoint HaaS User CloudSync Instant Messaging Excel Administrator Safety Teamwork Best Available Compliance Programming Reputation Battery Presentation Access Emergency

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...