Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Security researchers from the Ben Gurion University of the Negev, in Israel, have discovered a new way of stealing data using power lines.  While that may sound like science fiction, it's actually real and a genuine threat, even to computers thought to be highly secure.

If you're not familiar with the term, an air gapped computer is one that is isolated from local networks and the internet.  Because it's not connected to anything, these machines have long been regarded as the ultimate in data security and are used by governments and corporations to store their most sensitive data.

 Here's what the researchers had to say about their discovery:

"As a part of the targeted attack, the adversary may infiltrate the air-gapped networks using social engineering, supply chain attacks, or malicious insiders.  Note that several APTs discovered in the last decade are capable of infecting air-gapped networks (e.g. Turlal, RedOctober and Fanny).

However, despite the fact that breaching air-gapped systems has been shown feasible, the exfiltration of data from an air-gapped system remains a challenge."

Up until now, anyway.

The researchers have dubbed this new technique "PowerHammer," and it accomplishes the task of siphoning data from air-gapped systems by creating fluctuations in the flow of electrical current to create a Morse-code-like pattern, which can be used to create a simple binary system.

That accomplished, the only other thing that's needed is a piece of hardware to monitor the flow of electricity as it passes through power lines and then, decode the signal.  According to the research team, data transfer speeds of up to 1000bps can be achieved.

This should scare the daylights out of anyone in data security.

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Internet Microsoft Productivity Hackers Malware Business Computing Google Business Software Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Computing IT Services Health Mobile Devices IT Support Communication User Tips Business Management VoIP Virtualization Smartphone Server Email Holiday Network Data Quick Tips Apps Disaster Recovery Save Money Alert Remote Computing Operating System Social Media Upgrade Going Green Office Business Continuity Mobile Device Management Saving Money Chrome Small Business Android Ransomware Mobility WiFi The Internet of Things Identity Theft Big Data Managed Service Provider Antivirus Microsoft Office Application Social Best Practice Facebook Employer-Employee Relationship Information Technology Spam Bandwidth Unified Threat Management Saving Time Hacking Tablet Lithium-ion battery Law Enforcement Printer Passwords Office Tips Password BYOD Analytics History Search Gmail Browser Current Events Government Remote Monitoring Humor Tech Support User Error Computers Disaster Recovery intranet Net Neutrality Firewall iPhone Network Security Laptop Automation Avoiding Downtime Collaboration Phone System Router Apple Wireless Hard Drives Maintenance Gadgets Smartphones Fraud Users USB Money Data Management Work/Life Balance communications Encryption Streaming Media Telephone Systems Education Google Drive Point of Sale PowerPoint DDoS Cost Management Benefits Office 365 IT Consultant Retail Fax Server BDR Entertainment Data Loss Cybercrime Wearable Technology Risk Management Mobile Office Proactive IT Personal Information Private Cloud Managing Stress Wireless Technology Online Currency IT Solutions Update Managed IT Services Budget Outlook Printer Server Transportation Shortcut Business Intelligence Wi-Fi Internet Exlporer Marketing Biometrics VPN Flexibility Administration Social Engineering Telephony Customer Service Content Filtering App Virtual Reality Emails Audit Computer Accessories How To Vendor Management Text Messaging Internet of Things OneNote Bloatware Music Twitter Applications IT consulting Mouse Computing Artificial Intelligence Distributed Denial of Service Sports OneDrive Books Touchpad Bring Your Own Device Branding Network Congestion Black Market Prodcuctivity Paperless Office eWaste Workplace Electronic Medical Records HaaS Operating Sysytem Online Backup WIndows 7 Storage Instant Messaging Miscelllaneous Television Files Two-factor Authentication Safety Bluetooth Battery Display HIPAA Trending Travel Chromecast Customer Relationship Management Emergency Regulations SharePoint User ISP Excel Automobile Administrator 3D Printing Cleaning Reputation Teamwork Best Available Worker Commute Access Save Time Presentation Video Games Cameras Website RAM Meetings Science Ebay Data Theft Hosted Solution Hacker Legal Amazon Blogging End of Support CPU Running Cable Phishing CloudSync Robot Networking Keyboard Smart Phones Advertising Slow Programming Politics Compliance Data storage Human Resources Hiring/Firing Near Field Communication Scalability Windows 8 PDF Uninterrupted Power Supply Experience Inbound Marketing

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...