Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Security researchers from the Ben Gurion University of the Negev, in Israel, have discovered a new way of stealing data using power lines.  While that may sound like science fiction, it's actually real and a genuine threat, even to computers thought to be highly secure.

If you're not familiar with the term, an air gapped computer is one that is isolated from local networks and the internet.  Because it's not connected to anything, these machines have long been regarded as the ultimate in data security and are used by governments and corporations to store their most sensitive data.

 Here's what the researchers had to say about their discovery:

"As a part of the targeted attack, the adversary may infiltrate the air-gapped networks using social engineering, supply chain attacks, or malicious insiders.  Note that several APTs discovered in the last decade are capable of infecting air-gapped networks (e.g. Turlal, RedOctober and Fanny).

However, despite the fact that breaching air-gapped systems has been shown feasible, the exfiltration of data from an air-gapped system remains a challenge."

Up until now, anyway.

The researchers have dubbed this new technique "PowerHammer," and it accomplishes the task of siphoning data from air-gapped systems by creating fluctuations in the flow of electrical current to create a Morse-code-like pattern, which can be used to create a simple binary system.

That accomplished, the only other thing that's needed is a piece of hardware to monitor the flow of electricity as it passes through power lines and then, decode the signal.  According to the research team, data transfer speeds of up to 1000bps can be achieved.

This should scare the daylights out of anyone in data security.

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Business Software Business Computing Google Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips IT Support Communication VoIP Business Management Data Quick Tips Virtualization Smartphone Server Email Network Holiday Mobile Device Management Saving Money Apps Disaster Recovery Save Money Alert Remote Computing Operating System Social Media Upgrade Going Green Office Business Continuity Small Business Android Chrome Best Practice Social Facebook Employer-Employee Relationship Ransomware WiFi Mobility Identity Theft The Internet of Things Big Data Managed Service Provider Antivirus Application Microsoft Office History Analytics Search Gmail Browser Current Events Government Information Technology Spam Bandwidth Saving Time Unified Threat Management Hacking Tablet Lithium-ion battery Law Enforcement Printer Office Tips Password Passwords BYOD communications Encryption Work/Life Balance Telephone Systems Streaming Media Humor Remote Monitoring Tech Support Education User Error Disaster intranet Recovery Computers Net Neutrality Firewall Network Security iPhone Collaboration Laptop Automation Avoiding Downtime Phone System Router Apple Hard Drives Maintenance Fraud Gadgets Smartphones Wireless Data Management Money Users USB Managed IT Services Printer Server Internet Exlporer Biometrics VPN Social Engineering Telephony Customer Service Marketing Administration App Wi-Fi Virtual Reality Content Filtering Google Drive DDoS Flexibility Point of Sale PowerPoint Benefits Cost Management Fax Server IT Consultant Retail Data Loss BDR Cybercrime Entertainment Risk Management Wearable Technology Office 365 Proactive IT Mobile Office Managing Stress Private Cloud Wireless Technology Online Currency Update IT Solutions Personal Information Budget Business Intelligence Outlook Transportation Shortcut CPU Running Cable Phishing Data Theft Amazon Blogging End of Support Worker Commute Robot Save Time Networking Slow Video Games CloudSync Smart Phones Advertising Near Field Communication Data storage Hacker Human Resources Legal Compliance Programming Windows 8 PDF Uninterrupted Power Supply Keyboard Computer Accessories Inbound Marketing Vendor Management Text Messaging Audit Internet of Things Politics Bloatware Emails IT consulting Applications Hiring/Firing Distributed Denial of Service Scalability Mouse Twitter Computing OneNote Artificial Intelligence Sports Experience Touchpad Branding eWaste How To Network Congestion Prodcuctivity OneDrive Bring Your Own Device Music WIndows 7 Paperless Office Operating Sysytem Online Backup Television Storage Workplace Files Books Two-factor Authentication Bluetooth Miscelllaneous Trending Black Market Display Chromecast Electronic Medical Records Customer Relationship Management SharePoint HaaS User HIPAA Instant Messaging Excel Travel Administrator Safety Regulations Teamwork Best Available ISP Reputation 3D Printing Battery Presentation Access Emergency RAM Meetings Website Ebay Hosted Solution Automobile Science Cleaning Cameras

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...