Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Security researchers from the Ben Gurion University of the Negev, in Israel, have discovered a new way of stealing data using power lines.  While that may sound like science fiction, it's actually real and a genuine threat, even to computers thought to be highly secure.

If you're not familiar with the term, an air gapped computer is one that is isolated from local networks and the internet.  Because it's not connected to anything, these machines have long been regarded as the ultimate in data security and are used by governments and corporations to store their most sensitive data.

 Here's what the researchers had to say about their discovery:

"As a part of the targeted attack, the adversary may infiltrate the air-gapped networks using social engineering, supply chain attacks, or malicious insiders.  Note that several APTs discovered in the last decade are capable of infecting air-gapped networks (e.g. Turlal, RedOctober and Fanny).

However, despite the fact that breaching air-gapped systems has been shown feasible, the exfiltration of data from an air-gapped system remains a challenge."

Up until now, anyway.

The researchers have dubbed this new technique "PowerHammer," and it accomplishes the task of siphoning data from air-gapped systems by creating fluctuations in the flow of electrical current to create a Morse-code-like pattern, which can be used to create a simple binary system.

That accomplished, the only other thing that's needed is a piece of hardware to monitor the flow of electricity as it passes through power lines and then, decode the signal.  According to the research team, data transfer speeds of up to 1000bps can be achieved.

This should scare the daylights out of anyone in data security.

Sign Up for Our Newsletter


Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Efficiency Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Email Server Holiday Network Data Quick Tips Virtualization Operating System Social Media Upgrade Office Going Green Business Continuity Mobile Device Management Saving Money Save Money Disaster Recovery Apps Remote Computing Alert Small Business Android Chrome The Internet of Things Best Practice WiFi Mobility Identity Theft Big Data Employer-Employee Relationship Managed Service Provider Ransomware Microsoft Office Antivirus Social Facebook Application Hacking Saving Time Tablet Lithium-ion battery Passwords Printer Analytics History Gmail Search BYOD Browser Current Events Government Law Enforcement Office Tips Information Technology Spam Password Bandwidth Unified Threat Management Apple communications Telephone Systems Maintenance Gadgets Hard Drives Smartphones Humor Users Fraud USB Recovery Wireless Network Security Automation Streaming Media Encryption Work/Life Balance Education User Error Remote Monitoring Tech Support Computers Disaster Money intranet Data Management Firewall Avoiding Downtime Net Neutrality iPhone Phone System Router Collaboration Laptop Internet Exlporer Wearable Technology Biometrics Office 365 Proactive IT Social Engineering Customer Service Telephony IT Solutions Online Currency Virtual Reality Google Drive DDoS Personal Information Benefits Outlook Printer Server Marketing Managed IT Services Cybercrime Risk Management Administration VPN Private Cloud Managing Stress Content Filtering Wireless Technology Point of Sale Wi-Fi App PowerPoint Cost Management Update Flexibility Retail BDR Budget IT Consultant Entertainment Fax Server Data Loss Shortcut Business Intelligence Mobile Office Transportation Online Backup Robot Networking Advertising Books HIPAA Travel Data storage Human Resources Display Regulations Near Field Communication Black Market ISP PDF Electronic Medical Records HaaS 3D Printing Uninterrupted Power Supply Instant Messaging Text Messaging Computer Accessories Safety Bloatware Internet of Things Applications Cameras IT consulting Battery Data Theft Artificial Intelligence Distributed Denial of Service Mouse Emergency Website RAM Sports Touchpad Branding Ebay Automobile CloudSync eWaste Network Congestion Cleaning Amazon Blogging CPU Operating Sysytem WIndows 7 Worker Commute Save Time Compliance Programming Television Storage Smart Phones Two-factor Authentication Video Games Slow Files Bluetooth Hacker Inbound Marketing Trending Customer Relationship Management Windows 8 Emails Legal Audit Chromecast SharePoint User Keyboard Twitter OneNote Excel Vendor Management Administrator Reputation Teamwork Best Available Politics Hiring/Firing OneDrive Computing Presentation Scalability Bring Your Own Device Access Meetings Experience Paperless Office Workplace Hosted Solution Science Prodcuctivity How To End of Support Running Cable Phishing Music Miscelllaneous

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...