Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can Computer Data Be Stolen Through Power Lines?

Can Computer Data Be Stolen Through Power Lines?

If you have an air-gapped computer, you probably think you're safe.  You may think that barring physical access to the machine, no hacker could possibly steal the data on that machine.  Unfortunately, you'd be incorrect.

Security researchers from the Ben Gurion University of the Negev, in Israel, have discovered a new way of stealing data using power lines.  While that may sound like science fiction, it's actually real and a genuine threat, even to computers thought to be highly secure.

If you're not familiar with the term, an air gapped computer is one that is isolated from local networks and the internet.  Because it's not connected to anything, these machines have long been regarded as the ultimate in data security and are used by governments and corporations to store their most sensitive data.

 Here's what the researchers had to say about their discovery:

"As a part of the targeted attack, the adversary may infiltrate the air-gapped networks using social engineering, supply chain attacks, or malicious insiders.  Note that several APTs discovered in the last decade are capable of infecting air-gapped networks (e.g. Turlal, RedOctober and Fanny).

However, despite the fact that breaching air-gapped systems has been shown feasible, the exfiltration of data from an air-gapped system remains a challenge."

Up until now, anyway.

The researchers have dubbed this new technique "PowerHammer," and it accomplishes the task of siphoning data from air-gapped systems by creating fluctuations in the flow of electrical current to create a Morse-code-like pattern, which can be used to create a simple binary system.

That accomplished, the only other thing that's needed is a piece of hardware to monitor the flow of electricity as it passes through power lines and then, decode the signal.  According to the research team, data transfer speeds of up to 1000bps can be achieved.

This should scare the daylights out of anyone in data security.

Sign Up for Our Newsletter


Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Internet Best Practices Productivity Microsoft Hackers Malware Business Software Business Computing Google Workplace Tips Windows 10 Computer Miscellaneous Backup Efficiency Innovation Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication IT Support User Tips VoIP Holiday Business Management Server Network Data Quick Tips Virtualization Smartphone Email Office Going Green Business Continuity Mobile Device Management Save Money Saving Money Remote Computing Apps Operating System Disaster Recovery Alert Social Media Upgrade Android Small Business Chrome Identity Theft Application Social Facebook Antivirus Best Practice Employer-Employee Relationship Ransomware Mobility The Internet of Things Big Data Managed Service Provider WiFi Microsoft Office Office Tips Lithium-ion battery Analytics History Search Printer Gmail Browser Current Events Government BYOD Information Technology Spam Bandwidth Unified Threat Management Tablet Law Enforcement Passwords Password Saving Time USB Money Users Hard Drives Data Management Maintenance communications Wireless Fraud Telephone Systems Streaming Media Education Work/Life Balance User Error Humor Computers Disaster Encryption Network Security Recovery Remote Monitoring Avoiding Downtime Phone System Tech Support Automation Router Hacking Apple intranet Net Neutrality Firewall iPhone Laptop Collaboration Gadgets Smartphones Proactive IT Outlook Transportation Budget Online Currency Printer Server Personal Information Internet Exlporer Business Intelligence Shortcut Telephony Administration Biometrics Managed IT Services Social Engineering Content Filtering Customer Service Google Drive DDoS Point of Sale PowerPoint Virtual Reality VPN Cost Management Wi-Fi Retail BDR Benefits Entertainment Flexibility App Cybercrime Risk Management Mobile Office Private Cloud IT Consultant Fax Server Managing Stress Data Loss Update Office 365 Wireless Technology IT Solutions Wearable Technology Access Electronic Medical Records Meetings HaaS Best Available Cameras Hosted Solution Instant Messaging Display Presentation Safety Data Theft Running Cable End of Support Battery Science Robot Emergency CloudSync Marketing Phishing Advertising Automobile Programming Data storage Cleaning Compliance Networking Website RAM PDF Uninterrupted Power Supply Worker Commute Ebay Near Field Communication Save Time Inbound Marketing Human Resources Emails Video Games Amazon Audit Blogging CPU Text Messaging Internet of Things OneNote Applications Hacker Twitter Distributed Denial of Service Legal Smart Phones Computer Accessories Slow Artificial Intelligence Sports Bloatware OneDrive IT consulting Touchpad Keyboard eWaste Bring Your Own Device Mouse Windows 8 Politics Paperless Office Workplace Operating Sysytem Hiring/Firing Television Scalability Network Congestion Vendor Management Files Experience Miscelllaneous WIndows 7 Bluetooth Trending How To Computing Storage Chromecast Music HIPAA Two-factor Authentication Travel SharePoint Regulations Prodcuctivity Administrator Books Customer Relationship Management ISP Teamwork User 3D Printing Online Backup Reputation Black Market Excel

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...