DV Hardware - bringing you the hottest news about processors, graphics cards, Intel, AMD, NVIDIA, hardware and technology!
   Home | News submit | News Archives | Reviews | Articles | Howto's | Advertise
DarkVision Hardware - Daily tech news
May 24, 2019 
Main Menu
News archives

Who's Online
There are currently 185 people online.


Latest Reviews
Ewin Racing Flash gaming chair
Arctic BioniX F120 and F140 fans
Jaybird Freedom 2 wireless sport headphones
Ewin Racing Champion gaming chair
Zowie P-TF Rough mousepad
Zowie FK mouse
BitFenix Ronin case
Ozone Rage ST headset

Follow us

Security researchers show howto steal data from air gapped PC using FM radio waves

Posted on Wednesday, October 29 2014 @ 13:28:33 CET by

Security researchers from Israel's Ben-Gurion University have detailed their efforts on how it's possible to transmit data from an "air gapped" PC that is physically isolated from unsecured networks.

The technique only works at a very short range and has very low bandwidth but it proofs it could be possible to steal data like passwords and other user input from high-security facilities. It works by intercepting maliciously crafted radio signals emitted from the screen of the isolated computer, these radio signals are then intercepted by a smartphone with FM radio receiver.

While it's a neat concept, the biggest hurdle is probably how to infect the computer with the software that creates the required radio emissions from the video display unit.
The main idea behind the research is to use radio frequencies in order to transmit the secret data from the computer to the mobile phone. Mobile phones usually come equipped with FM radio receivers and it is already known that software can intentionally create radio emissions from a video display unit. Yes, from the computer screen. Still, this is the first time that a mobile phone is considered in an attack model as the intended receiver of maliciously crafted radio signals emitted from the screen of the isolated computer. AirHopper demonstrates how textual and binary data can be exfiltrated from physically a isolated computer to mobile phones at a distance of 1-7 meters, with effective bandwidth of 13-60 Bps (Bytes per second). Enough to steal a secret password.



DV Hardware - Privacy statement
All logos and trademarks are property of their respective owner.
The comments are property of their posters, all the rest © 2002-2019 DM Media Group bvba