• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
covid bit: new covert channel to exfiltrate data from air gapped computers

COVID-bit: New COVert Channel to Exfiltrate Data from Air-Gapped Computers

You are here: Home / General Cyber Security News / COVID-bit: New COVert Channel to Exfiltrate Data from Air-Gapped Computers
December 8, 2022

An unconventional details exfiltration method leverages a beforehand undocumented covert channel to leak sensitive data from air-gapped units.

“The data emanates from the air-gapped laptop or computer above the air to a distance of 2 m and more and can be picked up by a close by insider or spy with a cellular phone or notebook,” Dr. Mordechai Guri, the head of R&D in the Cyber Security Exploration Heart in the Ben Gurion College of the Negev in Israel and the head of Offensive-Defensive Cyber Investigation Lab, claimed in a new paper shared with The Hacker News.

The system, dubbed COVID-bit, leverages malware planted on the equipment to make electromagnetic radiation in the -60 kHz frequency band that’s subsequently transmitted and picked up by a stealthy receiving machine in close actual physical proximity.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


This, in flip, is produced possible by exploiting the dynamic electric power consumption of modern computer systems and manipulating the momentary masses on CPU cores.

CyberSecurity

COVID-bit is the latest procedure devised by Dr. Guri this yr, after SATAn, GAIROSCOPE, and ETHERLED, which are designed to jump above air-gaps and harvest private info.

Air-gapped networks, in spite of their substantial level of isolation, can be compromised by many procedures this kind of as infected USB drives, supply chain attacks, and even rogue insiders.

Exfiltrating the details just after breaching the network, however, is a challenge owing to the absence of internet connectivity, necessitating that attackers concoct distinctive techniques to supply the facts.

The COVID-bit is one particular this sort of covert channel that is utilised by the malware to transmit information and facts by using advantage of the electromagnetic emissions from a component named switched-manner energy offer (SMPS) and employing a mechanism called frequency-change keying (FSK) to encode the binary information.

Air-Gapped Computers

“By regulating the workload of the CPU, it is doable to govern its electricity consumption and that’s why management the momentary switching frequency of the SMPS,” Dr. Guri clarifies.

“The electromagnetic radiation produced by this intentional system can be been given from a length applying proper antennas” that price tag as very low as $1 and can be linked to a phone’s 3.5 mm audio jack to seize the very low-frequency alerts at a bandwidth of 1,000 bps.

The emanations are then demodulated to extract the info. The attack is also evasive in that the destructive code isn’t going to demand elevated privileges and can be executed from within just a digital device.

An analysis of the information transmissions reveals that keystrokes can be exfiltrated in in the vicinity of real-time, with IP and MAC addresses taking any where amongst a lot less than .1 seconds to 16 seconds, based on the bitrate.

Countermeasures in opposition to the proposed covert channel consist of carrying out dynamic opcode investigation to flag threats, initiate random workloads on the CPU processors when anomalous exercise is detected, and monitoring or jamming signals in the -60 kHz spectrum.

Observed this write-up exciting? Follow us on Twitter  and LinkedIn to go through a lot more exclusive content we write-up.


Some areas of this post are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Pet Dog Unmasks Drug Trafficker on Encrypted Chat
Next Post: Apple steps up user security with end-to-end encryption for iCloud apple steps up user security with end to end encryption for icloud»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.