• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
creating wireless signals with ethernet cable to steal data from

Creating Wireless Signals with Ethernet Cable to Steal Data from Air-Gapped Systems

You are here: Home / General Cyber Security News / Creating Wireless Signals with Ethernet Cable to Steal Data from Air-Gapped Systems
October 4, 2021

A freshly discovered facts exfiltration system employs Ethernet cables as a “transmitting antenna” to stealthily siphon really-sensitive information from air-gapped programs, according to the most current investigation.

“It truly is interesting that the wires that came to shield the air-hole develop into the vulnerability of the air gap in this attack,” Dr. Mordechai Guri, the head of R&D in the Cyber Security Investigation Centre in the Ben Gurion College of the Negev in Israel, explained to The Hacker Information.

Dubbed “LANtenna Attack,” the novel procedure enables malicious code in air-gapped computer systems to amass delicate knowledge and then encode it around radio waves emanating from Ethernet cables just as if they are antennas. The transmitted signals can then be intercepted by a close by program-described radio (SDR) receiver wirelessly, decode the knowledge, and deliver it to an attacker who is in an adjacent area.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Notably, the destructive code can run in an standard consumer-mode method and successfully operate from inside a virtual device,” the scientists observed in an accompanying paper titled “LANTENNA: Exfiltrating Facts from Air-Gapped Networks via Ethernet Cables.”

Automatic GitHub Backups

Air-gapped networks are developed as a network security evaluate to limit the risk of information leakage and other cyber threats by ensuring that one particular or far more desktops are bodily isolated from other networks, these kinds of as the internet or a area spot network. They are commonly wired given that machines that are element of this sort of networks have their wi-fi network interfaces completely disabled or physically eliminated.

This is much from the 1st time Dr. Guri has shown unconventional strategies to leak delicate info from air-gapped personal computers. In February 2020, the security researcher devised a system that employs tiny changes in Lcd monitor brightness, which stays invisible to the naked eye, to modulate binary information in morse-code-like patterns covertly.

Then in Might 2020, Dr. Guri showed how malware could exploit a computer’s ability supply device (PSU) to play appears and use it as an out-of-band, secondary speaker to leak knowledge in an attack referred to as “Ability-SUPPLaY.”

Last of all, in December 2020, the researcher showed off “AIR-FI,” an attack that leverages Wi-Fi signals as a covert channel without having demanding the existence of Wi-Fi components on the focused techniques.

Enterprise Password Management

The LANtenna attack is no various in that it performs by using the malware in the air-gapped workstation to induce the Ethernet cable to make electromagnetic emissions in the frequency bands of 125 MHz that are then modulated and intercepted by a nearby radio receiver. In a evidence-of-idea demo, details transmitted from an air-gapped laptop or computer through its Ethernet cable was acquired at a length of 200 cm apart.

As countermeasures, the scientists suggest prohibiting the use of radio receivers in and all around air-gapped networks and checking the network interface card website link layer exercise for any covert channel, as well as jamming the indicators, and utilizing metallic shielding to limit electromagnetic fields from interfering with or emanating from the shielded wires.

“This paper displays that attackers can exploit the Ethernet cables to exfiltrate information from air-gapped networks,” the researchers mentioned in the paper. “Malware put in in a secured workstation, notebook, or embedded unit can invoke a variety of network things to do that deliver electromagnetic emissions from Ethernet cables.”

“Dedicated and high-priced antennas produce improved length and could get to tens of meters with some cables,” Dr. Guri added.

Identified this post interesting? Follow THN on Fb, Twitter  and LinkedIn to examine additional exceptional content we article.


Some areas of this article are sourced from:
thehackernews.com

Previous Post: «poorly configured apache airflow instances leak credentials for popular services Poorly Configured Apache Airflow Instances Leak Credentials for Popular Services
Next Post: Prolific Ransomware Operators Arrested in Joint Law Enforcement Action Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.