• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new air gap attack uses sata cable as an antenna to

New Air-Gap Attack Uses SATA Cable as an Antenna to Transfer Radio Signals

You are here: Home / General Cyber Security News / New Air-Gap Attack Uses SATA Cable as an Antenna to Transfer Radio Signals
July 19, 2022

A new strategy devised to leak info and jump more than air-gaps takes benefit of Serial Advanced Technology Attachment (SATA) or Serial ATA cables as a conversation medium, introducing to a lengthy list of electromagnetic, magnetic, electric, optical, and acoustic solutions previously demonstrated to plunder data.

“Though air-hole computer systems have no wi-fi connectivity, we display that attackers can use the SATA cable as a wireless antenna to transfer radio alerts at the 6GHz frequency band,” Dr. Mordechai Guri, the head of R&D in the Cyber Security Investigation Center in the Ben Gurion College of the Negev in Israel, wrote in a paper printed previous 7 days.

The system, dubbed SATAn, can take gain of the prevalence of the laptop or computer bus interface, making it “very accessible to attackers in a vast array of personal computer methods and IT environments.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Set only, the intention is to use the SATA cable as a covert channel to emanate electromagnetic signals and transfer a quick sum of delicate data from very secured, air-gapped computers wirelessly to a close by receiver additional than 1m away.

CyberSecurity

An air-gapped network is a person that is physically isolated from any other networks in order to increase its security. Air-gapping is witnessed as an vital mechanism to safeguard substantial-benefit units that are of huge fascination to espionage-enthusiastic menace actors.

That reported, attacks targeting critical mission-handle devices have developed in number and sophistication in latest years, as observed not too long ago in the scenario of Industroyer 2 and PIPEDREAM (aka INCONTROLLER).

Dr. Guri is no stranger to coming up with novel methods to extract sensitive details from offline networks, with the researcher concocting four distinctive ways because the start off of 2020 that leverage several side-channels to surreptitiously siphon information and facts.

These consist of BRIGHTNESS (Lcd screen brightness), Electricity-SUPPLaY (ability source unit), AIR-FI (Wi-Fi signals), and LANtenna (Ethernet cables). The most recent strategy is no distinct, wherein it can take advantage of the Serial ATA cable to accomplish the similar plans.

Serial ATA is a bus interface and an Built-in Drive Electronics (IDE) normal that is applied to transfer information at increased charges to mass storage equipment. Just one of its main makes use of is to join challenging disk drives (HDD), sound-point out drives (SSD), and optical drives (CD/DVD) to the computer’s motherboard.

CyberSecurity

Not like breaching a common network by implies of spear-phishing or watering holes, compromising an air-gapped network necessitates a lot more advanced procedures this kind of as a offer chain attack, using detachable media (e.g., USBStealer and USBFerry), or rogue insiders to plant malware.

For an adversary whose goal is to steal private information, financial facts, and mental home, the first penetration is only the get started of the attack chain that is followed by reconnaissance, data accumulating, and facts exfiltration via workstations that include active SATA interfaces.

In the remaining info reception stage, the transmitted knowledge is captured by a concealed receiver or depends on a malicious insider in an organization to have a radio receiver in close proximity to the air-gapped program. “The receiver screens the 6GHz spectrum for a opportunity transmission, demodulates the data, decodes it, and sends it to the attacker,” Dr. Guri spelled out.

As countermeasures, it really is proposed to acquire steps to avert the danger actor from getting an first foothold, use an external Radio frequency (RF) checking system to detect anomalies in the 6GHz frequency band from the air-gapped system, or alternatively polluting the transmission with random read through and publish functions when a suspicious covert channel activity is detected.

Uncovered this short article attention-grabbing? Observe THN on Facebook, Twitter  and LinkedIn to go through a lot more distinctive content we article.


Some pieces of this article are sourced from:
thehackernews.com

Previous Post: «cisa chooses london for its first ever overseas office CISA chooses London for its first-ever overseas office
Next Post: Flipkart’s Cleartrip suffers “massive” data breach flipkart’s cleartrip suffers “massive” data breach»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.