• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new air gap attack uses sata cable as an antenna to

New Air-Gap Attack Uses SATA Cable as an Antenna to Transfer Radio Signals

You are here: Home / General Cyber Security News / New Air-Gap Attack Uses SATA Cable as an Antenna to Transfer Radio Signals
July 19, 2022

A new strategy devised to leak info and jump more than air-gaps takes benefit of Serial Advanced Technology Attachment (SATA) or Serial ATA cables as a conversation medium, introducing to a lengthy list of electromagnetic, magnetic, electric, optical, and acoustic solutions previously demonstrated to plunder data.

“Though air-hole computer systems have no wi-fi connectivity, we display that attackers can use the SATA cable as a wireless antenna to transfer radio alerts at the 6GHz frequency band,” Dr. Mordechai Guri, the head of R&D in the Cyber Security Investigation Center in the Ben Gurion College of the Negev in Israel, wrote in a paper printed previous 7 days.

The system, dubbed SATAn, can take gain of the prevalence of the laptop or computer bus interface, making it “very accessible to attackers in a vast array of personal computer methods and IT environments.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Set only, the intention is to use the SATA cable as a covert channel to emanate electromagnetic signals and transfer a quick sum of delicate data from very secured, air-gapped computers wirelessly to a close by receiver additional than 1m away.

CyberSecurity

An air-gapped network is a person that is physically isolated from any other networks in order to increase its security. Air-gapping is witnessed as an vital mechanism to safeguard substantial-benefit units that are of huge fascination to espionage-enthusiastic menace actors.

That reported, attacks targeting critical mission-handle devices have developed in number and sophistication in latest years, as observed not too long ago in the scenario of Industroyer 2 and PIPEDREAM (aka INCONTROLLER).

Dr. Guri is no stranger to coming up with novel methods to extract sensitive details from offline networks, with the researcher concocting four distinctive ways because the start off of 2020 that leverage several side-channels to surreptitiously siphon information and facts.

These consist of BRIGHTNESS (Lcd screen brightness), Electricity-SUPPLaY (ability source unit), AIR-FI (Wi-Fi signals), and LANtenna (Ethernet cables). The most recent strategy is no distinct, wherein it can take advantage of the Serial ATA cable to accomplish the similar plans.

Serial ATA is a bus interface and an Built-in Drive Electronics (IDE) normal that is applied to transfer information at increased charges to mass storage equipment. Just one of its main makes use of is to join challenging disk drives (HDD), sound-point out drives (SSD), and optical drives (CD/DVD) to the computer’s motherboard.

CyberSecurity

Not like breaching a common network by implies of spear-phishing or watering holes, compromising an air-gapped network necessitates a lot more advanced procedures this kind of as a offer chain attack, using detachable media (e.g., USBStealer and USBFerry), or rogue insiders to plant malware.

For an adversary whose goal is to steal private information, financial facts, and mental home, the first penetration is only the get started of the attack chain that is followed by reconnaissance, data accumulating, and facts exfiltration via workstations that include active SATA interfaces.

In the remaining info reception stage, the transmitted knowledge is captured by a concealed receiver or depends on a malicious insider in an organization to have a radio receiver in close proximity to the air-gapped program. “The receiver screens the 6GHz spectrum for a opportunity transmission, demodulates the data, decodes it, and sends it to the attacker,” Dr. Guri spelled out.

As countermeasures, it really is proposed to acquire steps to avert the danger actor from getting an first foothold, use an external Radio frequency (RF) checking system to detect anomalies in the 6GHz frequency band from the air-gapped system, or alternatively polluting the transmission with random read through and publish functions when a suspicious covert channel activity is detected.

Uncovered this short article attention-grabbing? Observe THN on Facebook, Twitter  and LinkedIn to go through a lot more distinctive content we article.


Some pieces of this article are sourced from:
thehackernews.com

Previous Post: «cisa chooses london for its first ever overseas office CISA chooses London for its first-ever overseas office
Next Post: Flipkart’s Cleartrip suffers “massive” data breach flipkart’s cleartrip suffers “massive” data breach»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
  • China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies

Copyright © TheCyberSecurity.News, All Rights Reserved.