Apr 18 11

passwdResearchers from Cyber-Security Research Center at Ben-Gurion University have created bridgeware that can stealthily exfiltrate data from air-gapped computers using power lines.
In their POC, a malicious code is running on a compromised computer system which has control over the power consumption by intentionally regulating the CPU utilization. In this case data is modulated, encoded, and transmitted on top of the current flow fluctuations, and then it is conducted and propagated through the power lines.
In their paper the researchers present two versions of that attack:

  • Line level power-hammering: In this attack, the attacker taps the in-home powerlines that are directly attached to the electrical outlet.
  • Phase level power-hammering: In this attack, the attacker taps the power lines at the phase level, in the main electrical service panel

Read the whole paper: PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines

written by d45id \\ tags: , , , , ,