Skip to content

Covert Data Theft on Air-Gapped Systems Facilitated by Manipulated Smartwatches

Transmits or acquires information to, or about, your pet canine

Transmits or collects information to your pet canine
Transmits or collects information to your pet canine

Covert Data Theft on Air-Gapped Systems Facilitated by Manipulated Smartwatches

Security researchers have discovered a sneaky new method called 'SmartAttack' for stealing sensitive data from air-gapped systems. These systems are meant to be isolated from the internet and are usually used in high-security environments.

TheSmartAttack process involves deploying malware on the target's computer that gathers valuable information to exfiltrate. Next, the malware employs the computer's speakers to emit ultrasonic sounds, inaudible to human ears, to the surrounding environment. These sounds are emitted at two frequencies – 18.5 kHz and 19.5 kHz – creating binary data with 18.5 kHz representing zero and 19.5 kHz representing one.

Finally, the attacker's smartwatch picks up these sounds, provided it's within a range of 6-9 meters from the computer's speakers and has a special app installed. The watch needs to face the speakers, and the data transmission rate ranges between 5bps and 50bps.

The SmartAttack method is not quite straightforward, considering its dependencies on both physical access to the target computer and a compromised smartwatch. However, it represents a novel approach for bypassing security measures and stealing sensitive data, including login credentials and encryption keys.

To prevent SmartAttacks, you can take measures such as restricting the use of smartwatches, removing speakers from computers, or employing sound jammers.

More articles you might find interesting:

European Government Systems hit by Air-Gap Malware AttackOur guide to the Best Authenticator AppsOur roundup of the Best Password Managers

  1. This innovative method, known as SmartAttack, serves as a reminder of the importance of cybersecurity in data-and-cloud-computing and technology, especially in high-security environments.
  2. To address the evolving threats like SmartAttack, it's crucial to implement measures such as restricting smartwatch usage, eliminating speakers from computers, or utilizing sound jammers, ensuring better protection of sensitive data like login credentials and encryption keys.

Read also:

    Latest