thehackernews.com - New Air-Gap Attack Uses SATA Cable as an Antenna to Transfer Radio Signals
home - domains - thehackernews.com
cyber security news cyber news cyber security news today cyber security updates cyber updates hacker news hacking news software vulnerability cyber attacks data breach ransomware malware how to hack network security information security the hacker news computer security
Goto Site
https://thehackernews.com/2022/07/new-air-gap-attack-uses-sata-cable-as.html
Site Description
Researchers demonstrated a new Air-Gap attack, dubbed SATAn, in which attackers can use SATA cable as a wireless antenna to transmit radio signals.
Example Site Content
New Air-Gap Attack Uses SATA Cable as an Antenna to Transfer Radio Signals #1 Trusted Cybersecurity News Platform Followed by 4.50+ million Subscribe – Get Latest News Home Newsletter Webinars Home Data Breaches Cyber Attacks Vulnerabilities Webinars Expert Insights Contact Resources Webinars THN Store Free eBooks About Site About THN Jobs Advertise with us Contact/Tip Us Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback! Follow Us On Social Media RSS Feeds Email Alerts Telegram Channel New Air-Gap Attack Uses SATA Cable as an Antenna to Transfer Radio Signals Jul 19, 2022Ravie Lakshmanan A new method devised to leak information and jump over air-gaps takes advantage of Serial Advanced Technology Attachment (SATA) or Serial ATA cables as a communication medium, adding to a long list of electromagnetic, magnetic, electric, optical, and acoustic methods already demonstrated to plunder data. "Although air-gap computers have no wireless connectivity, we show that attackers can use the SATA cable as a wireless antenna to transfer radio signals at the 6GHz frequency band," Dr. Mordechai Guri, the head of R&D in the Cyber Security Research Center in the Ben Gurion University of the Negev in Israel, wrote in a paper published last week. The technique, dubbed SATAn, takes advantage of the prevalence of the computer bus interface, making it "highly available to attackers in a wide range of computer systems and IT environments." Put simply, the goal is to use the SATA cable as a covert channel to emanate electromagnetic signals and transfer a brief amount of sensitive information from highly secured, air-gapped computers wirelessly to a nearby receiver more than 1m away. An air-gapped network is one that's physically isolated from any other networks in order to increase its security. Air-gapping is seen as an essential mechanism to safeguard high-value systems that are of huge interest to espionage-motivated threat actors. That said, attacks targeting critical mission-control systems have grown in number and sophistication in recent years, as observed recently in the case of Industroyer 2 and PIPEDREAM (aka INCONTROLLER). Dr. Guri is no stranger to coming up with novel techniques to extract sensitive data from offline networks, with the researcher concocting four different approaches since the start of 2020 that leverage various side-channels to surreptitiously siphon information. These include BRIGHTNESS (LCD screen brightness), POWER-SUPPLaY (power supply unit), AIR-FI (Wi-Fi signals), and LANtenna (Ethernet cables). The latest approach is no different, wherein it takes advantage of the Serial ATA cable to achieve the same goals. Serial ATA is a bus interface and an Integrated Drive Electronics (IDE) standard that's used to transfer data at higher rates to mass storage devices. One of its chief uses is to connect hard disk drives (HDD), solid-state drives (SSD), and optical drives (CD/DVD) to the computer's motherboard. Unlike breaching a traditional network by means of spear-phishing or watering holes, compromising an air-gapped network requires more complex strategies such as a supply chain attack, using removable media (e.g., USBStealer and USBFerry), or rogue insiders to plant malware. For an adversary whose aim is to steal confidential information, financial data, and intellectual property, the initial penetration is only the start of the attack chain that's followed by reconnaissance, data gathering, and data exfiltration through workstations that contain active SATA interfaces. In the final data reception phase, the transmitted data is captured through a hidden receiver or relies on a malicious insider in an organization to carry a radio receiver near the air-gapped system. "The receiver monitors the 6GHz spectrum for a potential transmission, demodulates the data, decodes it, and sends it to the attacker," Dr. Guri explained. As countermeasures, it's recommended to take steps to prevent the threat actor from gaining an initial foothold, use an external Radio frequency (RF) monitoring system to detect anomalies in the 6GHz frequency band from the air-gapped system, or alternatively polluting the transmission with random read and write operations when a suspicious covert channel activity is detected. Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post. SHARE Tweet Share Share Share Share on Facebook Share on Twitter Share on Linkedin Share on Reddit Share on Hacker News Share on Email Share on WhatsApp Share on Facebook Messenger Share on Telegram SHARE Air Gap Hackingair-gapped computercybersecurityhacking news Trending News The Facts About Cont
Websites with similar content
-
thisiswhyimbroke.xyz
This is why im broke
-
pricemon.net
Price Monitor
-
access.articulate.com
Events About Articulate E-Learning Software, Interactive Course Development, and More
-
seller.dhgate.com
DHgate is a fast foreign trade platform for small and medium businesses - world's leading B2B platform for cross-border export e-commerce
-
telbib.eso.org
ESO Telescope Bibliography - First Very Long Baseline Interferometry Detections at 870 μm
-
gadgetsnow.indiatimes.com
Technology News, Latest & Popular Gadgets Reviews, Specifications, Prices, Mobile Comparison, Technology Videos & Photos | Gadgets Now
-
epaper.newindianexpress.com
The New Indian Express: ePaper Subscription Online, English Newspaper Subscription, Today Newspaper | epaper Online
-
www.myheritage.ro
MyHeritage Deep Nostalgia™, tehnologie de învățare profundă pentru animarea chipurilor din fotografiile statice de familie - MyHeritage
-
environicsanalytics.com
Environics Analytics | Premier Data and Analytics Services Company | Environics Analytics
-
www.awai.com
Why 73% of B2B Marketers Are Publishing Case Studies — And Why You Should Get in the Game Now
-
timesofindia.indiatimes.com
Isro-Nasa mission to ISS: Who is Shubhanshu Shukla? The lead astronaut for Indo-US ISS mission to be second indian in space | India News - Times of India
-
www.euronews.com
Lunar eclipse in Europe: How and where to see a supermoon, harvest moon and partial eclipse in one | Euronews
-
www.jhuapl.edu
Europa Clipper Solar Arrays Mounted and Ready for Journey to Jupiter | Johns Hopkins University Applied Physics Laboratory
-
brainpaint.com
Neurofeedback | EEG biofeedback | What is Neurofeedback? | Find Neurofeedback | Neurofeedback Equipment
-
nypost.com
Exclusive | Boeing employees 'humiliated' that SpaceX will save astronauts stuck in space
-
www.aljazeera.com
Boeing’s Starliner returns to Earth – leaving crew behind | Space News | Al Jazeera
-
www.discoverlosangeles.com
Visit Los Angeles. Find Things to Do in LA. California Travel Guides | Discover Los Angeles
-
www.indiatoday.in
Earth receives the first-ever picture of Mercury's South Pole from BepiColombo - India Today
-
wordsmith.org
A.Word.A.Day Home Page : Word of the day, vocabulary, wordpower, words, language, quote, quotes, quotation, quotations, english, dictionary, lexicon, logophile, wordsmith, vocabulaire, vocabulario
-
qrcode-ai.com
Free QR Code AI Art Generator (2024) • Scanner, Link In Bio, Smart Link, Analytics, Workspace, Monkey, Tiger
-
www.irma-international.org
IRMA-International.org: Celebrity and Influencer in a Fan Economy: Unfolding the Fans' Roles in Enhancing Endorsement Effects: Kineta Hung: Book Chapters
-
www.netline.com
NetLine Privacy Shield Privacy Policy - Successful B2B Marketers Start Here - B2B Content Syndication Lead Generation
-
gujarati.bseindia.com
Bombay Stock Exchange - BSE Gujarati site for SENSEX, stock quotes and market trends
-
www.dnaindia.com
Chandrayaan-3: ISRO Chief S Somanath reveals how Pragyan Rover discovered minerals on Moon
-
wenews.cc
Wenews - Micro News - Daily News pickup
-
netgeninus.com
NetGeninus - Helps you making money, making wealth, creating an strategy