‘SmartAttack’: New Covert Threat Uses Smartwatches to Steal Data from Air-Gapped Systems via Ultrasound

 

A new cybersecurity threat dubbed “SmartAttack” demonstrates how smartwatches can covertly capture ultrasonic signals to extract sensitive data from air-gapped computers—systems traditionally considered highly secure due to their physical isolation from external networks.
Air-gapped environments are widely used in sensitive sectors such as defense, government, and nuclear power facilities to safeguard against external cyber intrusions. However, researchers have long warned that insider threats or state-sponsored supply chain attacks can bypass this isolation, allowing malware to operate silently.
Once a device is compromised, malware can manipulate physical components like speakers, screens, and cables to transmit confidential information to nearby receivers—without affecting the machine’s core operations.
“SmartAttack was devised by Israeli university researchers led by Mordechai Guri, a specialist in the field of covert attack channels who previously presented methods to leak data using LCD screen noise, RAM modulation, network card LEDs, USB drive RF signals, SATA cables, and power supplies.”
In SmartAttack, once malware is present on an air-gapped machine, it collects sensitive data—such as keystrokes, credentials, and encryption keys—and emits ultrasonic signals through the computer’s built-in speakers using binary frequency shift keying (B-FSK). These

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: