Tuesday, May 5th 2020

POWER-SUPPLaY Cyberattack Steals Data From Air-Gapped PC via Power Supply

It was only a few weeks ago when we reported that Dr. Mordechai Guri and his team had devised a new cyberattack known as Air-ViBeR which could use the vibrations of a PC's fans to steal data by regulating fan speed and recording the sounds on a nearby smartphone. This time Dr. Mordechai and his team have discovered a way to silently transmit data from the ultrasonic frequencies put out by a PC power supply they have dubbed this new attack POWER-SUPPLaY. The cyberattack involves a piece of malware that can alter system load by changing the CPU workload, this causes the PC power supply to change its ultrasonic frequencies which can be detected by a smartphone at a maximum distance of 5 m.

While this cyberattack is certainly technologically impressive, it is unlikely to ever be used out of anything but a Hollywood movie due to some fatal limitations. The attack requires the computer to be compromised and for a mobile device to be within listening distance for a prolonged time, the transmission rate of the attack is only 50 bits per second, or equivalent to about 22.5 kB per hour. With such a low transmission rate the only data that could be feasibly transmitted would be plain text at a rate of 10,000 words an hour.
Dr. Mordechai Guri and his team have posted a demonstration video of the cyberattack in action.

Source: Air-Gap Research Page
Add your own comment

9 Comments on POWER-SUPPLaY Cyberattack Steals Data From Air-Gapped PC via Power Supply

#1
Alexandrus
Who the heck pays for these so called studies ? I mean, seriously..
And these people call themselves "scientists", what a joke. "Dr. Mordechai Guri and his team"...just wow, impressive work indeed.

Between these and the vulnerabilities of mainstream desktop CPUs, that affect pretty much nobody ever using a PC for mainstream purposes, like media consumption, gaming, editing and such, the entire field oif people finding "vulnerabilities" in modern PCs is becoming a joke.
Posted on Reply
#2
metalslaw
Apparently it's the 1st of April.
Posted on Reply
#3
moproblems99
AlexandrusWho the heck pays for these so called studies ? I mean, seriously..
And these people call themselves "scientists", what a joke. "Dr. Mordechai Guri and his team"...just wow, impressive work indeed.

Between these and the vulnerabilities of mainstream desktop CPUs, that affect pretty much nobody ever using a PC for mainstream purposes, like media consumption, gaming, editing and such, the entire field oif people finding "vulnerabilities" in modern PCs is becoming a joke.
It may not be feasible but it is still fundamentally interesting. It's ok that these things aren't for you, the Legos are over there.

PS: I like Legos too.
Posted on Reply
#4
Vayra86
Imagine if you're English language and you see it constantly mangled like this.

Air Supplay? Viber? :twitch:
Posted on Reply
#5
DeathtoGnomes
Vayra86Imagine if you're English language and you see it constantly mangled like this.

Air Supplay? Viber? :twitch:
IT could be worse...
Posted on Reply
#6
Caring1
Secure your air gapped PC, fill it with expanding foam. :p :roll:
Posted on Reply
#7
rutra80
There's ongoing patch from all major CPU vendors that will run a 100% busy task in the background all the time to render this vulnerability useless. Researchers expect that it might affect performance of our systems significantly.
Posted on Reply
#8
Jism
Everything in a way is based on RF signals inside a PC. This was already obvious with the 70's and the 27mc thing. If you can find a way to 'listen' to those signals it's pretty much easy to obfuscate on what a PC is doing. I mean coilwhine in a way is a RF based signal too. You could extract the data a GPU is processing if you knew how to build the tools for it. As far as i know, a AMD cpu encrypts the stuff that it's doing.

But in order to fully protect a PC from this stuff; or any device, just shield it out. That simple. This demonstration however could lead to future devices that could listen to a PC in general, and pretty much all it's doing. We're not far from this really.
Posted on Reply
#9
R-T-B
AlexandrusWho the heck pays for these so called studies ? I mean, seriously..
If you are in the USA, most likely your tax dollars. Thank the Military Industrial complex...

Seriously, while these aren't vulnerabilities in the traditional sense, that does not mean they are useless. Those who need them, pay for them.
JismWe're not far from this really.
Sensitivity wise... we kinda are.
Posted on Reply
Dec 12th, 2024 08:08 EST change timezone

New Forum Posts

Popular Reviews

Controversial News Posts