06Jun

doesn’t involve exploiting bugs or vulnerabilities in software. Instead, they found a way to do it by controlling a computer’s cooling fan.

Amazingly, they found hackers could encode stored data into fan vibrations by imperceptibly slowing down or speeding up the fan’s rotation. The fan causes the computer itself and the surface it’s on to vibrate and these vibrations can be picked up by a smartphone and then retrieved by a hacker.

“We observe that computers vibrate at a frequency correlated to the rotation speed of their internal fans,” lead researcher Mordechai Guri told Tech Xplore. “These inaudible vibrations affect the entire structure on which the computer is placed.”

“The malware in question doesn’t exfiltrate data by cracking encryption standards or breaking through a network firewall,” he said. “Instead, it encodes data in vibrations and transmits it to the accelerometer of a smartphone.”

While the process of transmitting the data is extremely slow, and therefore not likely to be adopted by hackers (spy services maybe?) it is yet another demonstration of how it is possible to access a computer that is air-gapped, meaning it is isolated and not connected to the internet.

Guri is head of R&D at the univerity’s Cyber-Security Research Center. He and his team specialize in finding ways to access data from highly secure systems and devising methods of protecting against the threats.

In the case of the fan vibration hack, a simple method of protecting against it is to make the fan speed unchangeable.

Photo by Florian Olivo on Unsplash

[bdp_post_carousel]

Green Key Unlocked: The Effect of Tech Layoffs

Companies such as Microsoft and Google have cut thousands of positions in the last few months. In an effort to prepare for a darker economy, there are new layoff announcements emerging from Big Tech every day.

Homeland Security Issues Windows Bug Alert

Tens of thousands – perhaps hundreds of thousands — of Windows 10 users are vulnerable to a “wormable bug” so serious it has been given the highest score possible of the Common Vulnerability Scoring System.

Although Microsoft issued a fix for the bug in March, Homeland Security’s Cybersecurity and Infrastructure Security Agency issued an alert warning of the potential risk to systems that have not installed the fix.

Commonly referred to as SMBGhost, the vulnerability in Windows 10 systems was recently shown to be exploitable. That could give hackers complete access to the computer and, because the vulnerability is considered “wormable,” the exploit code can spread throughout a network, infecting all connected Windows 10 systems.

By default, Windows 10 automatically checks and installs updates. Home and small business users should already have the patch installed. You can check by following the directions from Microsoft.

However, estimates of the unprotected PCs range from the tens of thousands into the hundreds of thousands. For these systems, the risk of being successfully attacked and having the exploit spread is what prompted the Homeland Security warning. The agency warned that “Malicious cyber actors are targeting unpatched systems.”

In 2017, a wormable bug lead to the WannaCry ransomware spread, which disrupted businesses, government and transportation, and in the UK forced hospitals to halt activities and even turn patients away. Microsoft had issued a patch for the hacking tools that had been developed and stolen from the National Security Agency, but millions did not install it, leading to the disruption and damages worldwide estimated in the billions.

Photo by Caspar Camille Rubin on Unsplash

[bdp_post_carousel]