{"id":7608,"date":"2022-12-23T14:21:13","date_gmt":"2022-12-23T21:21:13","guid":{"rendered":"https:\/\/mattfife.com\/?p=7608"},"modified":"2022-12-23T14:21:13","modified_gmt":"2022-12-23T21:21:13","slug":"completely-isolated-pcs-are-vulnerable-to-data-theft-via-their-switching-power-supplies","status":"publish","type":"post","link":"https:\/\/mattfife.com\/?p=7608","title":{"rendered":"Completely isolated PC&#8217;s are vulnerable to data theft &#8211; via their switching power supplies."},"content":{"rendered":"\n<p>&#8220;Air gapping&#8221; is a security measure that involves a computer being physically isolated and incapable of connecting wirelessly or physically with other computers or network devices. It&#8217;s used in high security setups. The idea is that if the system is physically incapable of connecting to other systems or networks, it should be safe. Right? <\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/air-gapped-pcs-vulnerable-to-data-theft-via-power-supply-radiation\/#:~:text=To%20transmit%20the%20data%20in,(0%20%E2%80%93%2048%20kHz).\" data-type=\"URL\" data-id=\"https:\/\/www.bleepingcomputer.com\/news\/security\/air-gapped-pcs-vulnerable-to-data-theft-via-power-supply-radiation\/#:~:text=To%20transmit%20the%20data%20in,(0%20%E2%80%93%2048%20kHz).\" target=\"_blank\" rel=\"noreferrer noopener\">A new attack method named COVID-bit uses electromagnetic waves from power supplies to transmit data from air-gapped systems<\/a>. Using this attack, even if the computer is completely isolated and unplugged from the internet, the researchers demonstrated collecting information emanating from the device by a nearby smartphone or laptop over a distance of at least two meters &#8211; even if a wall separates the two.<\/p>\n\n\n\n<p>Researchers created a malware program that regulates CPU load and core frequency in a particular manner to make the power supplies on air-gapped computers emanate electromagnetic radiation on a low-frequency band (0 \u2013 48 kHz). <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"244\" data-attachment-id=\"7609\" data-permalink=\"https:\/\/mattfife.com\/?attachment_id=7609\" data-orig-file=\"https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2022\/12\/image.png?fit=1363%2C519&amp;ssl=1\" data-orig-size=\"1363,519\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"image\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2022\/12\/image.png?fit=640%2C244&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2022\/12\/image.png?resize=640%2C244&#038;ssl=1\" alt=\"\" class=\"wp-image-7609\" srcset=\"https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2022\/12\/image.png?resize=1024%2C390&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2022\/12\/image.png?resize=300%2C114&amp;ssl=1 300w, https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2022\/12\/image.png?resize=768%2C292&amp;ssl=1 768w, https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2022\/12\/image.png?resize=604%2C230&amp;ssl=1 604w, https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2022\/12\/image.png?w=1363&amp;ssl=1 1363w, https:\/\/i0.wp.com\/mattfife.com\/wp-content\/themes\/mattTheme\/headerimgs\/2022\/12\/image.png?w=1280&amp;ssl=1 1280w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<p>While the attack requires at least one instance of physical access to install the malware, such attacks have happened. Examples include the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stuxnet\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Stuxnet\" target=\"_blank\" rel=\"noreferrer noopener\">Stuxnet worm<\/a> in Iran&#8217;s uranium enrichment facility at Natanz, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Agent.BTZ\" data-type=\"URL\" data-id=\"https:\/\/en.wikipedia.org\/wiki\/Agent.BTZ\" target=\"_blank\" rel=\"noreferrer noopener\">Agent.BTZ<\/a> that infected a U.S. military base, and the <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2016_remsec-top-level-espionage-platform-covertly-extracts-encrypted-government-comms\" data-type=\"URL\" data-id=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2016_remsec-top-level-espionage-platform-covertly-extracts-encrypted-government-comms\" target=\"_blank\" rel=\"noreferrer noopener\">Remsec modular<\/a> backdoor that collected information from air-gapped government networks for over five years.<\/p>\n\n\n\n<p>Mordechai Guri explains the primary source of electromagnetic radiation in switched mode power supplies is due to their internal design and switching characteristics in the\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/arxiv.org\/pdf\/2212.03520.pdf\" target=\"_blank\">technical paper<\/a>. \u201cIn the conversion from AC-DC and DC-DC, the MOSFET switching components turning on or off at specific frequencies create a square wave,\u201d the researcher details. The electromagnetic wave can carry a payload of raw data, following a strain of eight bits that signify the beginning of the transmission. <\/p>\n\n\n\n<p>The attack works against air gapped pc&#8217;s, laptops, and even a raspberry pi. The receiver can be as simple as a cell phone. <\/p>\n\n\n\n<p>Definitely worth a read.<\/p>\n\n\n\n<p>Links:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/air-gapped-pcs-vulnerable-to-data-theft-via-power-supply-radiation\/#:~:text=To%20transmit%20the%20data%20in,(0%20%E2%80%93%2048%20kHz).\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.bleepingcomputer.com\/news\/security\/air-gapped-pcs-vulnerable-to-data-theft-via-power-supply-radiation\/#:~:text=To%20transmit%20the%20data%20in,(0%20%E2%80%93%2048%20kHz).<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/arxiv.org\/pdf\/2212.03520.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/arxiv.org\/pdf\/2212.03520.pdf<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Air gapping&#8221; is a security measure that involves a computer being physically isolated and incapable of connecting wirelessly or physically with other computers or network devices. It&#8217;s used in high security setups. The idea is that if the system is physically incapable of connecting to other systems or networks, it should be safe. Right? A new attack method named COVID-bit uses electromagnetic waves from power supplies to transmit data from air-gapped systems. Using this attack, even if the computer is&#8230;<\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"https:\/\/mattfife.com\/?p=7608\"> Read More<span class=\"screen-reader-text\">  Read More<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9,5],"tags":[],"class_list":["post-7608","post","type-post","status-publish","format-standard","hentry","category-cool","category-technical"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4WECr-1YI","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/mattfife.com\/index.php?rest_route=\/wp\/v2\/posts\/7608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mattfife.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mattfife.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mattfife.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/mattfife.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7608"}],"version-history":[{"count":1,"href":"https:\/\/mattfife.com\/index.php?rest_route=\/wp\/v2\/posts\/7608\/revisions"}],"predecessor-version":[{"id":7610,"href":"https:\/\/mattfife.com\/index.php?rest_route=\/wp\/v2\/posts\/7608\/revisions\/7610"}],"wp:attachment":[{"href":"https:\/\/mattfife.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mattfife.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mattfife.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}