Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » "AirHopper" malware uses radio signals to steal data from isolated computers

"AirHopper" malware uses radio signals to steal data from isolated computers

2014/10/30

Securityweek - (International) Researchers at the Ben Gurion University created a proof-of-concept malware dubbed AirHopper that was used to demonstrate a data exfiltration attack against air gapped systems using radio signals produced by the target system's graphics card. The attack requires adding the malware to the target system and installing malicious code onto a nearby mobile device in order to set up the channel for transmitting the data sent from the target system.

Source: http://www.securityweek.com/airhopper-malware-uses-radio-signals-steal-data-isolated-computers

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:22:18