Hackers can steal data through PC fan vibrations

Researchers show how fan speeds can be regulated to encode and transmit sensitive data

Cyber criminals can exfiltrate sensitive data from a PC sat within an air-gapped system by using malware to manipulate the vibrations from internal CPU and GPU fans, it has emerged.

By exploiting ‘air-gap covert channels’, hackers can steal data from systems totally isolated from network connectivity, beyond tightly-controlled local networks. Such air-gapped systems are normally used by corporate or government networks, and computer systems used for national defence.

Breaching systems without physical or network access is a challenge, but researchers have proven that a PC’s internal fans, such as GPU, CPU or chassis fans, can be encoded with internally-stored data.

Computers are known to vibrate at a frequency that correlates with the rotation speed of internal fans. These vibrations can’t be heard, but can be felt on nearby surfaces, like a neighbouring desk.

However, it has been discovered that malware can be used to regulate the rotation speed of internal PC fans, the fluctuating vibrations from which can be encoded with sensitive data stored on these machines, according to Mordechai Guri, the head of R&D at Israel’s Ben-Gurion University of the Negev, as reported by ZDNet.

Academic research shows that vibrations generated by malware installed on an air-gapped system, which Guri branded as AiR-ViBeR, can encode binary information and modulate this over a low-frequency vibrational carrier.

This can subsequently be decoded using the accelerometer built-into any smartphone. By placing the device onto a nearby surface, software can be used to reconstruct the manipulated vibrations back into meaningful data.

There are a host of methods that cyber criminals could deploy to steal data from air-gapped systems, ranging from LED indicators on hard drives to screen brightness variations. However, Guri’s latest research is the first proving that vibrations can be manipulated to successfully transmit sensitive data from machines in air-gapped systems.

Although this method is perfectly feasible, it’s not likely to be deployed in real-life scenarios due to practicality reasons.

The research team managed to achieve a data exfiltration rate of only half a bit per second through fan vibrations in a test run, suggesting cyber criminals are likely to look to other methods to seize sensitive corporate data.

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

Wisconsin Republican Party allegedly loses $2.3 million to hackers
hacking

Wisconsin Republican Party allegedly loses $2.3 million to hackers

30 Oct 2020
What is hacktivism?
hacking

What is hacktivism?

13 Oct 2020
Microsoft: Iranian hackers are exploiting ZeroLogon flaw
Security

Microsoft: Iranian hackers are exploiting ZeroLogon flaw

6 Oct 2020
The Ritz suffers data breach after hackers pose as staff
data breaches

The Ritz suffers data breach after hackers pose as staff

17 Aug 2020

Most Popular

Do smart devices make us less intelligent?
artificial intelligence (AI)

Do smart devices make us less intelligent?

19 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020
What is Neuralink?
Technology

What is Neuralink?

24 Oct 2020