Hackers can steal data through PC fan vibrations
Researchers show how fan speeds can be regulated to encode and transmit sensitive data
Cyber criminals can exfiltrate sensitive data from a PC sat within an air-gapped system by using malware to manipulate the vibrations from internal CPU and GPU fans, it has emerged.
By exploiting ‘air-gap covert channels’, hackers can steal data from systems totally isolated from network connectivity, beyond tightly-controlled local networks. Such air-gapped systems are normally used by corporate or government networks, and computer systems used for national defence.
Breaching systems without physical or network access is a challenge, but researchers have proven that a PC’s internal fans, such as GPU, CPU or chassis fans, can be encoded with internally-stored data.
Computers are known to vibrate at a frequency that correlates with the rotation speed of internal fans. These vibrations can’t be heard, but can be felt on nearby surfaces, like a neighbouring desk.
However, it has been discovered that malware can be used to regulate the rotation speed of internal PC fans, the fluctuating vibrations from which can be encoded with sensitive data stored on these machines, according to Mordechai Guri, the head of R&D at Israel’s Ben-Gurion University of the Negev, as reported by ZDNet.
Academic research shows that vibrations generated by malware installed on an air-gapped system, which Guri branded as AiR-ViBeR, can encode binary information and modulate this over a low-frequency vibrational carrier.
This can subsequently be decoded using the accelerometer built-into any smartphone. By placing the device onto a nearby surface, software can be used to reconstruct the manipulated vibrations back into meaningful data.
There are a host of methods that cyber criminals could deploy to steal data from air-gapped systems, ranging from LED indicators on hard drives to screen brightness variations. However, Guri’s latest research is the first proving that vibrations can be manipulated to successfully transmit sensitive data from machines in air-gapped systems.
Although this method is perfectly feasible, it’s not likely to be deployed in real-life scenarios due to practicality reasons.
The research team managed to achieve a data exfiltration rate of only half a bit per second through fan vibrations in a test run, suggesting cyber criminals are likely to look to other methods to seize sensitive corporate data.
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Evaluate your order-to-cash process
15 recommended metrics to benchmark your O2C operationsDownload now
AI 360: Hold, fold, or double down?
How AI can benefit your businessDownload now
Getting started with Azure Red Hat OpenShift
A developer’s guide to improving application building and deployment capabilitiesDownload now