HOLLA!!!!!
Its me S3NP@! again.
This post is not the continuation of ENCASE.....I will be continuing that later...
But this post is about a type of cyber attack which is much less known..
Let me first tell you what an airgapped computer is ???
A computer is called airgapped when it not connected to another computer via any sort of network be it wired or wireless.
You know there is a myth which says that a computer can't be hacked until and unless it is connected to network
But I'm sure that after reading this post you will be fully dazzled.
Do you know what is in the image above..???
YES!!! its a cooling fan .
Cooling fans are used in laptops ,desktops etc for keeping internal temperature of the device to an optimum level.
How will you react if I say that cyber criminals can get the data on an airgapped computer using its cooling fan???
Does this seem completely out of the world for ? are you amazed hearing this ?
Let me help you lower your confusion a bit.
I will be discussing about this FANSMITTER thing here in this post now.
SO, BUCKLE UP!!!
A test was done by a team of computer scientists at BEN-GURION University in Israel that proved that data breach can successfully done to a airgapped computer.
FANSMITTER is actually the name of the malware used in this particular attack.This malware is insanely capable of performing an exfiltration of data from a airgapped system acoustically.It exfiltrates the information through the emission of acoustic tones from the cooling fans.
In this particular test done by the computer scientists FANSMITTER was installed in an airgapped computer and a smartphone both.After the installation is complete,the malware was able to retrieve targeted datas from the computer to the receiving smartphone via acoustic tones generated by the manipulation of the rotation per minute(RPM) of the cooling fan.Through this RPM manipulation the data which is in binary form can be easily modulated and transmitted via the acoustic tones and decoded at the receiving end .At the receiving end the data will be received in form of SMS or other alternatives.
The crucial thing is that to avoid this kind of attack the cooling fans should be avoided but, being the indigenous part of computer system it is not practically possible to avoid the cooling fans.
I'm leaving you dazzled ..
So, until my next post
SAYONARA!!!!
To like our facebook page click here NewAgeInformers
To subscribe our youtube channel click here wolfpack
Its me S3NP@! again.
This post is not the continuation of ENCASE.....I will be continuing that later...
But this post is about a type of cyber attack which is much less known..
Let me first tell you what an airgapped computer is ???
A computer is called airgapped when it not connected to another computer via any sort of network be it wired or wireless.
You know there is a myth which says that a computer can't be hacked until and unless it is connected to network
But I'm sure that after reading this post you will be fully dazzled.
Do you know what is in the image above..???
YES!!! its a cooling fan .
Cooling fans are used in laptops ,desktops etc for keeping internal temperature of the device to an optimum level.
How will you react if I say that cyber criminals can get the data on an airgapped computer using its cooling fan???
Does this seem completely out of the world for ? are you amazed hearing this ?
Let me help you lower your confusion a bit.
I will be discussing about this FANSMITTER thing here in this post now.
SO, BUCKLE UP!!!
A test was done by a team of computer scientists at BEN-GURION University in Israel that proved that data breach can successfully done to a airgapped computer.
FANSMITTER is actually the name of the malware used in this particular attack.This malware is insanely capable of performing an exfiltration of data from a airgapped system acoustically.It exfiltrates the information through the emission of acoustic tones from the cooling fans.
In this particular test done by the computer scientists FANSMITTER was installed in an airgapped computer and a smartphone both.After the installation is complete,the malware was able to retrieve targeted datas from the computer to the receiving smartphone via acoustic tones generated by the manipulation of the rotation per minute(RPM) of the cooling fan.Through this RPM manipulation the data which is in binary form can be easily modulated and transmitted via the acoustic tones and decoded at the receiving end .At the receiving end the data will be received in form of SMS or other alternatives.
The crucial thing is that to avoid this kind of attack the cooling fans should be avoided but, being the indigenous part of computer system it is not practically possible to avoid the cooling fans.
I'm leaving you dazzled ..
So, until my next post
SAYONARA!!!!
To like our facebook page click here NewAgeInformers
To subscribe our youtube channel click here wolfpack


Comments
Post a Comment