Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ODINI Malware Breaches Air-Gapped Systems with Magnetic Emissions

ODINI Malware Breaches Air-Gapped Systems with Magnetic Emissions

Posted on May 11, 2026 By CWS

ODINI malware, a cutting-edge proof-of-concept, has been developed to extract crucial data from air-gapped computers that are protected by Faraday cages. This malware operates by modulating CPU workloads to generate low-frequency magnetic fields, facilitating data transmission through robust physical barriers.

Innovative Exploitation of CPU Emissions

ODINI was crafted by a research team led by Mordechai Guri at Ben-Gurion University in Israel. The study reveals major vulnerabilities in environments once considered secure. These findings are particularly alarming for military, financial, and critical infrastructure sectors, which rely on air-gapped systems and Faraday cages to protect sensitive information from electromagnetic interference and unauthorized access.

Despite these precautions, ODINI shows that determined attackers can retrieve valuable assets using supply-chain attacks or compromised USB drives. These assets include passwords, authentication tokens, and encryption keys.

Mechanism of Data Exfiltration

The core mechanism of ODINI hinges on manipulating the compromised system’s CPU. The malware overloads CPU cores with calculations, leading to power consumption fluctuations that generate low-frequency magnetic fields. These fields easily penetrate standard computer chassis and Faraday cages due to their low impedance.

ODINI operates without the need for elevated administrative privileges, making it hard to detect through traditional antivirus software or monitoring tools. It employs advanced data modulation techniques like amplitude-shift keying and frequency-shift keying to encode information onto the magnetic waves, as explained by Mordechai Guri.

Challenges in Defending Against Magnetic Exfiltration

To capture the magnetic signals, attackers need a device within 100 to 150 centimeters of the compromised machine, achieving a data rate of 40 bits per second. A related attack, MAGNETO, uses a smartphone’s magnetometer as a receiver, effective up to 12.5 centimeters, even in a Faraday bag or airplane mode, transferring data at 5 bits per second.

Defending against such attacks is challenging. Conventional Faraday cages cannot block these transmissions, and creating specialized ferromagnetic shields is costly and impractical. Experts suggest hardware-based signal jamming with magnetic field generators or software-based jamming to disrupt encoded signals, though this may affect system performance.

Ultimately, enforcing strict physical zoning policies that ban external electronic devices near air-gapped computers remains the most reliable defense. As cyber threats evolve, understanding these sophisticated techniques is crucial for cybersecurity resilience.

Cyber Security News Tags:air-gapped systems, Ben-Gurion University, CPU emissions, Cybersecurity, data exfiltration, Faraday cage, magnetic fields, Mordechai Guri, ODINI malware, supply chain attacks

Post navigation

Previous Post: Top Interactive Malware Analysis Tools in 2026
Next Post: Crimenetwork Crime Hub Dismantled by German Police

Related Posts

Microsoft Entra Credentials in the Authenticator App on Jail-Broken Devices to be Wiped Out Microsoft Entra Credentials in the Authenticator App on Jail-Broken Devices to be Wiped Out Cyber Security News
10,000+ Fortinet Firewalls Still Exposed to 5-year Old MFA Bypass Vulnerability 10,000+ Fortinet Firewalls Still Exposed to 5-year Old MFA Bypass Vulnerability Cyber Security News
Cornwell Quality Tools Data Breach Cornwell Quality Tools Data Breach Cyber Security News
TCLBANKER Trojan Expands Through WhatsApp and Outlook TCLBANKER Trojan Expands Through WhatsApp and Outlook Cyber Security News
Malicious Chrome Extension as Ethereum Wallet Enables Full Wallet Takeover Malicious Chrome Extension as Ethereum Wallet Enables Full Wallet Takeover Cyber Security News
Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Canvas Restores Access After Cyberattack Disruption
  • Fake OpenAI Repo Delivers Malware on Hugging Face
  • Crimenetwork Crime Hub Dismantled by German Police
  • ODINI Malware Breaches Air-Gapped Systems with Magnetic Emissions
  • Top Interactive Malware Analysis Tools in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Canvas Restores Access After Cyberattack Disruption
  • Fake OpenAI Repo Delivers Malware on Hugging Face
  • Crimenetwork Crime Hub Dismantled by German Police
  • ODINI Malware Breaches Air-Gapped Systems with Magnetic Emissions
  • Top Interactive Malware Analysis Tools in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark