Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches

Posted on June 12, 2025June 12, 2025 By CWS

An instructional researcher from the Ben-Gurion College of the Negev has devised a brand new approach that depends on smartwatches and ultrasonic covert communication to exfiltrate information from air-gapped methods.

Designed to guard delicate info, air-gapped methods are disconnected from the community, thus stopping information exfiltration by way of strategies that require web connectivity.

Nonetheless, numerous covert communication channels can be utilized to steal information from these methods, and smartwatches, that are regularly current in high-security environments and will be abused as covert communication receivers, create a knowledge exfiltration avenue, Ben-Gurion researcher Mordechai Guri says.

Known as SmartAttack, the approach proposed by Guri makes use of a smartwatch’s built-in microphone to seize covert ultrasonic indicators inside vary of 18–22 kHz, efficiently enabling information theft based mostly on sure environmental situations.

The assault, nonetheless, assumes that the attacker has already infiltrated the air-gapped system and implanted malware that operates stealthily, transmitting info utilizing the contaminated machine’s audio system in a frequency vary that makes sounds inaudible to people.

Moreover, the attacker additionally must compromise the smartwatch of a person with entry to the secured setting, and implant malware able to receiving the covert ultrasonic communication, decoding it, reconstructing it, and forwarding it to the attacker.

“The malware on the compromised pc is answerable for gathering delicate info corresponding to keystrokes (keylogging), encryption keys, biometric information, or consumer credentials,” the researcher notes.

“This info is then modulated onto ultrasonic indicators within the inaudible frequency vary (18 kHz and above). Utilizing the pc’s audio system, the malware transmits these covert indicators, leveraging ultrasonic propagation to evade human detection,” he continues.Commercial. Scroll to proceed studying.

The compromised smartwatch, the researcher explains, scans for covert ultrasonic indicators to detect transmissions. After reconstructing the stolen info, it sends the info to the attacker utilizing accessible communication strategies, corresponding to Bluetooth, Wi-Fi, or mobile networks.

“Smartwatches possess a number of technological options that allow them to obtain ultrasonic indicators successfully. One key element facilitating this functionality is the presence of high-sensitivity microphones able to capturing frequencies past the human listening to vary,” Guri explains.

To check the effectiveness of the approach, the researcher used a Put on OS smartwatch with optimized sign processing capabilities to scale back noise and improve the sign. The smartwatch’s orientation, physique occlusion, and distance, Guri says, have a excessive impression on sign reception.

In response to the researcher, SmartAttack can be utilized to transmit information by way of ultrasonic indicators within the 18–22 kHz frequency vary over distances of greater than 6 meters, with information charges of as much as 50 bits per second.

Attainable mitigations, he says, embrace prohibiting smartwatches and comparable audio-capable wearables in safe environments, deploying ultrasonic monitoring methods to establish unauthorized transmissions, deploying ultrasonic jammers, integrating ultrasonic firewalls inside computer systems, and bodily eradicating or disabling audio {hardware} parts in air-gapped and extremely safe environments.

Associated: New RAMBO Assault Permits Air-Gapped Information Theft through RAM Radio Indicators

Associated: LF Electromagnetic Radiation Used for Stealthy Information Theft From Air-Gapped Methods

Associated: Ethernet LEDs Can Be Used to Exfiltrate Information From Air-Gapped Methods

Security Week News Tags:AirGapped, Data, SmartAttack, Smartwatches, Steals

Post navigation

Previous Post: OneLogin AD Connector Vulnerabilities Exposes Authentication Credentials
Next Post: Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior

Related Posts

Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 Security Week News
Spyware Maker NSO Ordered to Pay $167 Million Over WhatsApp Hack Security Week News
Flaw in Industrial Computer Maker’s UEFI Apps Enables Secure Boot Bypass on Many Devices Security Week News
BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software Security Week News
Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers Security Week News
Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services
  • Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access
  • AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods
  • Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages
  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services
  • Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access
  • AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods
  • Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages
  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News