Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches

Posted on June 12, 2025June 12, 2025 By CWS

An instructional researcher from the Ben-Gurion College of the Negev has devised a brand new approach that depends on smartwatches and ultrasonic covert communication to exfiltrate information from air-gapped methods.

Designed to guard delicate info, air-gapped methods are disconnected from the community, thus stopping information exfiltration by way of strategies that require web connectivity.

Nonetheless, numerous covert communication channels can be utilized to steal information from these methods, and smartwatches, that are regularly current in high-security environments and will be abused as covert communication receivers, create a knowledge exfiltration avenue, Ben-Gurion researcher Mordechai Guri says.

Known as SmartAttack, the approach proposed by Guri makes use of a smartwatch’s built-in microphone to seize covert ultrasonic indicators inside vary of 18–22 kHz, efficiently enabling information theft based mostly on sure environmental situations.

The assault, nonetheless, assumes that the attacker has already infiltrated the air-gapped system and implanted malware that operates stealthily, transmitting info utilizing the contaminated machine’s audio system in a frequency vary that makes sounds inaudible to people.

Moreover, the attacker additionally must compromise the smartwatch of a person with entry to the secured setting, and implant malware able to receiving the covert ultrasonic communication, decoding it, reconstructing it, and forwarding it to the attacker.

“The malware on the compromised pc is answerable for gathering delicate info corresponding to keystrokes (keylogging), encryption keys, biometric information, or consumer credentials,” the researcher notes.

“This info is then modulated onto ultrasonic indicators within the inaudible frequency vary (18 kHz and above). Utilizing the pc’s audio system, the malware transmits these covert indicators, leveraging ultrasonic propagation to evade human detection,” he continues.Commercial. Scroll to proceed studying.

The compromised smartwatch, the researcher explains, scans for covert ultrasonic indicators to detect transmissions. After reconstructing the stolen info, it sends the info to the attacker utilizing accessible communication strategies, corresponding to Bluetooth, Wi-Fi, or mobile networks.

“Smartwatches possess a number of technological options that allow them to obtain ultrasonic indicators successfully. One key element facilitating this functionality is the presence of high-sensitivity microphones able to capturing frequencies past the human listening to vary,” Guri explains.

To check the effectiveness of the approach, the researcher used a Put on OS smartwatch with optimized sign processing capabilities to scale back noise and improve the sign. The smartwatch’s orientation, physique occlusion, and distance, Guri says, have a excessive impression on sign reception.

In response to the researcher, SmartAttack can be utilized to transmit information by way of ultrasonic indicators within the 18–22 kHz frequency vary over distances of greater than 6 meters, with information charges of as much as 50 bits per second.

Attainable mitigations, he says, embrace prohibiting smartwatches and comparable audio-capable wearables in safe environments, deploying ultrasonic monitoring methods to establish unauthorized transmissions, deploying ultrasonic jammers, integrating ultrasonic firewalls inside computer systems, and bodily eradicating or disabling audio {hardware} parts in air-gapped and extremely safe environments.

Associated: New RAMBO Assault Permits Air-Gapped Information Theft through RAM Radio Indicators

Associated: LF Electromagnetic Radiation Used for Stealthy Information Theft From Air-Gapped Methods

Associated: Ethernet LEDs Can Be Used to Exfiltrate Information From Air-Gapped Methods

Security Week News Tags:AirGapped, Data, SmartAttack, Smartwatches, Steals

Post navigation

Previous Post: OneLogin AD Connector Vulnerabilities Exposes Authentication Credentials
Next Post: Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior

Related Posts

Ox Security Bags $60M Series B to Tackle Appsec Alert Fatigue  Security Week News
Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances Security Week News
US Announces Botnet Takedown, Charges Against Russian Administrators Security Week News
Masimo Manufacturing Facilities Hit by Cyberattack Security Week News
Production at Steelmaker Nucor Disrupted by Cyberattack Security Week News
Ransomware Attack Forces Kettering Health to Cancel Procedures Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • How to Create an Incident Response Playbook
  • China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure
  • New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools
  • Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • How to Create an Incident Response Playbook
  • China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure
  • New Smartwatch Wi-Fi Injection, Android Radio and Hacking Tools
  • Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News