Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches

Posted on June 12, 2025June 12, 2025 By CWS

An instructional researcher from the Ben-Gurion College of the Negev has devised a brand new approach that depends on smartwatches and ultrasonic covert communication to exfiltrate information from air-gapped methods.

Designed to guard delicate info, air-gapped methods are disconnected from the community, thus stopping information exfiltration by way of strategies that require web connectivity.

Nonetheless, numerous covert communication channels can be utilized to steal information from these methods, and smartwatches, that are regularly current in high-security environments and will be abused as covert communication receivers, create a knowledge exfiltration avenue, Ben-Gurion researcher Mordechai Guri says.

Known as SmartAttack, the approach proposed by Guri makes use of a smartwatch’s built-in microphone to seize covert ultrasonic indicators inside vary of 18–22 kHz, efficiently enabling information theft based mostly on sure environmental situations.

The assault, nonetheless, assumes that the attacker has already infiltrated the air-gapped system and implanted malware that operates stealthily, transmitting info utilizing the contaminated machine’s audio system in a frequency vary that makes sounds inaudible to people.

Moreover, the attacker additionally must compromise the smartwatch of a person with entry to the secured setting, and implant malware able to receiving the covert ultrasonic communication, decoding it, reconstructing it, and forwarding it to the attacker.

“The malware on the compromised pc is answerable for gathering delicate info corresponding to keystrokes (keylogging), encryption keys, biometric information, or consumer credentials,” the researcher notes.

“This info is then modulated onto ultrasonic indicators within the inaudible frequency vary (18 kHz and above). Utilizing the pc’s audio system, the malware transmits these covert indicators, leveraging ultrasonic propagation to evade human detection,” he continues.Commercial. Scroll to proceed studying.

The compromised smartwatch, the researcher explains, scans for covert ultrasonic indicators to detect transmissions. After reconstructing the stolen info, it sends the info to the attacker utilizing accessible communication strategies, corresponding to Bluetooth, Wi-Fi, or mobile networks.

“Smartwatches possess a number of technological options that allow them to obtain ultrasonic indicators successfully. One key element facilitating this functionality is the presence of high-sensitivity microphones able to capturing frequencies past the human listening to vary,” Guri explains.

To check the effectiveness of the approach, the researcher used a Put on OS smartwatch with optimized sign processing capabilities to scale back noise and improve the sign. The smartwatch’s orientation, physique occlusion, and distance, Guri says, have a excessive impression on sign reception.

In response to the researcher, SmartAttack can be utilized to transmit information by way of ultrasonic indicators within the 18–22 kHz frequency vary over distances of greater than 6 meters, with information charges of as much as 50 bits per second.

Attainable mitigations, he says, embrace prohibiting smartwatches and comparable audio-capable wearables in safe environments, deploying ultrasonic monitoring methods to establish unauthorized transmissions, deploying ultrasonic jammers, integrating ultrasonic firewalls inside computer systems, and bodily eradicating or disabling audio {hardware} parts in air-gapped and extremely safe environments.

Associated: New RAMBO Assault Permits Air-Gapped Information Theft through RAM Radio Indicators

Associated: LF Electromagnetic Radiation Used for Stealthy Information Theft From Air-Gapped Methods

Associated: Ethernet LEDs Can Be Used to Exfiltrate Information From Air-Gapped Methods

Security Week News Tags:AirGapped, Data, SmartAttack, Smartwatches, Steals

Post navigation

Previous Post: OneLogin AD Connector Vulnerabilities Exposes Authentication Credentials
Next Post: Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior

Related Posts

Cato Networks Acquires AI Security Firm Aim Security Security Week News
Chinese APT Hacking Routers to Build Espionage Infrastructure Security Week News
Securonix Acquires Threat Intelligence Firm ThreatQuotient Security Week News
Russian APT Exploiting 7-Year-Old Cisco Vulnerability: FBI Security Week News
Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black Security Week News
Technical Details Published for Critical Cisco IOS XE Vulnerability Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News