Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ODINI Malware Breaches Air-Gapped Systems with Magnetic Emissions

ODINI Malware Breaches Air-Gapped Systems with Magnetic Emissions

Posted on May 11, 2026 By CWS

ODINI malware, a cutting-edge proof-of-concept, has been developed to extract crucial data from air-gapped computers that are protected by Faraday cages. This malware operates by modulating CPU workloads to generate low-frequency magnetic fields, facilitating data transmission through robust physical barriers.

Innovative Exploitation of CPU Emissions

ODINI was crafted by a research team led by Mordechai Guri at Ben-Gurion University in Israel. The study reveals major vulnerabilities in environments once considered secure. These findings are particularly alarming for military, financial, and critical infrastructure sectors, which rely on air-gapped systems and Faraday cages to protect sensitive information from electromagnetic interference and unauthorized access.

Despite these precautions, ODINI shows that determined attackers can retrieve valuable assets using supply-chain attacks or compromised USB drives. These assets include passwords, authentication tokens, and encryption keys.

Mechanism of Data Exfiltration

The core mechanism of ODINI hinges on manipulating the compromised system’s CPU. The malware overloads CPU cores with calculations, leading to power consumption fluctuations that generate low-frequency magnetic fields. These fields easily penetrate standard computer chassis and Faraday cages due to their low impedance.

ODINI operates without the need for elevated administrative privileges, making it hard to detect through traditional antivirus software or monitoring tools. It employs advanced data modulation techniques like amplitude-shift keying and frequency-shift keying to encode information onto the magnetic waves, as explained by Mordechai Guri.

Challenges in Defending Against Magnetic Exfiltration

To capture the magnetic signals, attackers need a device within 100 to 150 centimeters of the compromised machine, achieving a data rate of 40 bits per second. A related attack, MAGNETO, uses a smartphone’s magnetometer as a receiver, effective up to 12.5 centimeters, even in a Faraday bag or airplane mode, transferring data at 5 bits per second.

Defending against such attacks is challenging. Conventional Faraday cages cannot block these transmissions, and creating specialized ferromagnetic shields is costly and impractical. Experts suggest hardware-based signal jamming with magnetic field generators or software-based jamming to disrupt encoded signals, though this may affect system performance.

Ultimately, enforcing strict physical zoning policies that ban external electronic devices near air-gapped computers remains the most reliable defense. As cyber threats evolve, understanding these sophisticated techniques is crucial for cybersecurity resilience.

Cyber Security News Tags:air-gapped systems, Ben-Gurion University, CPU emissions, Cybersecurity, data exfiltration, Faraday cage, magnetic fields, Mordechai Guri, ODINI malware, supply chain attacks

Post navigation

Previous Post: Top Interactive Malware Analysis Tools in 2026
Next Post: Crimenetwork Crime Hub Dismantled by German Police

Related Posts

Microsoft to Block External Scripts  in Entra ID Logins to Enhance Protections Microsoft to Block External Scripts  in Entra ID Logins to Enhance Protections Cyber Security News
Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender Cyber Security News
New Cybercrime Tool ErrTraffic Let Attackers Automate ClickFix Attacks New Cybercrime Tool ErrTraffic Let Attackers Automate ClickFix Attacks Cyber Security News
Hackers Weaponizing WordPress Websites by Injecting Malicious PHP Codes Silently Hackers Weaponizing WordPress Websites by Injecting Malicious PHP Codes Silently Cyber Security News
Critical Cisco Firewall Flaw Enables Remote Code Execution Critical Cisco Firewall Flaw Enables Remote Code Execution Cyber Security News
MathWorks Confirms Cyberattack, User Personal Information Stolen MathWorks Confirms Cyberattack, User Personal Information Stolen Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Crimenetwork Crime Hub Dismantled by German Police
  • ODINI Malware Breaches Air-Gapped Systems with Magnetic Emissions
  • Top Interactive Malware Analysis Tools in 2026
  • Top Full Disk Encryption Tools for 2026
  • Phishing Campaign Impacting Hundreds of Firms Uncovered

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Crimenetwork Crime Hub Dismantled by German Police
  • ODINI Malware Breaches Air-Gapped Systems with Magnetic Emissions
  • Top Interactive Malware Analysis Tools in 2026
  • Top Full Disk Encryption Tools for 2026
  • Phishing Campaign Impacting Hundreds of Firms Uncovered

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark