icon bookmark-bicon bookmarkicon cameraicon checkicon chevron downicon chevron lefticon chevron righticon chevron upicon closeicon v-compressicon downloadicon editicon v-expandicon fbicon fileicon filtericon flag ruicon full chevron downicon full chevron lefticon full chevron righticon full chevron upicon gpicon insicon mailicon moveicon-musicicon mutedicon nomutedicon okicon v-pauseicon v-playicon searchicon shareicon sign inicon sign upicon stepbackicon stepforicon swipe downicon tagicon tagsicon tgicon trashicon twicon vkicon yticon wticon fm

Israeli researchers brag of having found a way to STEAL computer data by listening to fan vibrations

Israeli researchers brag of having found a way to STEAL computer data by listening to fan vibrations
A new and unconventional way of stealing data from highly-secured computers, by tampering with its cooling-system fans, is possible, according to Israeli scientists.

Their research has been released by Mordechai Guri, head of R&D at the Ben-Gurion University of the Negev in Israel.

The novel technique, dubbed AiR-ViBeR, apparently allows a hacker to dip into any computer, including the so-called air gapped systems – those that are disconnected from any networks. To steal the data, a hacker needs to listen carefully to the noise emitted by computer cooling fans.

“We observe that computers vibrate at a frequency correlated to the rotation speed of their internal fans,” Guri said. “These inaudible vibrations affect the entire structure on which the computer is placed.”

While the technique is novel indeed, there are a few caveats that make it not the most practical. First, the target ‘highly-secured’ computer needs to be injected with a piece of malware called Fansmitter, needed to control the speed of the system’s fans and create readable vibrations. Then the hacker needs a smart phone with an accelerometer that has to be in close vicinity of the target –preferably on the same table– to actually listen to the fans and siphon data.

Moreover, it’s not possible to funnel-off large amounts of data with this novel method, the researchers admitted. Still, it may be used to steal small amounts of data, namely usernames and passwords, as well as to snatch encryption keys.

The researchers have also offered a set of countermeasures to combat the hacking technique, ranging from fitting the computer with its own accelerometer, to detect anomalous fan behavior, to using software jamming. Apart from that, one can isolate the highly-sensitive computer in a vibration-proof environment or just remove all its fans and opt for liquid cooling.

Also on rt.com Hackers trick Tesla into breaking speed limit by 50mph using two inches of tape

All in all, simply shunning any shady guys with smartphones from your ‘highly-secured’ rig might be actually the best technique to prevent that extravagant hacking attempt.

Think your friends would be interested? Share this story!

Dear readers and commenters,

We have implemented a new engine for our comment section. We hope the transition goes smoothly for all of you. Unfortunately, the comments made before the change have been lost due to a technical problem. We are working on restoring them, and hoping to see you fill up the comment section with new ones. You should still be able to log in to comment using your social-media profiles, but if you signed up under an RT profile before, you are invited to create a new profile with the new commenting system.

Sorry for the inconvenience, and looking forward to your future comments,

RT Team.

Podcasts