By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
CryptoCommunityCryptoCommunity
  • Home
  • General
  • Blockchain
  • Crypto
  • DeFi
  • Metaverse
  • NFT
Search
  • BTC
  • ETH
  • USDT
  • USDC
  • BNB
  • BUSD
  • ADA
  • XRP
  • SOL
  • DOGE
  • DOT
  • MATIC
Reading: An experimental new attack can steal data from air-gapped computers using a phone’s gyroscope – TechCrunch
Share
Aa
CryptoCommunityCryptoCommunity
Aa
  • Home
  • General
  • Blockchain
  • Crypto
  • DeFi
  • Metaverse
  • NFT
Search
  • Home
  • General
  • Blockchain
  • Crypto
  • DeFi
  • Metaverse
  • NFT
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
CryptoCommunity > Blog > General > An experimental new attack can steal data from air-gapped computers using a phone’s gyroscope – TechCrunch
General

An experimental new attack can steal data from air-gapped computers using a phone’s gyroscope – TechCrunch

admin Published August 25, 2022
Last updated: 2022/08/25 at 1:38 AM
Share
SHARE

[ad_1]

A security researcher known for devising inventive ways to siphon data from computers that are disconnected from the internet has found a new exploit able to exfiltrate data to a nearby smartphone.

Air-gapped systems are physically segregated and incapable of connecting wirelessly or physically with other computers or network devices. You’ll find them in places where network security is paramount, like critical infrastructure. While uncommon, some techniques developed in recent years can defeat air-gap isolation, like the Mosquito attack, which uses a nearby smartphone’s microphone to receive data. Since then, Apple and Google have introduced permissions settings in iOS and Android that block apps from accessing a device’s microphone, and both operating systems use visual indicators when the microphone is active.

But unlike microphones, gyroscopes — found as standard in most modern smartphones — don’t have the same protections. Gyroscopes are used to detect the rate of rotation of the smartphone, and are widely considered a safer sensor, since neither iOS or Android indicate when they are used or given the option to block access altogether.

Now, the creator of the Mosquito attack has a new technique that uses a smartphone’s gyroscope to pick up inaudible nearby soundwaves and doesn’t rely on using the microphone.

Mordechai Guri, the head of research and development at the Cyber Security Research Center at Ben Gurion University, said in his latest research paper that this new attack, which he calls “Gairoscope,” can exfiltrate sensitive information from air-gapped computers just “a few meters away.”

Like other exploits against air-gapped systems, Guri’s “Gairoscope” proof-of-concept requires close proximity to the air-gapped system. But from there, an attacker could collect passwords or login credentials by listening for sound waves generated from the speakers of an air-gapped system and picked up from the gyroscope of a nearby smartphone.

Guri says these inaudible frequencies produce “tiny mechanical oscillations within the smartphone’s gyroscope,” which can be converted into readable data. He added that an attacker could execute the exploit using a mobile browser, since phone gyroscopes can be accessed using JavaScript.

While the method is still experimental, Guri and his team have recommended some countermeasures aimed at limiting the impact of the new malware, such as eliminating loudspeakers to create an audio-less networking environment and filtering out the resonance frequencies generated by the audio hardware using an audio filter.

[ad_2]

You Might Also Like

Revyze is building the TikTok of educational videos

YouTube ends the test asking users to get a premium subscription to watch 4K videos

Who is going to buy Cadillac’s $300,000 hand-built EV?

Don’t let today’s software rally improve your mood

Daily Crunch: Kanye West reaches agreement to acquire social media platform Parler

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
admin August 25, 2022
Share this Article
Facebook TwitterEmail Print
Share
Previous Article SiriusXM digs into subscription-based podcast market with Stitcher Premium bundle – TechCrunch
Next Article Cosmos ATOM Breaks Above Key Resistance – Eyes $16

Latest News

earn bitcoins fast
How to earn bitcoins fast
crypto
Cryptocurrency is a Scam or Not
How to Tell If a Cryptocurrency is a Scam or Not
crypto
Losing In Cryptocurrency Trading
Tips to Avoid Losing In Cryptocurrency Trading
crypto
Sell Products Online with Bitcoins
How to Sell Products Online with Bitcoins – The Ultimate Guide
crypto

You Might also Like

Revyze is building the TikTok of educational videos

6 Min Read

YouTube ends the test asking users to get a premium subscription to watch 4K videos

2 Min Read

Who is going to buy Cadillac’s $300,000 hand-built EV?

4 Min Read

Don’t let today’s software rally improve your mood

1 Min Read

Crypto Community

  • Home
  • Crypto Calculator
  • Blog
  • Contact Us
  • Privacy Policy
  • Disclaimer
  • Terms and Conditions

Real time Cryptocurrency

  • Crypto Prices
  • Dogecoin price
  • Shibainu coin price
  • Bitcoin Price
  • Cardano Price
  • Litecoins Price

Cryptocurrency Price USD

  • Bitcoin price USD
  • Ethereum price USD
  • Tether price USD
  • BNB Price USD
  • Cardano Price USD
  • Solana Price USD
  • Peps coin Price USD
  • floki inu Price USD
  • SIA coin Price USD
CryptoCommunityCryptoCommunity
Follow US

© 2022 Cryptos Community All Rights Reserved. All logos and images used on this website are registered trademarks of their respective companies. All Rights Reserved. Cryptos Community is not liable for inaccuracies, errors, or omissions found herein. For the removal of copyrighted images, trademarks, or other issues, Contact Us. 


Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?