- Jul 27, 2015
- 5,458
A researcher from Israel's Ben Gurion University of the Negev recently demonstrated a new kind of malware that could be used to covertly steal highly sensitive data from air-gapped and audio-gapped systems using a novel acoustic quirk in power supply units that come with modern computing devices.
Dubbed 'POWER-SUPPLaY,' the latest research builds on a series of techniques leveraging electromagnetic, acoustic, thermal, optical covert channels, and even power cables to exfiltrate data from non-networked computers. "Our developed malware can exploit the computer power supply unit (PSU) to play sounds and use it as an out-of-band, secondary speaker with limited capabilities," Dr. Mordechai Guri outlined in a paper published today and shared with The Hacker News.
![thehackernews.com](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRq45WNBfU70MSr3GlQpK3DicJ3EM1q2RrAeEzcpbtLRCc8d-e1yQpxREhTmT5zzG5PDtDxEFDIEX9L4nWSiSrwV8SAPKJvC98mU6d_lwsjgUZvim5iIkvSwswJANQYDJ_8AN_U6XViSg/s728-rw-e365/air-gap-power-speaker-malware.jpg)
New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers
This new malware can jump air-gapped and audio-gapped computers or IoT devices by turning their power-supplies into speakers.
![thehackernews.com](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQQyjwPYjJP0wddSEB8Dlpr3dlnQUs52-WmlrZfqJoBPeOvv2Zoqlq-FhEAz_Xeprj_mtrI1MGCW1JS840JUjVEK6VoNe6zCNNTw_7YmyvNmf3E5pprZ3zqP8lszq74Wt97SvbJo5yeuyep0U6-nGs0vdarg4_WUrc5r6L0ML0xE-BsPipJd2-1PMHTvO1/s32-rw-e365/thn.jpg)