New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers

upnorth

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 27, 2015
5,459
A researcher from Israel's Ben Gurion University of the Negev recently demonstrated a new kind of malware that could be used to covertly steal highly sensitive data from air-gapped and audio-gapped systems using a novel acoustic quirk in power supply units that come with modern computing devices.

Dubbed 'POWER-SUPPLaY,' the latest research builds on a series of techniques leveraging electromagnetic, acoustic, thermal, optical covert channels, and even power cables to exfiltrate data from non-networked computers. "Our developed malware can exploit the computer power supply unit (PSU) to play sounds and use it as an out-of-band, secondary speaker with limited capabilities," Dr. Mordechai Guri outlined in a paper published today and shared with The Hacker News.

 

MacDefender

Level 16
Verified
Top Poster
Oct 13, 2019
779
Luckily this is not in-the-wild malware but a proof of concept. There was a similar attack demonstrated a week or so ago: How one security researcher used radio signals to hop an air gap - CyberScoop

That one found a way to change the GPU clock speed simply using unprivileged code that just taxes the GPU more when it wants the GPU to run faster, and the resulting GPU RF noise could be received 50ft away.

As receivers become more sensitive, these kinds of attacks that conspiracy theorists loved to talk about are now becoming reality. Clock/frequency/power being dynamically adjusted is common on modern machines but those actions definitely generate leakage. I've had laptops with such bad capacitor whine before that you could tell when the machine was idle vs when it was working by whether it's whining or squealing -- almost gave me a 6th sense about when a video game was done loading or a job was done compiling :D
 

MacDefender

Level 16
Verified
Top Poster
Oct 13, 2019
779
Yeah, not good.

Some entities have been dealing with this for a long time.

Some refer to it as TEMPEST.

And all sorts of mitigation takes place to address it.

Ah that was the term that was slipping my mind. Back when this threat was greatest with CRT screen radiation, some tools like PGP had a TEMPEST viewer mode. For example:
1588724435299.png

1588724443770.png


They removed this functionality a long time ago, mainly because that became an irrelevant threat.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top