Security News > 2020 > December > RAM-Generated Wi-Fi Signals Allow Data Exfiltration From Air-Gapped Systems

RAM-Generated Wi-Fi Signals Allow Data Exfiltration From Air-Gapped Systems
2020-12-16 11:34

Covert Wi-Fi signals generated by DDR SDRAM hardware can be leveraged to exfiltrate data from air-gapped computers, a researcher claims.

In a newly published paper, Mordechai Guri from the Ben-Gurion University of the Negev in Israel details AIR-FI, a new data exfiltration technique in which malware installed on a compromised air-gapped system can generate Wi-Fi signals that a nearby device intercepts and sends to the attacker, over the Internet.

Over the past years, numerous new data exfiltration techniques aimed at air-gapped computers have been disclosed, and threat actors were observed increasingly targeting air-gapped systems in their attacks.

Wi-Fi frequency bands are used as a channel for data exfiltration.

The AIR-FI attack relies on DDR SDRAM buses for emitting electromagnetic signals on the 2.4 GHz Wi-Fi band and for encoding data on top of these signals.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/s4lK4X-XQnU/ram-generated-wi-fi-signals-allow-data-exfiltration-air-gapped-systems