New cyberattack method steals data directly from power cords and grids

What seems like sorcery is actually smart science.

Sometimes, sensitive computers are removed from the main network and isolated into what’s known as a Faraday Cage, which is part of an 'air gap'—literally, moving the computer in question away from anything connected to the world. 


Breaching these networks requires the installation of malware on the host computer, but once that’s accomplished the possibilities are there; it’s already been proven to work with low-level magnetic fields. 

As Tech Republic wrote in early 2018, new cyberattack methods use a “low-level field that allows attackers to covertly access any device with a CPU hidden inside a Faraday cage or air-gapped room. That's worth reiterating: Anything with a CPU can be manipulated using what Guri and his team call the Odini method.” 

Basically, malware can infect the CPU to influence what parts of it are actually performing processing, which then changes the low-level magnetic waves coming out of the computer. Data is "piggy-backed" onto the magnetic waves, and—presto!—it can be picked up by a device designed to receive that magnetic field information and compile the data. A second method, dubbed Magneto, does effectively the same thing, but via simple smartphone. 

The latest technique, called PowerHammer, exploits some of the same concepts—but via the power lines that keep the computer running. 

Incredibly, the data can be compromised via direct power line connection, and—at a much slower rate—via the grid itself.

Mordechai Guri, lead author of the PowerHammer paper linked above, explains: "The data is modulated, encoded, and transmitted on top of the current flow fluctuations, and then it is conducted and propagated through the power lines. This phenomena is known as a 'conducted emission'. We show that a malicious code can influence the momentary power consumption of the computer, generating data-modulated conduction on the power lines in the low-frequency band. The generated noise travels along the input power lines and can be measured by an attacker probing the power cables."

So, for the ultimate in security, pretty much a solar-powered computer surrounded by a series of metal-encased, magnetically resistant boxes… buried under the sea?

Or perhaps on top of a mountain.

Here's a bit more about Faraday cages, named after—you guessed it—Michael Faraday

Trusting your instincts is lazy: Poker pro Liv Boeree on Big Think Edge

International poker champion Liv Boeree teaches decision-making for Big Think Edge.

Big Think Edge
  • Learn to make decisions with the clarity of a World Series Poker Champion.
  • Liv Boeree teaches analytical thinking for Big Think Edge.
  • Subscribe to Big Think Edge before we launch on March 30 to get 20% off monthly and annual memberships.
Keep reading Show less

7 essential Eastern philosophy books

Discover the holistic and all-encompassing philosophies of the ancient East.

Getty Images
Culture & Religion
  • Taoist philosophy teaches its adherents the paradoxical action of non-action.
  • Over three thousand years ago, the I Ching conceptualized binary code and influenced major asian religions
  • Ram Dass and Herman Hesse synthesized western scientific and philosophic views with traditional eastern religions to inform their teachings.
Keep reading Show less

Here's when machines will take your job, as predicted by A.I. gurus

An MIT study predicts when artificial intelligence will take over for humans in different occupations.

Photo credit: YOSHIKAZU TSUNO / AFP / Getty Images
Surprising Science

While technology develops at exponential speed, transforming how we go about our everyday tasks and extending our lives, it also offers much to worry about. In particular, many top minds think that automation will cost humans their employment, with up to 47% of all jobs gone in the next 25 years. And chances are, this number could be even higher and the massive job loss will come earlier.

Keep reading Show less

Are you an overbuyer or an underbuyer?

One way to limit clutter is by being mindful of your spending.

Videos
  • Overbuyers are people who love to buy — they stockpile things as a result. These are individuals who are prone to run out of space in trying to store their stuff and they may even lose track of what — and how much of what — they have.
  • One way overbuyers can limit their waste, both money and space wise, is by storing items at the store, and then buy them when they really need them.
  • Underbuyers tend to go to extraordinary lengths to not buy things. They save money and do fewer errands, however, they often make do with shabby personal items. They may also, when they finally decide to go out to buy a product, go without entirely because the item may no longer be available.