Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Turn to Radio Signals to Get the Data They Want

b2ap3_thumbnail_radio_signal_400.jpgYou should never assume that your data is safe from a hacking attack. Just like how the technology industry is working toward new ways to protect the public from hacks, those who lurk in the gutters of the Internet are trying to undermine these developments by any means possible. Some security professionals believe that even radio signals can undermine network security.

For example, researchers in Israel are developing a method for extracting information from a machine using radio frequency signals and wireless communication. What’s really unnerving about these techniques is that they can get past isolated machines; those which are isolated from the Internet, unconnected from other connected devices, with even Bluetooth disabled. In fact, these machines are often protected to the extent that workers cannot bring mobile phones anywhere near the device. All of these measures are taken to prevent a remote hacking incident, but what happens when these measures no longer affect the hacker’s ability to steal sensitive information?

This threat is very real, and researchers have already proven that the method can potentially be exploited to siphon data from unconnected devices. This concept has been dubbed “AirHopper” by the researchers at Cyber Security Labs at Ben Gurion University. The method uses radio frequencies to leak information from isolated machines via transceiver, and has been confirmed to have been used by the NSA to spy on foreign countries.

The researchers don’t claim to use the same methods as the NSA, but it’s similar nonetheless. They’ve created malware which can potentially be exploited through a mobile phone’s FM transmitter. The idea is to infect a system with this malware, which then causes the device to generate radio frequencies. These FM signals then proceed to target other devices within their reach. According to WIRED magazine:

The data can be picked up by a mobile phone up to 23 feet away and then transmitted over Wi-Fi or a cellular network to an attacker’s command-and-control server. The victim’s own mobile phone can be used to receive and transmit the stolen data, or an attacker lurking outside an office or lab can use his own phone to pick up the transmission.

These researchers note that the attack is rather complex, and it would take extraordinarily talented hackers to take advantage of this method. They do, however, note that it’s not beyond the scope of those who have developed equally-as-complex mediums of hacking. Additionally, the most likely method of transmitting this malware to infect a disconnected system is through an infected USB device or flash drive, limiting potential attacks to those who have physical access to these disconnected systems. Still, even if these attacks aren’t the most viable scenario, the fact remains that radio frequency attacks could become something to be concerned about under the right circumstances.

This is why closely monitoring your assets and networks is a valuable investment. Even if this valuable information is on a disconnected system, you need to take steps toward limiting who has access to it and what devices are used with it. Only use secure USB devices and restrict access to only authorized personnel.

If this information were to leak from a supposedly secure database without you being aware, your business could potentially be held liable, not to mention the catastrophe that could follow if Social Security numbers or credit card information were compromised. You need to know what’s happening on your network at any given moment in order to prevent these worst-case scenarios.

With a remote monitoring solution from Evolve IT, we can keep an eye on your servers for any suspicious activity. You’ll be the first to know if something strange is happening in your network, and we can take steps to put a stop to hacking attacks before any irreparable damage is done. Just give us a call at (518) 203-2110 to see how we can improve the continuity of your business.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 01 January 2026
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Email Privacy Productivity Malware Business Software Business Computing User Tips Hosted Solutions Microsoft Upgrade Computer Efficiency Workplace Tips Google Windows 10 IT Support Mobile Devices Innovation Smartphone Gmail Network Security Ransomware Hardware Facebook The Internet of Things Social Media Bandwidth Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Communication Hacking WiFi Operating System Android Small Business Apple Phishing App Mobile Computing Best Practice Big Data communications Safety Alert Unified Threat Management Networking Data storage Quick Tips Data Windows Experience Firewall Content Filtering Cybercrime Mobile Device Management Money Smartphones Website Network Managed Service Provider Outlook Employer-Employee Relationship History Two-factor Authentication Wireless Technology Social Printer Automation Browser Router Memory Office 365 Virtual Desktop Wireless Securty Unified Communications Document Management Deep Learning Analytics Encryption Saving Money intranet Law Enforcement BDR Lithium-ion battery SaaS VoIP Proactive IT Vendor Management Cortana Social Networking Network Congestion Public Speaking Save Money Music Monitors IP Address Virtualization Cryptocurrency Laptop Government Displays Augmented Reality Keyboard IBM Google Docs Search Education User Cleaning Hard Drives Holiday Black Market End of Support Remote Computing YouTube Shortcut Processors Staffing Office Tips DDoS LiFi BYOD Heating/Cooling Downtime Word Passwords Writing Streaming Media Help Desk Disaster Micrsooft Visible Light Communication Business Management Business Growth Data Management Competition Recovery Robot Advertising Society Presentation Sports Entrepreneur Google Wallet Retail Domains Spam Running Cable Information Technology Windows 8 Hacker Internet of Things Hosted Solution Managed IT services Windows XP IT Services Application Documents Artificial Intelligence Tech Support Customer Service Compliance Drones Bluetooth
QR-Code