Hackers can steal data through PC fan vibrations

Researchers show how fan speeds can be regulated to encode and transmit sensitive data

Cyber criminals can exfiltrate sensitive data from a PC sat within an air-gapped system by using malware to manipulate the vibrations from internal CPU and GPU fans, it has emerged.

By exploiting ‘air-gap covert channels’, hackers can steal data from systems totally isolated from network connectivity, beyond tightly-controlled local networks. Such air-gapped systems are normally used by corporate or government networks, and computer systems used for national defence.

Breaching systems without physical or network access is a challenge, but researchers have proven that a PC’s internal fans, such as GPU, CPU or chassis fans, can be encoded with internally-stored data.

Computers are known to vibrate at a frequency that correlates with the rotation speed of internal fans. These vibrations can’t be heard, but can be felt on nearby surfaces, like a neighbouring desk.

However, it has been discovered that malware can be used to regulate the rotation speed of internal PC fans, the fluctuating vibrations from which can be encoded with sensitive data stored on these machines, according to Mordechai Guri, the head of R&D at Israel’s Ben-Gurion University of the Negev, as reported by ZDNet.

Academic research shows that vibrations generated by malware installed on an air-gapped system, which Guri branded as AiR-ViBeR, can encode binary information and modulate this over a low-frequency vibrational carrier.

This can subsequently be decoded using the accelerometer built-into any smartphone. By placing the device onto a nearby surface, software can be used to reconstruct the manipulated vibrations back into meaningful data.

There are a host of methods that cyber criminals could deploy to steal data from air-gapped systems, ranging from LED indicators on hard drives to screen brightness variations. However, Guri’s latest research is the first proving that vibrations can be manipulated to successfully transmit sensitive data from machines in air-gapped systems.

Although this method is perfectly feasible, it’s not likely to be deployed in real-life scenarios due to practicality reasons.

The research team managed to achieve a data exfiltration rate of only half a bit per second through fan vibrations in a test run, suggesting cyber criminals are likely to look to other methods to seize sensitive corporate data.

Featured Resources

How to be an MSP: Seven steps to success

Building your business from the ground up

Download now

The smart buyer’s guide to flash

Find out whether flash storage is right for your business

Download now

How MSPs build outperforming sales teams

The definitive guide to sales

Download now

The business guide to ransomware

Everything you need to know to keep your company afloat

Download now

Recommended

Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021
New report highlights the need for diversity in cyber security recruitment
cyber security

New report highlights the need for diversity in cyber security recruitment

28 Apr 2021
Colonial Pipeline reportedly paid $5 million ransom
Security

Colonial Pipeline reportedly paid $5 million ransom

13 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021