ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Turn to Radio Signals to Get the Data They Want

b2ap3_thumbnail_radio_signal_400.jpgYou should never assume that your data is safe from a hacking attack. Just like how the technology industry is working toward new ways to protect the public from hacks, those who lurk in the gutters of the Internet are trying to undermine these developments by any means possible. Some security professionals believe that even radio signals can undermine network security.

For example, researchers in Israel are developing a method for extracting information from a machine using radio frequency signals and wireless communication. What’s really unnerving about these techniques is that they can get past isolated machines; those which are isolated from the Internet, unconnected from other connected devices, with even Bluetooth disabled. In fact, these machines are often protected to the extent that workers cannot bring mobile phones anywhere near the device. All of these measures are taken to prevent a remote hacking incident, but what happens when these measures no longer affect the hacker’s ability to steal sensitive information?

This threat is very real, and researchers have already proven that the method can potentially be exploited to siphon data from unconnected devices. This concept has been dubbed “AirHopper” by the researchers at Cyber Security Labs at Ben Gurion University. The method uses radio frequencies to leak information from isolated machines via transceiver, and has been confirmed to have been used by the NSA to spy on foreign countries.

The researchers don’t claim to use the same methods as the NSA, but it’s similar nonetheless. They’ve created malware which can potentially be exploited through a mobile phone’s FM transmitter. The idea is to infect a system with this malware, which then causes the device to generate radio frequencies. These FM signals then proceed to target other devices within their reach. According to WIRED magazine:

The data can be picked up by a mobile phone up to 23 feet away and then transmitted over Wi-Fi or a cellular network to an attacker’s command-and-control server. The victim’s own mobile phone can be used to receive and transmit the stolen data, or an attacker lurking outside an office or lab can use his own phone to pick up the transmission.

These researchers note that the attack is rather complex, and it would take extraordinarily talented hackers to take advantage of this method. They do, however, note that it’s not beyond the scope of those who have developed equally-as-complex mediums of hacking. Additionally, the most likely method of transmitting this malware to infect a disconnected system is through an infected USB device or flash drive, limiting potential attacks to those who have physical access to these disconnected systems. Still, even if these attacks aren’t the most viable scenario, the fact remains that radio frequency attacks could become something to be concerned about under the right circumstances.

This is why closely monitoring your assets and networks is a valuable investment. Even if this valuable information is on a disconnected system, you need to take steps toward limiting who has access to it and what devices are used with it. Only use secure USB devices and restrict access to only authorized personnel.

If this information were to leak from a supposedly secure database without you being aware, your business could potentially be held liable, not to mention the catastrophe that could follow if Social Security numbers or credit card information were compromised. You need to know what’s happening on your network at any given moment in order to prevent these worst-case scenarios.

With a remote monitoring solution from ClearView IT, we can keep an eye on your servers for any suspicious activity. You’ll be the first to know if something strange is happening in your network, and we can take steps to put a stop to hacking attacks before any irreparable damage is done. Just give us a call at 866-326-7214 to see how we can improve the continuity of your business.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media Users VoIP Mobile Device Tech Term Automation Facebook Windows 10 Business Continuity Passwords Covid-19 Holiday Disaster Recovery IT Support Browser Managed Service Apps Windows 10 Cloud Computing Outsourced IT Miscellaneous Remote Work Managed Service Provider Data Management Internet of Things Saving Money Operating System Government Workplace Strategy Networking Windows Gadgets Artificial Intelligence Managed IT services Encryption Blockchain Business Technology App Virtualization WiFi Remote Mobile Device Management Spam Information Server Bandwidth Gmail Budget Office Two-factor Authentication Employee/Employer Relationship Office 365 Apple Information Technology History BDR Analytics Wi-Fi Big Data Conferencing Access Control Data Security Cybercrime Health Save Money Remote Computing IT Management Help Desk Hacking Training Cost Management Vendor Hacker Voice over Internet Protocol Patch Management Employer-Employee Relationship Document Management Compliance Remote Monitoring Alert IBM Hiring/Firing Website Outlook Data loss Password BYOD Computing Vendor Management Hard Drive Applications Money Search... Customer Service Mobile Office Unified Threat Management Vulnerabilities Firewall Best Practice Legal Managed Services Retail Augmented Reality Data storage Project Management Word How To Content Filtering Travel Virtual Reality Websites Social Engineering User Cryptocurrency Mobility Meetings Router Black Market Cleaning Windows 11 The Internet of Things Google Maps YouTube Robot Scam Chrome Laptop VPN Data Breach Mobile Computing Update Twitter Marketing Running Cable Sports Law Enforcement Social Remote Workers SaaS Paperless Office DDoS End of Support Printer Antivirus Monitoring Storage Windows 7 Maintenance Healthcare Free Resource iPhone Education Cortana Start Menu Solutions Google Docs Computers Lithium-ion battery Bitcoin Downloads Computer Care Bluetooth Telephone HIPAA Distributed Denial of Service Integration Office Tips Vulnerability Images 101 Private Cloud Display Processors Memory Software as a Service Data Protection Excel Employees Politics Avoiding Downtime Machine Learning Settings Holidays Virtual Assistant Solid State Drive Wireless Technology PowerPoint Cooperation eWaste Video Conferencing Administration Tech Terms Downtime Chromebook Presentation Drones Managed IT Virtual Machines Digital Computer Repair Processor Specifications Safety Automobile IT Consultant Professional Services Virtual Desktop Taxes How To Experience Customer Relationship Management Microchip Co-Managed IT Flexibility Entertainment Multi-factor Authentication Managed Services Provider Virtual Private Network Physical Security Hack Disaster Identity Theft Notifications Saving Time Current Events Unified Communications Text Messaging Error Competition Proactive IT Touchscreen FinTech Administrator Recovery IT Assessment Bring Your Own Device Bookmark Computer Malfunction Troubleshooting Emergency CES Piracy Vendor Mangement Supply Chain Management LiFi Term Value Download Entrepreneur Application Music HTML Organization Samsung Cyber security Documents Uninterrupted Power Supply Smart Devices Browsers Webcam Nanotechnology Business Intelligence Software License Business Mangement Remote Working Smart Technology Google Play Upload Securty Social Network AI Botnet Tablets Trend Micro Electronic Health Records Rental Service Data Analysis Business Owner Transportation Domains Micrsooft Screen Reader Digital Security Cameras Mobile Technology Google Calendar Security Cameras Supercomputer Wasting Time Flash Trends Telephone Systems Customer Resource management Modem Business Growth Devices Virus eCommerce Surveillance Fileless Malware Motion Sickness Tip of the week Videos Company Culture Comparison Google Drive Supply Chain Managing Costs Gamification Banking Telephone System SSID Public Speaking Google Wallet Regulations Corporate Profile Development Streaming Media Messenger Directions Inbound Marketing Employer/Employee Relationships Deep Learning Backup and Disaster Recovery Knowledge Media Keyboard Desktop Television Telephony Workplace Employer Employee Relationship Virtual Machine Content Business Metrics Electronic Medical Records Hard Drives Hosted Solution Accountants Reviews Cabling Optimization Tablet Books G Suite Teamwork Database intranet 2FA Shortcut Society Mouse VoIP Data Storage Scams Tracking Electronic Payment Hypervisor Wireless Language Health IT Medical IT Heating/Cooling Equifax Environment Shopping Windows XP Reading Web Server SQL Server Monitors Tactics Social Networking Visible Light Communication Hard Drive Disposal Paperless Windows 8 SharePoint PCI DSS Cables Digital Payment Licensing Username Phone System Startup Freedom of Information Gig Economy Worker Humor Business Communications Access Internet Service Provider Relocation Navigation Azure Displays Addiction Advertising email scam Tech Support Mobile Security Time Management Regulations Compliance Point of Sale Public Cloud Managed IT Service Work/Life Balance Memes User Tip Legislation News Audit Human Resources Spyware Net Neutrality Shortcuts Evernote Network Management Computer Accessories Financial Data In Internet of Things File Sharing Staffing IT Hacks Proxy Server IP Address Network Congestion Emails Fake News Redundancy Risk Management Google Apps Cache Be Proactive Reliable Computing Writing Service Level Agreement Computing Infrastructure Device security Unified Threat Management Telework Workers Management Communitications Microsoft 365 Wireless Headphones Microsoft Excel Smartwatch Printing Procurement Workplace Strategies Scalability Tech CCTV Going Green Business Cards

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?