University researchers tout using smartwatches to steal data from air-gapped systems — SmartAttack paper proposes using wearable as a covert ultrasonic signal receiver

IT server
(Image credit: Getty / iStock)

A new theoretical air-gap attack dubbed SmartAttack has been cooked up by researchers at the Ben-Gurion University of the NegevBeer Sheva, Israel, proposing that smartwatches could be leveraged as receivers for ultra-sonic covert communication in air-gapped systems, highlighting an emerging threat to the networks.

As per the paper, air-gapped systems are generally considered secure due to their physical isolation from external networks, a measure used to prevent unauthorized access and cyberattacks. Air-gapped systems take different forms, including actual physical isolation or 'logical' isolation, where the segregation is implemented using other means such as encryption.

TOPICS
Stephen Warwick
News Editor

Stephen is Tom's Hardware's News Editor with almost a decade of industry experience covering technology, having worked at TechRadar, iMore, and even Apple over the years. He has covered the world of consumer tech from nearly every angle, including supply chain rumors, patents, and litigation, and more. When he's not at work, he loves reading about history and playing video games.

  • chaz_music
    This makes me think of a similar research finding a few years ago that used the EMI signature of DRAM. I think they set the DRAM clock to 2.4GHz (WiFi lower band) and made precise DRAM reads to create modulated RF. The signal was readable by a WiFi system across the room but I don't remember how far they were able to get.
    Reply
  • Pierce2623
    Why do we get so many articles about threats that aren’t threats?
    Reply
  • kanewolf
    High security areas don't allow smartwatches. Been there, done that. Leave your smartwatch with your phone OUTSIDE the area.
    Reply
  • Konomi
    Pierce2623 said:
    Why do we get so many articles about threats that aren’t threats?
    Easier to find a gullible human that can either be bribed or just doesn't know what they're doing. Is how trade secrets are often leaked - humans are the weakness, always.
    Reply
  • edzieba
    Audio based exfil for airgapped systems is not in the slightest bit new. The smartwatch bit is a fairly quixotic twist: any environment that demands you remove your smartphone before entering will apply the same rule to smartwatches, and if there are no personal device controls then anyone with a smartwatch will also be carrying a smartphone too, and smartphones have a much larger attack surface to potentially compromise if you need to use an existing device to exfil rather than inserting a dedicated device (for audio exfil, that would be any compact audio recorder).
    Reply
  • jg.millirem
    More Israeli tech based around stealing data.
    Reply