Computers containing sensitive information are often air-gapped to prevent data breaches. But air-gapping also cannot guarantee security. Attackers can use air-gap malware to steal sensitive data from air-gapped computers or networks. What is an air gap malware? How does it work, and how can it steal sensitive data from an air-gapped computer or network? Let’s discuss that in detail.
In this article, we will discuss the following:
-
What is air gap malware?
-
What is air gapping?
-
How does air-gap malware work?
-
Stages of infection
-
Acoustic data exfiltration by air gap malware
-
Data exfiltration from air-gapped networks using router LEDs
-
Data exfiltration by air gap malware using Infrared and Security Cameras
-
Data exfiltration by air gap malware via CPU-generated magnetic fields
-
Exchange of data between two air-gapped computers via ultrasonic waves
-
Data exfiltration by air gap malware using power lines
-
Data exfiltration over GSM, UMTS, and LTE frequencies by air gap malware
-
-
How to prevent air gap malware?
0 Comments