14 POPULAR AIR-GAPPED DATA EXFILTRATION TECHNIQUES USED TO STEAL THE DATA

THESECMASTER

Cybercriminals are always in search of loopholes to infiltrate the system. It may sound weird or unreal, but criminals can exfiltrate data from your system by simply changing screen brightness. In recent years, various cybersecurity researchers have demonstrated innovative methods to exfiltrate data from a physically isolated air-gapped system that can not connect physically or wirelessly with other systems or network devices.

1. What Is Air Gapping?
2. What Are The Benefits Of Air Gapping?
3. 14 Popular Air-Gapped Data Exfiltration Techniques
  3.1. #1. Screen Brightness
  3.2. #2. Wi-Fi Signals (Without Wi-Fi Hardware)
  3.3. #3. PowerHammer Attack- Power Lines
  3.4. #4. MOSQUITO Attack
  3.5. #5. Cold Storage Attack- Steal Bitcoin Wallet Keys
  3.6. #6. Air-Jumper Attack- IR CCTV Cameras
  3.7. #7. MAGNETO And ODINI Techniques- CPU-Generated Magnetic Fields
  3.8. #8. USBee Attack- Radio frequency Transmissions From USB Connectors
  3.9. #9. DiskFiltration Attack- Sound Signals Emitted From The Hard Disk
  3.10. #10. BitWhisper Attack- Heat
  3.11. #11. AirHopper Attacks- Video Card Into An FM Transmitter To Capture keystrokes
  3.12. #12. Fansmitter Attack- Noise Emitted By A Computer Fan To Transmit Data
  3.13. #13. GSMem Attack- Cellular Frequencies
  3.14. #14. Side-Channel Attack
4. Final Words

Table of Contents :

14 Popular Air-Gapped Data Exfiltration Techniques

Tumblr

Telegram

Medium

Twitter

LinkedIn

Facebook

FOLLOW US:

THESECMASTER